<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-07" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="DETIM Architecture">DRIP Entity Tag (DET) Identity Management Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-07"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2022" month="December" day="05"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the high level architecture for the registration and discovery of DRIP Entity Tags (DETs) using DNS. Discovery of DETs and their artifacts are through the existing DNS structure and methods by using FQDNs. A general overview of the interfaces required between involved components is described in this document with supporting documents giving technical specifications.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to Unmanned Aircraft System (UAS) Remote ID (RID). Only very limited operational information can be Broadcast, but extended information is sometimes needed. The most essential element of information sent is the UAS ID itself, the unique key for lookup of extended information in relevant registries (see Figure 4 of <xref target="drip-arch" format="default"/>).</t>
      <t>While it is expected that registry functions will be integrated with UAS Service Supplier (USS) (Appendix A.2 of <xref target="drip-arch" format="default"/>), who will provide them is not yet determined in most, and is expected to vary between jurisdictions. However this evolves, the essential registry functions (including the management of identifiers) are expected to remain the same, so are specified herein.</t>
      <t>While most data to be sent via Broadcast RID (Section 1.2.1 of <xref target="drip-arch" format="default"/>) or Network RID (Section 1.2.2 of <xref target="drip-arch" format="default"/>) is public, much of the extended information in registries will be private. As discussed in Section 7 of <xref target="drip-arch" format="default"/>, Authentication, Attestation, Authorization, Access Control, Accounting, Attribution, and Audit (AAA) for registries is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose, etc. As specific AAA requirements will vary by jurisdictional regulation, provider choices, customer demand, etc., they are left to specification in policies, which should be human readable to facilitate analysis and discussion, and machine readable to enable automated enforcement, using a language amenable to both (e.g., eXtensible Access Control Markup Language (XACML)).</t>
      <t>The intent of the access control requirements on registries is to ensure that no member of the public would be hindered from accessing public information, while only duly authorized parties would be enabled to access private information. Mitigation of Denial of Service (DoS) attacks and refusal to allow database mass scraping would be based on those behaviors, not on identity or role of the party submitting the query per se, but querant identity information might be gathered (by security systems protecting DRIP implementations) on such misbehavior.</t>
      <t>Registration under DRIP is vital to manage the inevitable collisions in the hash portion of the DRIP Entity Tags (DETs). Forgery of the DETs is still possible, but including it as a part of a public registration mitigates this risk. This document creates the DRIP DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., Unmanned Aircraft (UA), Registered Assigning Authority (RAA), Hierarchical HIT Domain Authority (HDA), Ground Control Station (GCS), and USS).</t>
      <t>This document uses the Concise Data Definition Language (CDDL) <xref target="RFC8610" format="default"/> for describing the registration data.</t>
    </section>
    <section anchor="abstract-process-and-reasoning" numbered="true" toc="default">
      <name>Abstract Process and Reasoning</name>
      <t>In DRIP each entity (registry, operator, and aircraft) is expected to generate a full DRIP Entity ID <xref target="drip-rid" format="default"/> on the local device their key is expected to be used. These are registered with a Public Information Registry within the hierarchy along with whatever data is required by the cognizant CAA and the registry. Any Personally Identifiable Information (PII) is stored in a Private Information Registry protected through industry practice AAA or stronger. In response, the entity will obtain an endorsement from the registry proving such registration.</t>
      <t>Manufacturers that wish to participate in DRIP should not only support DRIP as a Session ID type for their aircraft but could also generate a DET then encode it as a Serial Number. This would allow aircraft under CAA mandates to fly only ID Type 1 (Serial Number) could still use DRIP and most of its benefits. Even if DRIP is not supported for Serial Numbers by a Manufacturer it is hoped that they would still run a registry to store their Serial Numbers and allow look ups for generic model information. This look up could be especially helpful in UTM for Situational Awareness when an aircraft flying with a Serial Number is detected and allow for an aircraft profile to be displayed.</t>
      <t>Operators are registered with a number of registries or their regional RAA. This acts as a verification check when a user performs other registration operations; such as provisioning an aircraft with a new Session ID. It is an open question if an Operator registers to their CAA (the RAA) or multiple USS's (HDA's). PII of the Operator would vary based on the CAA they are under and the registry.</t>
      <t>Finally, aircraft that support using a DET would provision per flight to a USS, proposing a DET to the registry to generate a binding between the aircraft (Session ID, Serial Number, and Operational Intent), operator and registry. The aircraft then follows <xref target="drip-auth" format="default"/> to meet various requirements from <xref target="RFC9153" format="default"/> during a flight.</t>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions" numbered="true" toc="default">
        <name>Additional Definitions</name>
        <t>See <xref target="RFC9153" format="default"/> for common DRIP terms and Section 2.2 of <xref target="drip-arch" format="default"/> for additional terms used in this document.</t>
        <t>HDA:</t>
        <ul empty="true" spacing="normal">
          <li>Hierarchial HIT Domain Authority. The 14 bit field identifying the HIT Domain Authority under a RAA.</li>
        </ul>
        <t>HID:</t>
        <ul empty="true" spacing="normal">
          <li>Hierarchy ID. The 28 bit field providing the HIT Hierarchy ID.</li>
        </ul>
        <t>PII:</t>
        <ul empty="true" spacing="normal">
          <li>Personally Identifiable Information. Any information a cognizant authority (such as a government agency) or a user requires differentiated access to obtain.</li>
        </ul>
        <t>RAA:</t>
        <ul empty="true" spacing="normal">
          <li>Registered Assigning Authority. The 14 bit field identifying the Hierarchical HIT Assigning Authority.</li>
        </ul>
      </section>
    </section>
    <section anchor="dime-roles" numbered="true" toc="default">
      <name>DIME Roles</name>
      <t><xref target="drip-arch" format="default"/> defines the DRIP Identity Management Entity (DIME) as an entity that vets Claims and/or Evidence from a registrant and delivers back Endorsements and/or Certificates in response. The DIME encompasses various logical components and can be classified to serve a number of different roles, which are detailed in the following subsections. The general hierarchy of these roles are illustrated in <xref target="reg-class-fig" format="default"/>.</t>
      <figure anchor="reg-class-fig">
        <name>DIME Roles and Hierarchy</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
                +----------+
                |   Apex   | 
                +-o------o-+
                  |      |
******************|******|*****************************
                  |      |
            +-----o-+  +-o-----+
RAAs        |  IRM  |  |  RAA  o------.
            +---o---+  +---o---+      '
                |          |          |
****************|**********|**********|****************
                |          |          |
            +---o---+  +---o---+  +---o---+
HDAs        |  MRA  |  | RIDR  |  |  HDA  |
            +-------+  +-------+  +-------+
]]></artwork>
      </figure>
      <!-- TODO: look in following subsections to determine if DET or HHIT is used; I assume DET is correct at this stage but may need HHIT references when talking about technical components? -->

<section anchor="apex" numbered="true" toc="default">
        <name>Apex</name>
        <t>The Apex is a special DIME role that holds the value of RAA=0 and HDA=0. It serves as the branch point from the larger DNS system in which HHITs are defined. The Apex generally has as prefix portions of the HHIT associated with it (such as 2001:0030/28) which are assigned by IANA from the non-routable special IPv6 address space for ORCHIDs (where HHITs are derived from).</t>
        <t>The Apex manages all delegations and allocations of the HHIT's RAA to various parties with NS records to redirect DNS queries to proper sub-branches.</t>
      </section>
      <section anchor="raa" numbered="true" toc="default">
        <name>Registered Assigning Authority (RAA)</name>
        <t>RAA's are the upper hierarchy in DRIP (denoted by a 14-bit field (16,384 RAAs) of an HHIT). An RAA is a business or organization that manages a registry of HDAs (<xref target="hda" format="default"/>). Most are contemplated to be Civil Aviation Authorities (CAA), such as the Federal Aviation Authority (FAA), that then delegate HDAs to manage their National Air Space (NAS). This is does not preclude other entities to operate an RAA if the Apex allows it.</t>
        <t>For DRIP and the UAS use case ICAO will handle the registration of RAAs. Once ICAO accepts an RAA, it will assign a number and create a zone delegation under the <tt>&lt;prefix&gt;.hhit.arpa.</tt> DNS zone for the RAA.</t>
        <t>As HHITs may be used in many different domains, RAA should be allocated in blocks with consideration on the likely size of a particular usage. Alternatively, different prefixes can be used to separate different domains of use of HHITs.</t>
        <t>An RAA must provide a set of services to allocate HDAs to organizations. It must have a public policy on what is necessary to obtain an HDA. It must maintain a DNS zone minimally for discovering HID RVS servers. All RAA's use an HDA value of 0 and have their RAA value delegated to them by the Root.</t>
        <section anchor="irm" numbered="true" toc="default">
          <name>ICAO Registry of Manufacturers (IRM)</name>
          <!-- TODO: change to ICAO Authority of Manufacturers (IAM) or ICAO Manufacturer Authority (IMA)? -->

<t>An RAA-level DIME that hands out HDA values to participating Manufacturer's that hold an ICAO Manufacturer Code used in <xref target="CTA2063A" format="default"/>.</t>
          <t>To manage the large ICAO Manufacturer Code space (34  character set; 4 characters; 1,336,336 possible codes) a range of RAA values are set aside for the DRIP use case. These are the RAA values of 2 (0x0002) up to 96 (0x0060). This allows a single HDA for each Manufacturer Code.</t>
          <t>All IRM's have two reserved HDA values. 0 (0x0000) for itself in its role as an RAA and 1 (0x0001) if it wishes to offer HDA services.</t>
        </section>
      </section>
      <section anchor="hda" numbered="true" toc="default">
        <name>Hierarchial HIT Domain Authority (HDA)</name>
        <t>An HDA may be an USS, ISP, or any third party that takes on the business to register the actual UAS entities that need DETs.  This includes, but is not limited to UA, GCS, and Operators. It should also provide needed UAS services including those required for HIP-enabled devices (e.g. RVS).</t>
        <t>The HDA is a 14-bit field (16,384 HDAs per RAA) of a DET assigned by an RAA.  An HDA should maintain a set of RVS servers for UAS clients that may use HIP.  How this is done and scales to the potentially millions of customers are outside the scope of this document. This service should be discoverable through the DNS zone maintained by the HDA's RAA.</t>
        <t>An RAA may assign a block of values to an individual organization. This is completely up to the individual RAA's published policy for delegation. Such policy is out of scope.</t>
        <section anchor="mra" numbered="true" toc="default">
          <name>Manufacturers Registry of Aircraft (MRA)</name>
          <!-- TODO: change to Manufacturers Authority of Aircraft or Manufacturer Aircraft Authority (MAA)? -->

<t>An HDA-level DIME run by a manufacturer of UAS systems that participate in Remote ID. Stores UAS Serial Numbers under a specific ICAO Manufacturer Code (assigned to the manufacturer by ICAO).</t>
          <t>A DET can be encoded into a Serial Number (see <xref target="drip-rid" format="default"/>) and this registry would hold a mapping from the Serial Number to the DET and its artifacts.</t>
          <section anchor="ridr" numbered="true" toc="default">
            <name>Remote ID Registries (RIDR)</name>
            <!-- TODO: change to Remote ID Authority of Session IDs (RIDAS, RAS, RASID) or Session ID Authority (SIDA) or Remote ID Authority (RIA, RIDA)? -->

<t>An HDA-level DIME that holds the binding between a UAS Session ID (for DRIP the DET) and the UA Serial Number. The Serial Number MUST have its access protected to allow only authorized parties to obtain. The Serial Number SHOULD be encrypted in a way only the authorized party can decrypt.</t>
            <t>As part of the UTM system they also hold a binding between a UAS ID (Serial Number or Session ID) and an Operational Intent. They may either be a direct logical part of a UAS Service Supplier (USS) or be a UTM wide service to USS's.</t>
          </section>
        </section>
      </section>
      <section anchor="role-abbreviation-in-dets" numbered="true" toc="default">
        <name>Role Abbreviation in DETs</name>
        <t>On receiver devices a DET can be translated to a more human readable form such as: <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 Characters of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>. To support this DIMEs are RECOMMENDED to have an abbreviation that could be used for this form. These abbreviations SHOULD be a maximum of six characters in length. Spaces SHOULD NOT be used and be replaced with either underscores (<tt>_</tt>) or dashes (<tt>-</tt>). For RAAs the abbreviation is RECOMMENDED to be set to the ISO 3166 country code (either Alpha-2 or Alpha-3) for the CAA.</t>
        <!-- TODO: should we specify the fall back is hard set to a 4-character hexadecimal encoding or up to (1-4)? -->

<t>If a DIME does not have an abbreviation or it can not be looked up then the receiver SHOULD use the 4-character hexadecimal encoding of the field it is missing.</t>
      </section>
    </section>
    <section anchor="dime-arch" numbered="true" toc="default">
      <name>DIME Architecture</name>
      <t>The DIME, in any of its roles (<xref target="dime-roles" format="default"/>), is comprised of a number of logical components that are depicted in <xref target="dime-arch-fig" format="default"/>. Any of these components could be delegated to other entities as a service both co-located or remote. For example:</t>
      <ul spacing="normal">
        <li>
          <t>The Name Server component could be handled by a well-established DNS registrar/registry with the DRIP Provisioning Agent (DPA) (<xref target="dpa" format="default"/>) interfacing to them
          </t>
          <ul spacing="normal">
            <li>Either the DPA or the Registry/Name Server interfaces to the DRIP Information Agent (DIA)</li>
          </ul>
        </li>
        <li>The DPA, Registry, and Name Server may all be co-located in one implementation with an interface to a DIA offered by another organization from any one of the co-located components</li>
      </ul>
      <figure anchor="dime-arch-fig">
        <name>Registry Hierarchy</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+--------------------+
| Registering Client |
+---------o----------+
          | 
**********|******************************************************
*         |        DRIP Identity Management Entity              *
*         |                                                     *
*  +------o-------+      +-------------+      +--------------+  *
*  | DRIP         |      |             |      |              |  *
*  | Provisioning o------o             |      |              |  *
*  | Agent        |      |             |      |              |  *
*  +-------o------+      |             |      |              |  *
*          |             |             |      |              |  *
*          |             | DRIP        |      | Registration |  *
*  +-------o--+          | Information o------o Data         |  *
*  | Registry o----------o Agent       |      | Directory    |  *
*  +-------o--+          |             |      | Service      |  *
*          |             |             |      |              |  *
*          |             |             |      |              |  *
*  +-------o-----+       |             |      |              |  *
*  | Name Server |       |             |      |              |  *
*  +------o------+       +-----o-------+      +------o-------+  *
*         |                    |                     |          * 
*         |                    |                     |          *
**********|********************|*********************|***********
          |                    |                     |
          |            +-------o-------+             |
          '------------o Lookup Client o-------------'
                       +---------------+
]]></artwork>
      </figure>
      <section anchor="dpa" numbered="true" toc="default">
        <name>DRIP Provisioning Agent (DPA)</name>
        <t>The DPA performs the important task of vetting information (such as the DRIP Endorsements) coming from clients wishing to register and then delegate (internally or externally) various items to other components in the DIME.</t>
        <t>A standard interface over HTTPS MUST be provided for clients to access with JSON or CBOR encoding of objects being sent to the DPA. This interface specification is out of scope for this document.</t>
        <t>There MUST be an interface from the DPA to a Registry (<xref target="registry" format="default"/>) component which handles the DNS specific requirements of the DIME as defined by the Registry. There MAY also be interface from the DPA to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
      </section>
      <section anchor="registry" numbered="true" toc="default">
        <name>Registry</name>
        <t>The Registry component handles all the required DNS based requirements of the DIME to function for DRIP. This includes the registration and maintenance of various DNS Resource Records which use the DRIP FQDNs (<xref target="drip-fqdn" format="default"/>).</t>
        <t>A standardized interface MUST be implemented for interactions with the DPA (<xref target="dpa" format="default"/>). This interface MAY be over HTTPS using JSON/CBOR encoding or MAY use the Extensional Provisioning Protocol (EPP) <xref target="RFC5730" format="default"/>. The specifications of either of these interfaces is out of scope for this document.</t>
        <t>There MAY be interface from the Registry to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
      </section>
      <section anchor="nameserver" numbered="true" toc="default">
        <name>Name Server (NS)</name>
        <t>This may be very important here as we should not preclude a USS from running his own Name Server but they are not DNS experts and will need guidance or at least pointers to it to not mess it up. Such as SOA and NS formats to allow delegation if as RAA.</t>
        <t>The interface of the Name Server to any component (nominally the Registry) in a DIME is out of scope as typically they are implementation specific.</t>
      </section>
      <section anchor="dia" numbered="true" toc="default">
        <name>DRIP Information Agent (DIA)</name>
        <t>The DIA is the main component handling requests for information from entities outside of the DIME. Typically this is when an Observer looks up a Session ID from an UA and gets pointed to the DIA via a SVR RR to obtain information not available via DNS.</t>
        <t>The information contained in the DIA is generally more oriented around the Operator of a given UAS and is thus classified as Personally Identifiable Information (PII). To protect the privacy of an Operator of the UAS this information is not publicly accessible and is only available behind policy driven differentiated access mechanisms. As an example the Serial Number, under the FAA, is classified as PII and can only be accessed by federal entities (such as the FAA themselves).</t>
        <t>For DRIP the Registration Data Access Protocol (RDAP) (<xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) is the selected protocol to provide policy driven differentiated access for queries of information.</t>
        <t>A standard interface over HTTPS MUST be provided for clients to access with JSON/CBOR encoding of objects being sent to the DIA. There MUST also be a standardized interface for the DPA or Registry to add, update or delete information into the DIA. Both of these interfaces are out of scope for this document.</t>
        <t>An interface defined by the Registration Data Directory Service (RDDS) (<xref target="rdds" format="default"/>) is also required as specified by the RDDS.</t>
      </section>
      <section anchor="rdds" numbered="true" toc="default">
        <name>Registration Data Directory Service (RDDS)</name>
        <t>This is the primary information database for the DIA. An interface MUST be provided to the DIA but its specification is out of scope for this document.</t>
      </section>
    </section>
    <section anchor="registrationprovisioning-process" numbered="true" toc="default">
      <name>Registration/Provisioning Process</name>
      <t>The general process for a registering party is as follows:</t>
      <ol spacing="normal" type="1"><li>Verify input Endorsement(s) from registering party</li>
        <li>Check for collision of DET and HI</li>
        <li>Populate Registry/Name Server with required/optional resource records using the FQDN</li>
        <li>Populate RDDS via DIA with PII and other info</li>
        <li>Generate and return required/optional DRIP Endorsements</li>
      </ol>
      <t>In the following subsections an abbreviated form of <xref target="dime-arch" format="default"/> using co-located components is used to describe the flow of information. The data elements being transmitted between entities is marked accordingly in each figure for the specific examples.</t>
      <section anchor="serial-number" numbered="true" toc="default">
        <name>Serial Number</name>
        <t>Serial Numbers are primarily registered to MRA's (<xref target="mra" format="default"/>) by the Manufacturers. Could be also registered to CAA's (using their HDA functionality) as part of Operator registration or to USS's in their capacity as HDAs. In the later two cases no DNS RRs are made to protect the privacy of the registering parties.</t>
        <t>When the Serial Number is really an encoded DET the DET FQDN is used to point to HIP and CERT RRs rather than the Serial Number FQDN. Instead a CNAME is made between the Serial Number FQDN and the DET FQDN. The same can still happen if the manufacturer chooses to use their own Serial Number formatting (still within the specification of <xref target="CTA2063A" format="default"/>) and create the CNAME back to a DET loaded into the unmanned aircraft.</t>
        <figure anchor="dime-sn-example">
          <name>Example DIME:MRA with Serial Number (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: MRA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number,
    UA Information,
    Self-Endorsement: UA
(b) Success Code,
    Broadcast Endorsement: MRA on UA
(c) HIP RR,
    CERT RRs
(d) UA Information
]]></artwork>
        </figure>
        <t>The unmanned aircraft, intending to use DRIP, generates a keypair, DET and <tt>Self-Endorsement: UA</tt> using the RAA and HDA values specified by the manufacturers DIME (running as an MRA). The DET is converted into a Serial Number (per <xref target="drip-rid" format="default"/>) or the manufacturer creates their own Serial Number.</t>
        <t>The Serial Number, UA information and the <tt>Self-Endorsement: UA</tt> are sent to the manufacturers DIME. The DIME validates the Self-Endorsement and checks for DET and HI collisions in the Name Server/DIA. A <tt>Broadcast Endorsement: DIME on UA</tt> is generated which is provisioned into the aircraft for use when using the Serial Number as its UAS ID. In the Name Server HIP RRs are created using the DET FQDN while a CNAME points the Serial Number FQDN to the DET FQDN.</t>
        <ul empty="true" spacing="normal">
          <li>Note: <xref target="dime-sn-example" format="default"/> is specific for a DET encoded Serial Number. The Endorsements in (a) and (b) as well as RRs in (c) would not be present for non-DET based Serial Numbers.</li>
        </ul>
        <t>Additional UA Information has a set of valid item keys defined in <xref target="ua-info-registry" format="default"/>. The items present for a given interaction is defined by future documents, local regulations and implementation specific capabilities.</t>
      </section>
      <section anchor="operator" numbered="true" toc="default">
        <name>Operator</name>
        <t>Provided either by USS or CAA run HDAs. Regulation might require interaction between them. An Operator can request that certain information normally generated and provisioned into DNS be omitted due to privacy concerns.</t>
        <figure anchor="dime-operator-example">
          <name>Example DIME:HDA with Operator (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +----------+
    | Operator |
    +--o---o---+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: HDA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Operator Information,
    Operator Self-Endorsement
(b) Success Code,
    Generic Endorsement: HDA on Operator
(c) HIP RR,
    CERT RRs
(d) Operator Information
]]></artwork>
        </figure>
        <t>The Operator generates a keypair and DET as specified in <xref target="drip-rid" format="default"/> along with a self-signed endorsement (<tt>Self-Endorsement: Operator</tt>). The RAA and HDA values used in the DET generation for the Operator are found by referencing their selected DIME of choice (in <xref target="dime-operator-example" format="default"/> an HDA).</t>
        <t>The self-signed endorsement along with other relevant information (such as Operator PII) is sent to the DIME over a secure channel. The specification of this secure channel is out of scope for this document.</t>
        <t>The DIME cross checks any personally identifiable information as required. <tt>Self-Endorsement: Operator</tt> is verified. The DET and HI is searched in the DIME DIA and Name Server to confirm that no collisions occur. A new endorsement is generated (<tt>Generic Endorsement: DIME on Operator</tt>) and sent securely back to the Operator. Resource Records for the HI and Endorsements are added to the DIME Registry/Name Server.</t>
        <t>With the receipt of <tt>Generic Endorsement: DIME on Operator</tt> the registration of the Operator is complete.</t>
        <ul empty="true" spacing="normal">
          <li>Note: (c) in <xref target="dime-operator-example" format="default"/> MAY be requested by the Operator to be omitted due to PII concerns.</li>
        </ul>
        <t>The definition of Operator Information is out of scope of this document and left to local regulations.</t>
      </section>
      <section anchor="session-id" numbered="true" toc="default">
        <name>Session ID</name>
        <t>Session IDs are generally handled by HDAs, specifically RIDRs. In <xref target="dime-sid-example" format="default"/> the UAS comprises of an unmanned aircraft and a Ground Control Station (GCS). Both parties are involved in the registration process.</t>
        <figure anchor="dime-sid-example">
          <name>Example DIME:RIDR with Session ID (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +---------+
    |   UAS   |
    +--o---o--+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: RIDR              *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Mutual Endorsement: RIDR on GCS,
    Generic Endorsement: GCS on UA,
    Session ID Information
(b) Success Code,
    Broadcast Endorsement: RIDR on UA,
    Generic Endorsement: RIDR on UAS
(c) HIP RR,
    TLSA, RR,
    CERT RRs
(d) Session ID Information
]]></artwork>
        </figure>
        <t>Through mechanisms not specified in this document the Operator should have methods (via the GCS) to instruct the unmanned aircraft onboard systems to generate a keypair, DET and <tt>Self-Endorsement: UA</tt>. The <tt>Self-Endorsement: UA</tt> is extracted by the Operator onto the GCS.</t>
        <t>The GCS is already pre-provisioned and registered to the DIME with its own keypair, DET, <tt>Self-Endorsement: GCS</tt> and <tt>Generic Endorsement: RIDR on GCS</tt>. The GCS creates a new <tt>Generic Endorsement: GCS on UA</tt> and also creates <tt>Mutual Endorsement: RIDR on GCS</tt>. These new endorsements along with Session ID Information are sent to the DIME via a secure channel.</t>
        <t>The DIME validates all the endorsements and checks for DET and HI collisions in the Name Server/DIA using the proposed UA DET. A <tt>Broadcast Endorsement: DIME on UA</tt> is generated. An <tt>Generic Endorsement: RIDR on UAS</tt> is generated using the <tt>Generic Endorsement: GCS on UA</tt>. HIP and CERT RRs are provisioned into the Registry/Name server. Both endorsements are back to the GCS on a secure channel.</t>
        <t>The GCS then injects the <tt>Broadcast Endorsement: RIDR on UA</tt> securely into the unmanned aircraft. <tt>Endorsement: RIDR on GCS</tt> is securely stored by the GCS.</t>
        <ul empty="true" spacing="normal">
          <li>Note: in <xref target="dime-sid-example" format="default"/> the Session ID Information is expected to contain the Serial Number along with other PII specific information (such as UTM data) related to the Session ID.</li>
        </ul>
        <t>Session ID Information is defined as the current model:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
sessionid_info = {
    serial: tstr .size 20,
    session_id: tstr,
    operational_intent: tstr,
    intent_src: tstr,
    operator_id: tstr,
    * tstr: any
}
]]></artwork>
        <t>Future standards or implementations MAY add other keys to this list (for local features and/or local regulation).</t>
        <!-- TODO: add keys to IANA registry? -->

<section anchor="ua-based" numbered="true" toc="default">
          <name>UA Based</name>
          <t>There may be some unmanned aircraft that have their own Internet connectivity allowing them to register a Session ID themselves without outside help from other devices such as a GCS. When such a system is in use its imperative that the Operator has some method to create the <tt>Generic Endorsement: Operator on UA</tt> to send to the DIME. The process and methods to perform this are out of scope for this document but MUST be done in a secure fashion.</t>
        </section>
        <section anchor="uas-based" numbered="true" toc="default">
          <name>UAS Based</name>
          <t>Most unmanned aircraft will not have their own Internet connectivity but will have a connection to a GCS. Typically a GCS is an application on a user device (such as smartphone) that allow the user to fly their aircraft. For the Session ID registration the DIME MUST be provided with an <tt>Generic Endorsement: GCS on UA</tt> which implies there is some mechanism extracting and inserting information from the unmanned aircraft to the GCS. These methods MUST be secure but are out of scope for this document.</t>
          <t>With this system it is also possible to have the GCS generate the DET based Session ID and insert it securely into the unmanned aircraft after registration is done. This is NOT RECOMMENDED as this invalidates the objective of the asymmetric cryptography in the underlying DET as the private key MAY get in the possession of another entity other than the unmanned aircraft. See <xref target="det-gen-concern" format="default"/> for more details.</t>
        </section>
      </section>
      <section anchor="child-dime" numbered="true" toc="default">
        <name>Child DIME</name>
        <t>Handled by the Apex and RAA's. This is an endpoint that handles dynamic registration (or key roll-over) of lower-level DIMEs (RAAs to Apex and HDAs to RAAs) in the hierarchy.</t>
        <figure anchor="dime-hda-example">
          <name>Example DIME:RAA with DIME:HDA Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +---------------+
    |   DIME: HDA   |
    +--o---o--------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: RAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Self-Endorsement: HDA,
    HDA Information or
    Generic Endorsement: old HDA, new HDA
(b) Success Code,
    Broadcast Endorsement: RAA on HDA
(c) HIP RR,
    CERT RRs
(d) HDA Information
]]></artwork>
        </figure>
        <t>It should be noted that this endpoint DOES NOT hand out dynamically RAA/HDA values to systems that hit the endpoint. This is done out-of-band through processes specified by local regulations and performed by cognizant authorities. The endpoint MUST NOT accept queries it is not previously informed of being expected via mechanisms not defined in this document.</t>
        <t>It is OPTIONAL to implement this endpoint. This MAY be used to handle lower-level DIME key roll-over.</t>
        <!-- TODO: subsections for first-time registrant vs key-roller cases? -->

</section>
    </section>
    <section anchor="differentiated-access-process" numbered="true" toc="default">
      <name>Differentiated Access Process</name>
      <t>Differentiated access, as a process, is a requirement for DIMEs as defined in <xref target="RFC9153" format="default"/> by the combination of PRIV-1, PRIV-3, PRIV-4, REG-2 and REG-4. <xref target="drip-arch" format="default"/> further elaborates on the concept by citing RDAP (from <xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) as a potential means of fulfilling this requirement.</t>
      <t>Typically the cognizant authority is the primary querant of private information from a DIME if a Session ID is reported (the case of the owner of the private information is ignored for the moment). This capability MAY be delegated to other parties at the authorities discretion (be it to a single user or many), thus requiring a flexible system to delegate, determine and revoke querent access rights for information. XACML MAY be a good technology choice for this flexibility.</t>
      <t>It is noted by the authors that as this system scales the problem becomes a, well known and tricky, key management problem. While recommendations for key management are useful they are not necessarily in scope for this document as BCPs around key management should already be mandated and enforced by the cognizant authorities in their existing systems. This document instead focuses on finding a balance for generic wide-spread interoperability between DIMEs and authorities and their existing systems in a Differentiated Access Process (DAP).</t>
      <t>A system where cognizant authorities would require individual credentials to each HDA is not scalable, nor practical. Any change in policy would require the authority to interact with every single HDA (active or inactive) to grant or revoke access; this would be tedious and prone to mistakes. A single credential for a given authority is also strongly NOT RECOMMENDED due to the security concerns it would entail if it leaked.</t>
      <t>A zero-trust model would be the most appropriate for a DAP; being highly flexible and robust. Most authorities however use "oracle" based systems with specific user credentials and the oracle knowing the access rights for a given user. This would require the DAP the have some standard mechanism to locate and query a given oracle for information on the querent to determine if access is granted.</t>
      <t>DRIP has no intention to develop a new "art" of key management, instead hoping to leverage existing systems and be flexible enough to adapt as new ones become popular.</t>
    </section>
    <section anchor="drip-in-the-domain-name-system" numbered="true" toc="default">
      <name>DRIP in the Domain Name System</name>
      <t>The individual DETs may be potentially too numerous (e.g., 60 - 600M) and dynamic (e.g., new DETs every minute for some HDAs) to store in a signed, DNS zone. The HDA SHOULD provide DNS service for its zone and provide the DET detail response.</t>
      <t>DNSSEC is strongly recommended (especially for RAA-level and higher zones). Frequency of updates, size of the zone, and registry policy may impact its use.</t>
      <t>Per <xref target="drip-arch" format="default"/> all public information is stored in the DNS to satisfy REG-1 from <xref target="RFC9153" format="default"/>. CERT RRs (<xref target="cert" format="default"/>) contain public Endorsements or X.509 Certificate relevant to a given Session ID. SVR RRs (<xref target="svr" format="default"/>) point an Observer to a service to obtain further information if they have and can prove duly constituted authority.</t>
      <t>The REQUIRED mechanism is to place any information into <tt>ip6.arpa</tt> sub-zones. This zone typically contains PTR RRs, however there is no mandate that this is the only RR allowed in the zone. For DRIP this means that the HIP, CERT and SVR RRs MUST be added and use the nibble-reversed DET. The TLSA RR is RECOMMENDED for other uses cases where DTLS is used (such as in Network RID).</t>
      <t>For DRIP, the prefix <tt>2001:0030/28</tt> is slated for DETs being used in UAS as defined in <xref target="drip-rid" format="default"/>. Other prefixes may be allocated by IANA in future for different use cases that do not fit cleanly into an existing prefix.</t>
      <!-- TODO: do we point to the IANA registry or make one here? -->

<section anchor="drip-fqdn" numbered="true" toc="default">
        <name>DRIP Fully Qualified Domain Names</name>
        <section anchor="det-fqdn" numbered="true" toc="default">
          <name>DRIP Entity Tag</name>
          <t>The DET can be translated to the following FQDN form:</t>
          <ul empty="true" spacing="normal">
            <li>{hash}.{oga_id}.{hda}.{raa}.{prefix}.hhit.arpa.</li>
          </ul>
          <t>When building a DET FQDN the following two things must be done:</t>
          <ol spacing="normal" type="1"><li>The RAA, HDA and OGA ID values MUST be converted from hexadecimal to decimal form.</li>
            <li>The FQDN must be built using the exploded (all padding present) form of the IPv6 address.</li>
          </ol>
          <!-- TODO: Stu would much rather this be full HEX or full DEC - not a mix. If we did this the hash would need an unsigned long long for the value to fit -->

<t>Below is an example:</t>
          <artwork name="" type="" align="left" alt=""><![CDATA[
DET: 2001:0030:00a0:0145:a3ad:1952:0ad0:a69e
ID: a3ad:1952:0ad0:a69e
OGA: 5
HDA: 0014 = 20
RAA: 000a = 10
Prefix: 2001003
FQDN: a3ad19520ad0a69e.5.20.10.2001003.hhit.arpa.
]]></artwork>
          <ul empty="true" spacing="normal">
            <li>Note: any of the fields in the FQDN could be CNAME'd to more human readable interpretations. For example the DET FQDN <tt>204.2001003.hhit.arpa.</tt> may have a CNAME to <tt>uas.faa.gov</tt>; if RAA 204 was delegated to the FAA.</li>
          </ul>
        </section>
        <section anchor="sn-fqdn" numbered="true" toc="default">
          <name>Serial Number</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
Serial Number: 8653FZ2T7B8RA85D19LX
ICAO Mfr Code: 8653
Length Code: F
ID: FZ2T7B8RA85D19LX
FQDN: Z2T7B8RA85D19LX.8653.mfr.hhit.arpa.
]]></artwork>
          <t>Serial Number pose a unique problem. If we explicitly only allow HHITs be under the <tt>hhit.arpa.</tt> domain structure how do we standardize the lookup of Serial Numbers? Perhaps to look up Serial Numbers one must go to a different tree like <tt>mfr.icao.int.</tt>? We can have CNAMEs in MRAs for this but they probably need the same TLD (<tt>hhit.arpa.</tt>) to be found properly and these are clearly not HHITs.</t>
          <!-- Perhaps what we need is two level domain under `.arpa` - `hhit.uas.arpa.` (or `det.uas.arpa.`) and `mfr.uas.arpa.` With this system a DNAMEs would exist in `*.mfr.uas.arpa.` to translate to `*.det.uas.arpa.` when SNs are really encoded DETs or have a DET associated with them for DRIP. Otherwise its the same SVR and other RRs needed for lookup. This would also align well - with `det.uas.arpa.` could just be a CNAME of the actual IPv6 prefix.-->

<t>Serial Numbers MAY be a direct encoding of a DET (as defined in Section 4.2 of <xref target="drip-rid" format="default"/>). A Serial Number MAY also be a simple linking to a DET using a CNAME. DNAMEs (or PTRs) could be used to redirect a Serial Number that is not part of an public MRA but is instead registered by the operator to their HDA. The operator in this scenario MAY generate a DET for the Serial Number themselves - also stored in the HDA. The mapping of the Serial Number to this 'private' DET MUST NOT be made public.</t>
        </section>
      </section>
      <section anchor="supported-dns-records" numbered="true" toc="default">
        <name>Supported DNS Records</name>
        <section anchor="hip" numbered="true" toc="default">
          <name>HIP</name>
          <t>All DIMEs MUST use HIP RR <xref target="RFC8005" format="default"/> as the primary public source of DET HIs. DIMEs have their own DET associated with them and their respective name server will hold a HIP RR that is pointed to by their DET FQDN.</t>
          <t>MRA (<xref target="mra" format="default"/>) and RIDR (<xref target="ridr" format="default"/>) DIMEs will also have HIP RRs for their registered parties (aircraft and operators respectfully).</t>
        </section>
        <section anchor="tlsa" numbered="true" toc="default">
          <name>TLSA</name>
          <t>This RR, <xref target="RFC6698" format="default"/>, is mainly used to support DTLS deployments where the DET is used (e.g. Network RID and the wider UTM system). The HI is encoded using the SubjectPublicKeyInfo selector. DANE <xref target="RFC6698" format="default"/> is for servers, DANCE <xref target="dane-clients" format="default"/> is for clients.</t>
          <t>The TLSA RR MAY be used in place of the HIP RR, where to primary need of the DET HI is for DTLS authentication. This DNS server side optimization is for where the overhead of both RR is onerous. Thus all clients that work with the HIP RR SHOULD be able to able to extract the HI from the TLSA RR.</t>
        </section>
        <section anchor="cert" numbered="true" toc="default">
          <name>CERT</name>
          <t>Endorsements MAY be placed into DNS in the CERT RRs <xref target="RFC4398" format="default"/>.</t>
          <t>Endorsements will be stored in Certificate Type OID Private (value 254) with a base OID of <tt>1.3.6.1.4.1.6715.2</tt> and further classified by the Endorsement/Certificate Type and then Entities involved.</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Endorsement Type</th>
                <th align="left">OID Value</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Self-Endorsement</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Generic Endorsement</td>
                <td align="left">2</td>
              </tr>
              <tr>
                <td align="left">Concise Endorsement</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">Mutual Endorsement</td>
                <td align="left">4</td>
              </tr>
              <tr>
                <td align="left">Link Endorsement</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Broadcast Endorsement</td>
                <td align="left">6</td>
              </tr>
            </tbody>
          </table>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Entity Type</th>
                <th align="left">OID Value</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Unmanned Aircraft (UA)</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Ground Control Station (GCS)</td>
                <td align="left">2</td>
              </tr>
              <tr>
                <td align="left">Operator (OP)</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">HDA</td>
                <td align="left">4</td>
              </tr>
              <tr>
                <td align="left">RAA</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Root</td>
                <td align="left">6</td>
              </tr>
            </tbody>
          </table>
          <t>As an example the following OID: <tt>1.3.6.1.4.1.6715.2.6.4.1</tt> would decompose into: the base OID (<tt>1.3.6.1.4.1.6715.2</tt>), the Endorsement Type (<tt>6</tt>: Broadcast Endorsement) and then the parties involved (<tt>4</tt>: HDA, <tt>1</tt>: UA)</t>
          <t>Certificate Type X.509 as per PKIX (value 1) MAY be used to store X.509 certificates as discussed in (Appendix B).</t>
          <ul empty="true" spacing="normal">
            <li>Editor Note: This OID is an initial allocation under the IANA Enterprise Number OID. It is expect that a general OID will be allocated at some point.</li>
          </ul>
          <!-- TODO: in a very informal discussions with Russ Housley at IETF115 the concept of a CBOR CERT RR was not considered a terrible idea and would be more flexible than using OIDs. We should talk to Carsten about this. -->

</section>
        <section anchor="svr" numbered="true" toc="default">
          <name>SVR</name>
          <t>The SVR RR for DRIP always is populated at the "local" registry level. That is an HDA's DNS would hold the SVR RR that points to that HDAs private registry for all data it manages. This data includes data being stored on its children.</t>
          <t>The best example of this is RIDR (<xref target="ridr" format="default"/>) would have a SVR RR that points to a database that contains any extra information of a Session ID it has registered. Another example is the MRA (<xref target="mra" format="default"/>) has a SVR RR pointing to where the metadata of a UA registered in the MRA can be located.</t>
          <t>In all cases the server being pointed to MUST be protected using AAA, such as using RDAP.</t>
        </section>
      </section>
    </section>
    <section anchor="endorsements" numbered="true" toc="default">
      <name>Endorsements</name>
      <t>Under DRIP Endorsements are defined in a CDDL <xref target="RFC8610" format="default"/> structure that can be encoded to CBOR, JSON or have their keys removed and be sent as a binary blob. When the latter is used very specific forms are defined with naming conventions to know the data fields and their lengths for parsing.</t>
      <t>The first subsection defines the structure of an Endorsement while the remain subsections define specific forms that are commonly used. The binary forms of the subsections can be found in <xref target="bin-examples" format="default"/>.</t>
      <ul empty="true" spacing="normal">
        <li>Note: this section uses the term HHIT instead of DET as the Endorsements are designed to be generic and re-useable for other HHIT use-cases. Specific use-case SHOULD add new keys for each section (if required) and define the valid keys and encoding forms for their use-case.</li>
      </ul>
      <!-- TODO: do we have a iana registry with accepted keys for the various sections of endorsements? -->

<section anchor="endorsement-structure" numbered="true" toc="default">
        <name>Endorsement Structure</name>
        <figure anchor="endorsement-json">
          <name>Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
endorsement = {
  identity: {
    (hit: bstr .size 16, ? hi: bstr) // (hhit: bstr .size 16, ? hi: bstr)
    * tstr: any
  },
  evidence: bstr,
  scope: {
    vnb: number,
    vna: number,
    * tstr: any
  }
  signature: {
    sig: bstr
    * tstr: any
  }
}
]]></artwork>
        </figure>
        <section anchor="identity" numbered="true" toc="default">
          <name>Identity</name>
          <t>The <tt>identity</tt> section is where the main identity information of the signer of the Endorsement is found. The identity can take many forms such as a handle to the identity (an HHIT), and can include more explicit data such as the public key (an HI). Other keys can be provided and MUST be defined in their specific Endorsement.</t>
          <t>The length of the <tt>hi</tt> can be determined when using <tt>hhit</tt> or <tt>hi</tt> by decoding the provided IPv6 address. The prefix will inform of the ORCHID construction being used, which informs the locations of the OGA ID in the address. The OGA ID will then inform the user of the key algorithm selected which has the key length defined.</t>
        </section>
        <section anchor="evidence" numbered="true" toc="default">
          <name>Evidence</name>
          <t>The <tt>evidence</tt> section contain a byte string of evidence. Specific content of evidence (such as subfields, length and ordering) is defined in specific Endorsement structures.</t>
        </section>
        <section anchor="scope" numbered="true" toc="default">
          <name>Scope</name>
          <t>The <tt>scope</tt> section is more formally "the scope of validity of the endorsement". The scope can come in various forms but MUST always have a "valid not before" (<tt>vnb</tt>) and "valid not after" (<tt>vna</tt>) timestamps.</t>
          <t>Other forms of the scope could for example be a 4-dimensional volume definition. This could be in raw latitude, longitude, altitude pairs or may be a URI pointing to scope information.</t>
        </section>
        <section anchor="signature" numbered="true" toc="default">
          <name>Signature</name>
          <t>The <tt>signature</tt> section contain the signature data for the endorsement. The signature itself MUST be provided under the <tt>sig</tt> key. Other forms or data elements could also be present in the <tt>signature</tt> section if specified in a specific endorsement. Signatures MUST be generated using the preceding sections in their binary forms (i.e. no keys).</t>
        </section>
      </section>
      <section anchor="self-endorsement" numbered="true" toc="default">
        <name>Self-Endorsement (SE-x)</name>
        <figure anchor="se-x">
          <name>Self-Endorsement CDDL Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
self_endorsement = {
  identity: {
      hhit: bstr .size 16,
  },
  evidence": bstr,
  scope: {
      vnb: number,
      vna: number
  }
  signature: {
      sig: bstr
  }
}
]]></artwork>
        </figure>
        <t>In a Self-Endorsement the <tt>identity</tt> is a HHIT/DET and the <tt>evidence</tt> is the associate HI. The HI could be removed, resulting in an "empty" Endorsement, when obtaining the HI via other means (such as DNS) is guaranteed. This behavior is NOT RECOMMENDED as the data being signed would be very short.</t>
        <!-- TODO: do we specify HI in 'evidence' or place it in 'identity'? There is no difference when encoded and thus signed. Perhaps semantically there MUST always be evidence of some form; justifying the separation? -->

</section>
      <section anchor="endorsement" numbered="true" toc="default">
        <name>Generic Endorsement (GE-x.y)</name>
        <figure anchor="e-xy">
          <name>Endorsement CDDL Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
generic_endorsement = {
  identity: {
      hhit: bstr .size 16,
      hi: bstr
  },
  evidence": bstr,
  scope: {
      vnb: number,
      vna: number
  }
  signature: {
      sig: bstr
  }
}
]]></artwork>
        </figure>
        <t>An endorsement used to sign over evidence that is being endorsed. Typically the <tt>evidence</tt> is filled with a byte string of a Self-Endorsement (<xref target="self-endorsement" format="default"/>) of another party.</t>
      </section>
      <section anchor="concise-endorsement" numbered="true" toc="default">
        <name>Concise Endorsement (CE-x.y)</name>
        <figure anchor="ce-xy">
          <name>Concise Endorsement CDDL Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
concise_endorsement = {
  identity: {
      hhit: bstr .size 16,
  },
  evidence": bstr,
  scope: {
      vnb: number,
      vna: number
  }
  signature: {
      sig: bstr
  }
}
]]></artwork>
        </figure>
        <t>An endorsement signing over only the HHIT/DET of Y (as <tt>evidence</tt>) and the HHIT/DET of X (as <tt>identity</tt>). In constrained environments and when there is the guarantee of being able to lookup the HHITs/DETs to obtain HIs this endorsement can be used.</t>
      </section>
      <section anchor="mutual-endorsement" numbered="true" toc="default">
        <name>Mutual Endorsement (ME-x.y)</name>
        <figure anchor="me-xy">
          <name>Mutual Endorsement CDDL Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
mutual_endorsement = {
  identity: {
      hhit: bstr .size 16,
  },
  evidence": bstr,
  scope: {
      vnb: number,
      vna: number
  }
  signature: {
      sig: bstr
  }
}
]]></artwork>
        </figure>
        <t>An endorsement that perform a sign over an existing Generic Endorsement (as a byte string of <tt>evidence</tt>) where the signer is the second party of the embedded endorsement. The HHIT/DET of party Y is used as the <tt>identity</tt>.</t>
      </section>
      <section anchor="link-endorsement" numbered="true" toc="default">
        <name>Link Endorsement (LE-x.y)</name>
        <figure anchor="le-xy">
          <name>Link Endorsement CDDL Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
link_endorsement = {
  identity: {
      hhit: bstr .size 16,
  },
  evidence": bstr,
  scope: {
      vnb: number,
      vna: number
  }
  signature: {
      sig: bstr
  }
}
]]></artwork>
        </figure>
        <t>An endorsement that performs a sign over an existing Concise Endorsement (in byte string form for <tt>evidence</tt>) where the signer is the second party of the embedded endorsement. The HHIT/DET of party Y is used as the <tt>identity</tt>.</t>
      </section>
      <section anchor="broadcast-endorsement" numbered="true" toc="default">
        <name>Broadcast Endorsement (BE-x.y)</name>
        <figure anchor="be-xy">
          <name>Broadcast Endorsement CDDL Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
broadcast_endorsement = {
  identity: {
      hhit: bstr .size 16,
  },
  evidence": bstr,
  scope: {
      vnb: number,
      vna: number
  }
  signature: {
      sig: bstr
  }
}
]]></artwork>
        </figure>
        <t>This endorsement is required by DRIP Authentication Formats &amp; Protocols for Broadcast RID (<xref target="drip-auth" format="default"/>) to satisfy <xref target="RFC9153" format="default"/> GEN-1 and GEN-3 and is sent in its binary form (<xref target="bin-be" format="default"/>).</t>
        <t>The <tt>evidence</tt> is a concatenated byte string of the HHIT/DET of Y and the HI of Y in HHIT/HI order. The <tt>identity</tt> is the HHIT/DET of X.</t>
      </section>
      <section anchor="abbreviations-file-naming-conventions" numbered="true" toc="default">
        <name>Abbreviations &amp; File Naming Conventions</name>
        <t>The names of endorsements can become quite long and tedious to write out. As such this section provides a guide to a somewhat standardized way they are written in text.</t>
        <section anchor="in-text-abbreviation" numbered="true" toc="default">
          <name>In Text Abbreviation</name>
          <t>In a long form the name of a particular endorsement can be written as follows:</t>
          <ul spacing="normal">
            <li>
              <tt>Self-Endorsement: Unmanned Aircraft</tt></li>
            <li>
              <tt>Generic Endorsement: Operator on Aircraft</tt> or <tt>Generic Endorsement: Operator, Aircraft</tt></li>
          </ul>
          <t>When multiple entities are listed they can be separated by either <tt>on</tt> or by <tt>,</tt>. These long forms can be shortened:</t>
          <ul spacing="normal">
            <li>
              <tt>SE(Unmanned Aircraft)</tt> or <tt>SE-ua</tt></li>
            <li>
              <tt>GE(Operator, Unmanned Aircraft)</tt> or <tt>GE-op.ua</tt></li>
          </ul>
          <t>Typical abbreviations for the entity can be used such as <tt>Unmanned Aircraft</tt> being shorthanded to <tt>ua</tt>.</t>
        </section>
        <section anchor="file-naming" numbered="true" toc="default">
          <name>File Naming</name>
          <t>For file naming of various endorsements a similar format to the short form is used:</t>
          <ul spacing="normal">
            <li>
              <tt>se-{hash of entity}</tt></li>
            <li>
              <tt>ge-{hash of entity x}_{hash of entity y}</tt></li>
          </ul>
          <t>Some examples of file names:</t>
          <ul spacing="normal">
            <li>
              <tt>se-79d8a404d48f2ef9.cert</tt></li>
            <li>
              <tt>ge-120b8f25b198c1e1_79d8a404d48f2ef9.cert</tt></li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="x509-certificates" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <section anchor="certificate-policy-and-certificate-stores" numbered="true" toc="default">
        <name>Certificate Policy and Certificate Stores</name>
        <t>X.509 certificates are optional for the DRIP entities covered in this document.  DRIP endpoint entities (EE) (i.e., UA, GCS, and Operators) may benefit from having X.509 certificates.  Most of these certificates will be for their DET and some will be for other UAS identities.  To provide for these certificates, some of the other entities covered in this document will also have certificates to create and manage the necessary PKI structure.</t>
        <t>Any Certificate Authority (CA) supporting DRIP entities SHOULD adhere to the ICAO's International Aviation Trust Framework (IATF) Certificate Policy [ICAO-IATF-CP-draft].  The CA(s) supporting this CP MUST either be a part of the IATF Bridge PKI or part of the IATF CA Trust List.</t>
        <t>EEs may use their X.509 certificates, rather than their rawPublicKey (i.e. HI) in authentication protocols (as not all may support rawPublicKey identities).  Some EE HI may not be 'worth' supporting the overhead of X.509.  Short lived DETs like those used for a single operation or even for a day's operations may not benefit from X.509. Creating then almost immediately revoking these certificates is a considerable burden on all parts of the system.  Even using a short not AfterDate will completely mitigate the burden of managing these certificates.  That said, many EEs will benefit to offset the effort. It may also be a regulator requirement to have these certificates.</t>
        <t>Typically an HDA either does or does not issue a certificate for all its DETs. An RAA may specifically have some HDAs for DETs that do not want/need certificates and other HDAs for DETs that do need them. These types of HDAs could be managed by a single entity thus providing both environments for its customers.</t>
        <t>It is recommended that DRIP X.509 certificates be stored as DNS TLSA Resource Records.  This not only generally improves certificate lookups, but also enables use of DANE <xref target="RFC6698" format="default"/> for the various servers in the UTM and particularly DRIP registry environment and DANCE <xref target="dane-clients" format="default"/> for EEs (e.g. <xref target="drip-secure-nrid-c2" format="default"/>). All DRIP certificates MUST be available via RDAP. LDAP/OCSP access for other UTM and ICAO uses SHOULD also be provided.</t>
      </section>
      <section anchor="certificate-management" numbered="true" toc="default">
        <name>Certificate Management</name>
        <!-- TODO: this section (and its subsections) is mostly on Bob M. -->

<t>(mostly TBD still)</t>
        <t>PKIX standard X.509 issuance practices should be used. The certificate request SHOULD be included in the DET registration request. A successful DET registration then MUST include certificate creation, store, and return to the DET registrant.</t>
        <t>Certificate revocation will parallel DET revocation. TLSA RR MUST be deleted from DNS and RDAP, LDAP, and OCSP return revoked responses. CRLs SHOULD be maintained per the CP.</t>
        <t>Details of this are left out, as there are a number of approaches and further research and experience will be needed.</t>
      </section>
      <section anchor="examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>TBD</t>
      </section>
      <section anchor="alternative-certificate-encoding" numbered="true" toc="default">
        <name>Alternative Certificate Encoding</name>
        <t>(CBOR encoded certs here.  TBD)</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <!-- TODO: request hhit.arpa domain? -->

<section anchor="iana-drip-registry" numbered="true" toc="default">
        <name>IANA DRIP Registry</name>
        <section anchor="drip-endorsement-subregistries" numbered="true" toc="default">
          <name>DRIP Endorsement Subregistries</name>
          <t>This document requests a new subregistries for Endorsement Type and Entity Type under the <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-rid-28#section-8.2">DRIP registry</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>DRIP Endorsement Type:</dt>
            <dd>
  This 8-bit valued subregistry is for Endorsement Types to be used in OID's for CERT Resource Records. Future additions to this subregistry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Endorsement Type</th>
                <th align="left">Value</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Self-Endorsement</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Generic Endorsement</td>
                <td align="left">2</td>
              </tr>
              <tr>
                <td align="left">Concise Endorsement</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">Mutual Endorsement</td>
                <td align="left">4</td>
              </tr>
              <tr>
                <td align="left">Link Endorsement</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Broadcast Endorsement</td>
                <td align="left">6</td>
              </tr>
            </tbody>
          </table>
          <dl newline="false" spacing="normal">
            <dt>DRIP Entity Type:</dt>
            <dd>
  This 8-bit valued subregistry is for Entity Types to be used in OID's for CERT Resource Records. Future additions to this subregistry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Entity Type</th>
                <th align="left">Value</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Unmanned Aircraft (UA)</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Ground Control Station (GCS)</td>
                <td align="left">2</td>
              </tr>
              <tr>
                <td align="left">Operator (OP)</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">HDA</td>
                <td align="left">4</td>
              </tr>
              <tr>
                <td align="left">RAA</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Root</td>
                <td align="left">6</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="ua-info-registry" numbered="true" toc="default">
          <name>Aircraft Information Subregistry</name>
          <t>This document requests a new subregistry for aircraft information fields under the <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-rid-28#section-8.2">DRIP registry</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>Aircraft Information Fields:</dt>
            <dd>
  list of acceptable keys to be used in <tt>UA Information</tt> during a UA registration to a DIME. Future additions to this subregistry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <!-- TODO: maybe first come first served instead of expert review? -->

<table align="center">
            <thead>
              <tr>
                <th align="left">Key Name</th>
                <th align="left">Type</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">length</td>
                <td align="left">float</td>
                <td align="left">length, in millimeters</td>
              </tr>
              <tr>
                <td align="left">width</td>
                <td align="left">float</td>
                <td align="left">width, in millimeters</td>
              </tr>
              <tr>
                <td align="left">height</td>
                <td align="left">float</td>
                <td align="left">height, in millimeters</td>
              </tr>
              <tr>
                <td align="left">constructionMaterial</td>
                <td align="left">tstr</td>
                <td align="left">materials, comma separated if multiple</td>
              </tr>
              <tr>
                <td align="left">color</td>
                <td align="left">tstr</td>
                <td align="left">colors, comma separated if multiple</td>
              </tr>
              <tr>
                <td align="left">serial</td>
                <td align="left">tstr</td>
                <td align="left">ANSI CTA 2063-A Serial Number</td>
              </tr>
              <tr>
                <td align="left">manufacturer</td>
                <td align="left">tstr</td>
                <td align="left">manufacturer name</td>
              </tr>
              <tr>
                <td align="left">make</td>
                <td align="left">tstr</td>
                <td align="left">aircraft make</td>
              </tr>
              <tr>
                <td align="left">model</td>
                <td align="left">tstr</td>
                <td align="left">aircraft model</td>
              </tr>
              <tr>
                <td align="left">dryWeight</td>
                <td align="left">float</td>
                <td align="left">weight of aircraft with no payloads</td>
              </tr>
              <tr>
                <td align="left">numRotors</td>
                <td align="left">int</td>
                <td align="left">Number of rotators</td>
              </tr>
              <tr>
                <td align="left">propLength</td>
                <td align="left">float</td>
                <td align="left">Length of props, in centimeters</td>
              </tr>
              <tr>
                <td align="left">numBatteries</td>
                <td align="left">int</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">batteryCapacity</td>
                <td align="left">float</td>
                <td align="left">in milliampere hours</td>
              </tr>
              <tr>
                <td align="left">batteryWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">batteryVoltage</td>
                <td align="left">float</td>
                <td align="left">in volts</td>
              </tr>
              <tr>
                <td align="left">batteryChemistry</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">maxTakeOffWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">maxPayloadWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">maxFlightTime</td>
                <td align="left">float</td>
                <td align="left">in minutes</td>
              </tr>
              <tr>
                <td align="left">minOperatingTemp</td>
                <td align="left">float</td>
                <td align="left">in Celsius</td>
              </tr>
              <tr>
                <td align="left">maxOperatingTemp</td>
                <td align="left">float</td>
                <td align="left">in Celsius</td>
              </tr>
              <tr>
                <td align="left">ipRating</td>
                <td align="left">tstr</td>
                <td align="left">standard IP rating</td>
              </tr>
              <tr>
                <td align="left">engineType</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">fuelType</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">fuelCapacity</td>
                <td align="left">float</td>
                <td align="left">in liters</td>
              </tr>
              <tr>
                <td align="left">previousSerial</td>
                <td align="left">tstr</td>
                <td align="left">legacy serial number(s)</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During key rollover the DIME MUST inform all children and parents of the change - using best standard practices of a key rollover. At time of writing this is signing over the new key with the previous key in a secure fashion and it being validated by others before changing any links (in DRIPs case the NS RRs in the parent registry).</t>
        <t>A DET has a natural ability for a single DIME to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute of the DET to have different identities could also allow for a single registry to be "federated" across them if they share the same HID value. This method of deployment has not been thoroughly studied at this time. An endpoint such as in <xref target="child-dime" format="default"/> is a possible place to have these functions.</t>
      </section>
      <section anchor="det-gen-concern" numbered="true" toc="default">
        <name>DET Generation</name>
        <t>Under the FAA <xref target="NPRM" format="default"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>
        <t>Option 1:</t>
        <ul empty="true" spacing="normal">
          <li>The entity generates its own DET, discovering and using the RAA and HDA for the target registry. The method for discovering a registry's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the registry to be accepted (thus generating the required Self-Endorsement) or denied.</li>
        </ul>
        <t>Option 2:</t>
        <ul empty="true" spacing="normal">
          <li>The entity sends to the registry its HI for it to be hashed and result in the DET. The registry would then either accept (returning the DET to the device) or deny this pairing.</li>
        </ul>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations and connectivity it is acceptable, though not recommended, under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft. The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
      </section>
    </section>
    <section anchor="contributors" numbered="true" toc="default">
      <name>Contributors</name>
      <t>Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT Consulting, LLC) for their early work on the DRIP registries concept. Their early contributions laid the foundations for the content and processes of this architecture and document. Bob Moskowitz is also instrumental in the PKIX work defined in this document with his parallel work in ICAO.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9153" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card">
              <organization/>
            </author>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter">
              <organization/>
            </author>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz">
              <organization/>
            </author>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="drip-arch" target="https://www.ietf.org/archive/id/draft-ietf-drip-arch-29.txt">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Shuai Zhao" initials="S." surname="Zhao">
              <organization>Intel</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="16" month="August" year="2022"/>
            <abstract>
              <t>   This document describes an architecture for protocols and services to
   support Unmanned Aircraft System (UAS) Remote Identification (RID)
   and tracking, plus UAS RID-related communications.  This architecture
   adheres to the requirements listed in the DRIP Requirements document
   (RFC9153).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-arch-29"/>
        </reference>
        <reference anchor="drip-rid" target="https://www.ietf.org/archive/id/draft-ietf-drip-uas-rid-01.txt">
          <front>
            <title>UAS Remote ID</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="9" month="September" year="2020"/>
            <abstract>
              <t>   This document describes the use of Hierarchical Host Identity Tags
   (HHITs) as a self-asserting and thereby trustable Identifier for use
   as the UAS Remote ID.  HHITs include explicit hierarchy to provide
   Registrar discovery for 3rd-party ID attestation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-uas-rid-01"/>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author fullname="C. Vigano" initials="C." surname="Vigano">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC4398" target="https://www.rfc-editor.org/info/rfc4398">
          <front>
            <title>Storing Certificates in the Domain Name System (DNS)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <date month="March" year="2006"/>
            <abstract>
              <t>Cryptographic public keys are frequently published, and their authenticity is demonstrated by certificates.  A CERT resource record (RR) is defined so that such certificates and related certificate revocation lists can be stored in the Domain Name System (DNS).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4398"/>
          <seriesInfo name="DOI" value="10.17487/RFC4398"/>
        </reference>
        <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository.  Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects.  This document includes a protocol specification, an object mapping template, and an XML media type registration.  This document obsoletes RFC 4930.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
          <front>
            <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <author fullname="B. Ellacott" initials="B." surname="Ellacott">
              <organization/>
            </author>
            <author fullname="N. Kong" initials="N." surname="Kong">
              <organization/>
            </author>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP).  It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP).  RDAP is a successor protocol to the very old WHOIS protocol.  The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="7480"/>
          <seriesInfo name="DOI" value="10.17487/RFC7480"/>
        </reference>
        <reference anchor="RFC8005" target="https://www.rfc-editor.org/info/rfc8005">
          <front>
            <title>Host Identity Protocol (HIP) Domain Name System (DNS) Extension</title>
            <author fullname="J. Laganier" initials="J." surname="Laganier">
              <organization/>
            </author>
            <date month="October" year="2016"/>
            <abstract>
              <t>This document specifies a resource record (RR) for the Domain Name System (DNS) and how to use it with the Host Identity Protocol (HIP). This RR allows a HIP node to store in the DNS its Host Identity (HI), the public component of the node public-private key pair; its Host Identity Tag (HIT), a truncated hash of its public key (PK); and the domain names of its rendezvous servers (RVSs).  This document obsoletes RFC 5205.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8005"/>
          <seriesInfo name="DOI" value="10.17487/RFC8005"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <author fullname="T. Narten" initials="T." surname="Narten">
              <organization/>
            </author>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
          <front>
            <title>Registration Data Access Protocol (RDAP) Query Format</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns.  These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9082"/>
          <seriesInfo name="DOI" value="10.17487/RFC9082"/>
        </reference>
        <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
          <front>
            <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs).  These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9083"/>
          <seriesInfo name="DOI" value="10.17487/RFC9083"/>
        </reference>
        <reference anchor="CTA2063A" target="https://shop.cta.tech/products/small-unmanned-aerial-systems-serial-numbers">
          <front>
            <title>ANSI/CTA 2063-A Small Unmanned Aerial Systems Numbers</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="drip-auth" target="https://www.ietf.org/archive/id/draft-ietf-drip-auth-26.txt">
          <front>
            <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="14" month="October" year="2022"/>
            <abstract>
              <t>   This document describes how to add trust into the Broadcast Remote ID
   (RID) specification discussed in the DRIP Architecture; first trust
   in the RID ownership and second in the source of the RID messages.
   It defines message types and associated formats (sent within the
   Authentication Message) that can be used to authenticate past
   messages sent by an unmanned aircraft (UA) and provide proof of UA
   trustworthiness even in the absence of Internet connectivity at the
   receiving node.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-26"/>
        </reference>
        <reference anchor="drip-secure-nrid-c2" target="https://www.ietf.org/archive/id/draft-moskowitz-drip-secure-nrid-c2-11.txt">
          <front>
            <title>Secure UAS Network RID and C2 Transport</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="23" month="July" year="2022"/>
            <abstract>
              <t>   This document defines a transport mechanism for Unmanned Aircraft
   System (UAS) Network Remote ID (Net-RID).  The Broadcast Remote ID
   (B-RID) messages can be sent directly over UDP or via a more
   functional protocol using CoAP/CBOR for the Net-RID messaging.  This
   is secured via either HIP/ESP or DTLS.  HIP/ESP or DTLS secure
   messaging Command-and-Control (C2) for is also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-secure-nrid-c2-11"/>
        </reference>
        <reference anchor="dane-clients" target="https://www.ietf.org/archive/id/draft-ietf-dance-client-auth-01.txt">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <author fullname="Ash Wilson" initials="A." surname="Wilson">
              <organization>Valimail</organization>
            </author>
            <date day="8" month="November" year="2022"/>
            <abstract>
              <t>   The DANE TLSA protocol [RFC6698] [RFC7671] describes how to publish
   Transport Layer Security (TLS) server certificates or public keys in
   the DNS.  This document updates RFC 6698 and RFC 7671.  It describes
   how to additionally use the TLSA record to publish client
   certificates or public keys, and also the rules and considerations
   for using them with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-01"/>
        </reference>
        <reference anchor="NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="bin-examples" numbered="true" toc="default">
      <name>Binary Endorsements</name>
      <section anchor="bin-se" numbered="true" toc="default">
        <name>Self-Endorsement (SE-x)</name>
        <figure anchor="bin-se-x">
          <name>Binary Self-Endorsement (Length: 120-bytes)</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                              DRIP                             |
|                           Entity Tag                          |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                          Host Identity                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                        Valid Not Before                       |
+---------------+---------------+---------------+---------------+
|                        Valid Not After                        |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

DRIP Entity Tag: 16-bytes
Host Identity: 32-bytes
Valid Not Before: 4-bytes
Valid Not After: 4-bytes
Signature: 64-bytes
]]></artwork>
        </figure>
      </section>
      <section anchor="bin-e" numbered="true" toc="default">
        <name>Generic Endorsement (GE-x.y)</name>
        <figure anchor="bin-e-xy">
          <name>Binary Generic Endorsement (Length: 240-bytes)</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                       Host Identity of X                      |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SE-y                              .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Valid Not Before by X                     |
+---------------+---------------+---------------+---------------+
|                     Valid Not After by X                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

DRIP Entity Tag of X: 16-bytes
Host Identity: 32-bytes
SE-y: 120-bytes
Valid Not Before by X: 4-bytes
Valid Not After by X: 4-bytes
Signature by X: 64-bytes
]]></artwork>
        </figure>
      </section>
      <section anchor="bin-ce" numbered="true" toc="default">
        <name>Concise Endorsement (CE-x.y)</name>
        <figure anchor="bin-ce-xy">
          <name>Binary Concise Endorsement (Length: 104-bytes)</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Valid Not Before by X                     |
+---------------+---------------+---------------+---------------+
|                     Valid Not After by X                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

DRIP Entity Tag of X: 16-bytes
DRIP Entity Tag of Y: 16-bytes
Valid Not Before by X: 4-bytes
Valid Not After by X: 4-bytes
Signature by X: 64-bytes
]]></artwork>
        </figure>
      </section>
      <section anchor="bin-me" numbered="true" toc="default">
        <name>Mutual Endorsement (ME-x.y)</name>
        <figure anchor="bin-m-xy">
          <name>Binary Mutual Endorsement (Length: 328-bytes</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                            GE-x.y                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Valid Not Before by Y                     |
+---------------+---------------+---------------+---------------+
|                     Valid Not After by Y                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Y                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

DRIP Entity Tag of Y: 16-bytes
GE-x.y: 16-bytes
Valid Not Before by Y: 4-bytes
Valid Not After by Y: 4-bytes
Signature by Y: 64-bytes
]]></artwork>
        </figure>
      </section>
      <section anchor="bin-le" numbered="true" toc="default">
        <name>Link Endorsement (LE-x.y)</name>
        <figure anchor="bin-le-xy">
          <name>DRIP Link Endorsement (Length: 192-bytes)</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                            CE-x.y                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Valid Not Before by Y                     |
+---------------+---------------+---------------+---------------+
|                     Valid Not After by Y                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Y                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

DRIP Entity Tag of Y: 16-bytes
CE-x.y: 16-bytes
Valid Not Before by Y: 4-bytes
Valid Not After by Y: 4-bytes
Signature by Y: 64-bytes
]]></artwork>
        </figure>
      </section>
      <section anchor="bin-be" numbered="true" toc="default">
        <name>Broadcast Endorsement (BE-x.y)</name>
        <figure anchor="bin-be-xy">
          <name>DRIP Broadcast Endorsement (Length: 136-bytes)</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                       Host Identity of Y                      |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Valid Not Before by X                     |
+---------------+---------------+---------------+---------------+
|                     Valid Not After by X                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

DRIP Entity Tag of X: 16-bytes
DRIP Entity Tag of Y: 16-bytes
Host Identity of Y: 32-bytes
Valid Not Before by X: 4-bytes
Valid Not After by X: 4-bytes
Signature by X: 64-bytes
]]></artwork>
        </figure>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
