<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-05" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="DRIP Registries">DRIP Entity Tag (DET) Registration &amp; Lookup</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-05"/>
    <author initials="A." surname="Wiethuechter (Editor)" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="S." surname="Card" fullname="Stuart Card">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street/>
          <city>Oak Park</city>
          <region>MI</region>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2022" month="July" day="11"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document details the required mechanisms for the registration and discovery of DRIP Entity Tags (DETs). The registration process relies upon the Extensible Provisioning Protocol (EPP). The discovery process leverages DNS, DNSSEC, and related technology. The lookup process relies upon the Registration Data Access Protocol (RDAP). The DETs can be registered with as their "raw public keys" or in X.509 certificates.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to Remote ID (RID). Only very limited operational information can be Broadcast, but extended information is sometimes needed. The most essential element of information sent is the UAS ID itself, the unique key for lookup of extended information in registries.</t>
      <t>While it is expected that registry functions will be integrated with USS, who will provide them is not yet determined in most, and is expected to vary between, jurisdictions. However this evolves, the essential registry functions, starting with management of identifiers, are expected to remain the same, so are specified herein.</t>
      <t>While most data to be sent via Broadcast or Network RID is public, much of the extended information in registries will be private. Thus AAA for registries is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose, etc. As specific AAA requirements will vary by jurisdictional regulation, provider philosophy, customer demand, etc., they are left to specification in policies, which should be human readable to facilitate analysis and discussion, and machine readable to enable automated enforcement, using a language amenable to both, e.g., XACML.</t>
      <t>The intent of the negative and positive access control requirements on registries is to ensure that no member of the public would be hindered from accessing public information, while only duly authorized parties would be enabled to access private information. Mitigation of Denial of Service attacks and refusal to allow database mass scraping would be based on those behaviors, not on identity or role of the party submitting the query per se, but querant identity information might be gathered (by security systems protecting DRIP implementations) on such misbehavior.</t>
      <t>Registration under DRIP is vital to manage the inevitable collisions in the hash portion of the DET. Forgery of the DET is still possible, but including it as a part of a public registration mitigates this risk. This document creates the DRIP DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., RAA, HDA, UA, GCS, USS).  The registration process will use the Extensible Provisioning Protocol (EPP) and other protocols.  The discovery process will leverage DNS and DNSSEC and related technology.  The DETs can be registered with as their "raw public keys" or in X.509 certificates.</t>
      <section anchor="abstract-process-reasoning" numbered="true" toc="default">
        <name>Abstract Process &amp; Reasoning</name>
        <t>In DRIP each entity (registry, operator and aircraft) is expected to generate a full DRIP Entity ID <xref target="drip-rid" format="default"/> on the local device their key is expected to be used. These are registered with a Public Information Registry within the hierarchy along with whatever data is required by the cognizant CAA and the registry. Any PII is stored in a Private Information Registry protected through industry practice AAA or better. In response, the entity will obtain an attestation or certificate from the registry proving such registration.</t>
        <t>Manufacturers that wish to participate in DRIP should not only support DRIP as a Session ID type for their aircraft but also generate a DET then encode it as a Serial Number. This would allow aircraft under CAA mandates to fly only ID Type 1 (Serial Number) could still use DRIP and most of its benefits. Even if DRIP is not supported for Serial Numbers by a Manufacturer it is hoped that they would still run a registry to store their Serial Numbers and allow look ups for generic model information. This look up could be especially helpful in UTM for Situational Awareness when an aircraft flying with a Serial Number is detected and allow for an aircraft profile to be displayed.</t>
        <t>Operators are registered with a number of registries or their regional RAA. This acts as a verification check when a user performs other registration operations; such as provisioning an aircraft with a new Session ID. It is an open question if an Operator registers to their CAA (the RAA) or multiple USS's (HDA's). PII of the Operator would vary based on the CAA they are under and the registry.</t>
        <t>Finally aircraft that support using a DET would provision per flight to a USS, proposing a DET to the registry to generate a binding between the aircraft (Session ID, Serial Number and Operational Intent), operator and registry. Aircraft then follow <xref target="drip-auth" format="default"/> to meet various <xref target="drip-requirements" format="default"/> during flight.</t>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="definitions" numbered="true" toc="default">
        <name>Definitions</name>
        <t>See <xref target="drip-requirements" format="default"/> for common DRIP terms.</t>
        <dl newline="false" spacing="normal">
          <dt>HDA:</dt>
          <dd>
  Hierarchial HIT Domain Authority. The 16 bit field identifying the HIT Domain Authority under a RAA.</dd>
          <dt>HID:</dt>
          <dd>
  Hierarchy ID. The 32 bit field providing the HIT Hierarchy ID.</dd>
          <dt>RAA:</dt>
          <dd>
  Registered Assigning Authority. The 16 bit field identifying the Hierarchical HIT Assigning Authority.</dd>
        </dl>
      </section>
    </section>
    <section anchor="registries" numbered="true" toc="default">
      <name>Registries</name>
      <section anchor="classes" numbered="true" toc="default">
        <name>Classes</name>
        <t>Under DRIP there 3 classes of registries, with specific variants in each.</t>
        <figure anchor="reg-class-fig">
          <name>Registry Hierarchy</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
                +----------+
                |   Root   | 
                +-o------o-+
                  |      |
******************|******|*****************************
                  |      |
            +-----o-+  +-o-----+
RAAs        |  IRM  |  |  RAA  o------.
            +---o---+  +---o---+      '
                |          |          |
****************|**********|**********|****************
                |          |          |
            +---o---+  +---o---+  +---o---+
HDAs        |  MRA  |  | RIDR  |  |  HDA  |
            +-------+  +-------+  +-------+
]]></artwork>
        </figure>
        <!-- Author Note (atw): above figure should match docs/registry-diagram.png -->

<section anchor="root" numbered="true" toc="default">
          <name>Root</name>
          <t>This is a special registry holding the RAA value of 0 and HDA value of 0. It delegates out RAA values only to registries that wish to act as an RAA.</t>
          <!-- Author Note (atw): we contemplate ICAO running this server or a federation of them -->

</section>
        <section anchor="raa" numbered="true" toc="default">
          <name>Registered Assigning Authorities</name>
          <t>RAA's are the upper hierarchy in DRIP (denoted by a 14-bit field (16,384 RAAs) of a DET). An RAA is a business or organization that manages a registry of HDAs (<xref target="hda" format="default"/>). Most are contemplated to be Civil Aviation Authorities (CAA), such as the Federal Aviation Authority (FAA), that then delegate HDAs to manage their NAS. This is does not preclude other entities to operate an RAA if the Root server allows it.</t>
          <t>The ICAO registration process will be available from ICAO. Once ICAO accepts an RAA, it will assign a number and create a zone delegation under the <tt>uas.icao.int.</tt> DNS zone for the RAA.</t>
          <t>As DETs may be used in many different domains, RAA should be allocated in blocks with consideration on the likely size of a particular usage. Alternatively, different prefixes can be used to separate different domains of use of HHITs.</t>
          <t>An RAA must provide a set of services to allocate HDAs to organizations. It must have a public policy on what is necessary to obtain an HDA. It must maintain a DNS zone minimally for discovering HID RVS servers. All RAA's use an HDA value of 0 and have their RAA value delegated to them by the Root.</t>
          <section anchor="irm" numbered="true" toc="default">
            <name>ICAO Registry of Manufacturer's (IRM)</name>
            <t>An RAA-level registry that hands out HDA values to participating Manufacturer's that hold an ICAO Manufacturer Code used in ANSI CTA2063-A Serial Numbers.</t>
            <t>It is holds the RAA value of 1 and HDA value of 0.</t>
            <!-- Author Note (atw): we contemplate ICAO running this server or a federation of them -->

</section>
        </section>
        <section anchor="hda" numbered="true" toc="default">
          <name>Hierarchial HIT Domain Authorities</name>
          <t>An HDA may be an USS, ISP, or any third party that takes on the business to register the actual UAS entities that need DETs.  This includes, but is not limited to UA, GCS, and Operators. It should also provide needed UAS services including those required for HIP-enabled devices (e.g. RVS).</t>
          <t>The HDA is a 14-bit field (16,384 HDAs per RAA) of a DET assigned by an RAA.  An HDA should maintain a set of RVS servers for UAS clients that may use HIP.  How this is done and scales to the potentially millions of customers are outside the scope of this document. This service should be discoverable through the DNS zone maintained by the HDA's RAA.</t>
          <t>An RAA may assign a block of values to an individual organization. This is completely up to the individual RAA's published policy for delegation. Such policy is out of scope.</t>
          <section anchor="mra" numbered="true" toc="default">
            <name>Manufacturer's Registry of Aircraft (MRA)</name>
            <t>An HDA-level registry run by a manufacturer of UAS systems that participate in Remote ID. Stores UAS Serial Numbers under a specific ICAO Manufacturer Code (assigned to the manufacturer by ICAO).</t>
            <t>A DET can be encoded into a Serial Number (see <xref target="drip-rid" format="default"/>) and this registry would hold a mapping from the Serial Number to the DET and its artifacts.</t>
            <t>Hold RAA value of 1 and HDA values of 1+.</t>
          </section>
          <section anchor="ridr" numbered="true" toc="default">
            <name>Remote ID Registries (RIDR)</name>
            <t>An HDA-level registry that holds the binding between a UAS Session ID (for DRIP the DET) and the UA Serial Number. The Serial Number MUST have its access protected to allow only authorized parties to obtain. The Serial Number SHOULD be encrypted in a way only the authorized party can decrypt.</t>
            <t>As part of the UTM system they also hold a binding between a UAS ID (Serial Number or Session ID) and an Operational Intent.</t>
            <!-- Author Note (atw): these are contemplated to be part of a USS as a function or a standalone SDSP in the UTM system -->

<t>Hold RAA values of 2+ and HDA values of 1+.</t>
          </section>
        </section>
      </section>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During key rollover the entity MUST inform all children and parents of the change - using best standard practices of a key rollover. At time of writing this is signing over the new key with the previous key in a secure fashion and it being validated by others before changing any links (in DRIPs case the NS RRs in the parent registry).</t>
        <t>A DET has a natural ability for a single entity to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute of the DET to have different identities could also allow for a single registry to be "federated" across them if they share the same HID value. This method of deployment has not been thoroughly studied at this time.</t>
        <!-- Author Note (atw): does someone want to explore this option of federating across multiple DETs with same HID? -->

</section>
    </section>
    <section anchor="drip-fully-qualified-domain-names" numbered="true" toc="default">
      <name>DRIP Fully Qualified Domain Names</name>
      <t>Under DRIP there are a number of FQDN forms used to allow lookups to take place.</t>
      <t>The individual DETs may be potentially too numerous (e.g., 60 - 600M) and dynamic (e.g., new DETs every minute for some HDAs) to store in a signed, DNS zone. The HDA SHOULD provide DNS service for its zone and provide the DET detail response.</t>
      <t>DNSSEC is strongly recommended (especially for RAA-level zones). Frequency of updates, size of the zone, and registry policy may impact its use.</t>
      <section anchor="icao-dns-structure" numbered="true" toc="default">
        <name>ICAO DNS Structure</name>
        <t>Under the TSVG ICAO panel, the GRAIN task group has discussed a DNS structure, with DRIP proposing to fit into it as follows:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
                                .icao
                                  |
                                  |
    .---------------------------.iatf--------------------------.
    |                             |                            |
    |                             |                            |
.aircraft            .----------.uas----------.             .fixed
    |                |            |           |                |
    |                |            |           |                |
.[airline]         .[uss]       .mfr        .det          .[iatf-member]
    |                |            |           |                |
    |                |            |           |                |
.[tail-number]    .[uasrid]      ...         ...            .[node-name]
]]></artwork>
        <t>Example DET FQDN: <tt>a3ad19520ad0a69e.5.20.10.20010030.det.uas.iatf.icao</tt></t>
        <t>Example MFR FQDN: <tt>Z2T7B8RA85D19LX.8653.mfr.uas.iatf.icao</tt></t>
      </section>
      <section anchor="sn-fqdn" numbered="true" toc="default">
        <name>Serial Number</name>
        <t>See Section 4.2 of <xref target="drip-rid" format="default"/> for how to encode DETs as Serial Numbers.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Serial Number: 8653FZ2T7B8RA85D19LX
ICAO Mfr Code: 8653
Length Code: F
ID: FZ2T7B8RA85D19LX
FQDN: Z2T7B8RA85D19LX.8653.mfr.uas.icao.int
]]></artwork>
      </section>
      <section anchor="det-fqdn" numbered="true" toc="default">
        <name>DET</name>
        <t>DETs SHOULD be discoverable in DNS via a hash.oga.hda.raa.prefix. structure under a ICAO managed DNS aviation tree. This document proposes a .det.uas.icao.int. branch in the current ICAO DNS domain. This is subject of discussions with ICAO. Thus if we assume a DET prefix of 2001:30::/28, the following example shows the resultant DNS entry:</t>
        <!-- TODO(atw): fix orchid construction in example code and place new FQDN -->

<artwork name="" type="" align="left" alt=""><![CDATA[
DET: 2001:0030:00a0:0145:a3ad:1952:0ad0:a69e
ID: a3ad:1952:0ad0:a69e
OGA: 5
HDA: 0014 = 20
RAA: 000a = 10
Prefix: 20010030
FQDN: a3ad19520ad0a69e.5.20.10.20010030.det.uas.icao.int
]]></artwork>
        <t>When building a DET FQDN the following two things must be done:</t>
        <ol spacing="normal" type="1"><li>The RAA and HDA values MUST be converted from hexadecimal to decimal form.</li>
          <li>The FQDN must be built using the expanded form of the IPv6 address.</li>
        </ol>
        <t>The prefix is included in the FQDN form to support other potential prefixes being used.</t>
        <!-- Author Note (atw): we need a section detailing the potential prefixes to be seen and from whom and why we would want to support such a thing -->
<!-- Author Note (atw): need a section on different TLDs supported - uas.icao.int, remoteid.aero, rid.aero? -->

</section>
      <section anchor="reverse-det" numbered="true" toc="default">
        <name>Reverse DET</name>
        <t>The DET reverse lookup should be a standard IPv6 reverse address in ip6.arpa.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
$ORIGIN  5.4.1.0.0.a.0.0.0.3.0.0.1.0.0.2.ip6.arpa.
e.9.6.a.0.d.a.0.2.5.9.1.d.a.3.a    IN   PTR
]]></artwork>
      </section>
    </section>
    <section anchor="supported-dns-records" numbered="true" toc="default">
      <name>Supported DNS Records</name>
      <t>DRIP requires a number of resource records, some specific to certain registries to function.</t>
      <section anchor="hip-rr" numbered="true" toc="default">
        <name>HIP RR</name>
        <t>All registries will use HIP RR <xref target="RFC8005" format="default"/> as the primary public source of DET HIs. The DETs are encoded (Section 4.2) in an FQDN and are the lookup key for the RR. Registries have their own DET associated with them and their respective DNS server will hold a HIP RR that is pointed to by their DET FQDN.</t>
        <t>MRA and RIDR servers will also have HIP RRs for their registered parties (aircraft and operators).</t>
      </section>
      <section anchor="tlsa-rr" numbered="true" toc="default">
        <name>TLSA RR</name>
        <t>This RR, <xref target="RFC6698" format="default"/>, is mainly used to support DTLS deployments where the DET is used (e.g. Network RID and the wider UTM system). The HI is encoded using the SubjectPublicKeyInfo selector. DANE <xref target="RFC6698" format="default"/> is for servers, DANCE <xref target="dane-clients" format="default"/> is for clients.</t>
        <t>The TLSA RR MAY be used in place of the HIP RR, where to primary need of the DET HI is for DTLS authentication. This DNS server side optimization is for where the overhead of both RR is onerous. Thus all clients that work with the HIP RR SHOULD be able to able to extract the HI from the TLSA RR.</t>
      </section>
      <section anchor="cert-rr" numbered="true" toc="default">
        <name>CERT RR</name>
        <t>Attestations can be placed into DNS in the CERT RRs <xref target="RFC4398" format="default"/>. An exception to this is the Attestation Certificate made during Session ID registration.  This is as this particular certificate acts similar to a car registration and should be held safe by the operator.</t>
        <t>Attestations will be stored in Certificate Type OID Private (value 254) with an OID of 1.3.6.1.4.1.6715.2.n, where n is the Attestation Type.</t>
        <t>Editor Note: This OID is an initial allocation under the IANA Enterprise Number OID. It is expect that a general OID will be allocated at some point.</t>
        <t>Certificate Type X.509 as per PKIX (value 1) MAY be used to store X.509 certificates as discussed in (Appendix B).</t>
        <t>Editor Note: Have not gotten to the part in this draft where Attestation Type, above is defined and enumerated. Obviously this is needed.</t>
      </section>
      <section anchor="ns-rr" numbered="true" toc="default">
        <name>NS RR</name>
        <!-- TODO(atw) get rfc reference -->

<t>Along with their associated "glue" record (A/AAAA) supports the traversal in DNS across the tree.</t>
        <ol spacing="normal" type="1"><li>
            <tt>&lt;mfr.remoteid.aero&gt;</tt> on Root points to specific DET FQDN of IRM</li>
          <li>
            <tt>&lt;icao_mfr_code&gt;.mfr.remoteid.aero</tt> on IRM points to specific DET FQDN of MRA</li>
          <li>
            <tt>&lt;raa_value&gt;.det.remoteid.aero</tt> on Root pointing to DET FQDN of matching RAA</li>
          <li>
            <tt>&lt;hda_value&gt;.&lt;raa_value&gt;.det.remoteid.aero</tt> on RAA pointing to DET FQDN of matching HDA</li>
        </ol>
        <t>Editor Note: <tt>.areo</tt> works as a placeholder for now, but we are working with ICAO for this to at least be under <tt>uas.icao.int.</tt> and their TLD that they are working to get in the next ICANN TLD round. GRAIN already lists and uses <tt>uas.icao.int.</tt>. Perhaps we use <tt>det.uas.icao.int.</tt> for all DRIP DNS structures.</t>
      </section>
      <section anchor="aaaa-rr" numbered="true" toc="default">
        <name>AAAA RR</name>
        <!-- TODO(atw) get rfc reference -->

<t>DRIP requires the use of IPv6.</t>
      </section>
      <section anchor="svr-rr" numbered="true" toc="default">
        <name>SVR RR</name>
        <!-- TODO(atw) get rfc reference -->

<t>The SVR RR for DRIP always is populated at the "local" registry level. That is an HDA's DNS would hold the SVR RR that points to that HDAs private registry for all data it manages. This data includes data being stored on its children.</t>
        <t>The best example of this is RIDR would have a SVR RR that points to a database that contains any extra information of a Session ID it has registered. Another example is the MRA has a SVR RR pointing to where the metadata of a UA registered in the MRA can be located.</t>
        <t>In all cases the server being pointed to MUST be protected using AAA, specifically using RDAP.</t>
      </section>
    </section>
    <section anchor="registry-operations" numbered="true" toc="default">
      <name>Registry Operations</name>
      <t>As a general rule the following processing performed for any registration operation:</t>
      <ol spacing="normal" type="1"><li>Verify input Attestations from registering party</li>
        <li>Check for collision of DET and HI</li>
        <li>Populate DNS with required/optional records</li>
        <li>Populate Database with PII and other info</li>
        <li>Generate and return required/optional Attestations/Certificates</li>
      </ol>
      <section anchor="registering-a-registry" numbered="true" toc="default">
        <name>Registering a Registry</name>
        <t>DRIP defines two levels of hierarchy maintained by the Registration Assigning Authority (RAA) and HHIT Domain Authority (HDA). The authors anticipate that an RAA is owned and operated by a regional CAA (or a delegated party by an CAA in a specific airspace region) with HDAs being contracted out. As such a chain of trust for registries is required to ensure trustworthiness is not compromised. More information on the registries can be found in <xref target="hhit-registries" format="default"/>.</t>
        <!-- Author Note (atw): is the hhit-registries draft and reference needed anymore? -->

<t>Both the parent and child generate their own keypairs and self-signed attestations if not generated previously. The child sends to the parent its self-signed attestation to be added into the parent DNS.</t>
        <t>The parent confirms the attestation received is valid and that no DET collisions occur before adding a NS RR (and CERT RRs) to its DNS for the new child. An attestation, parent on child, is sent as a confirmation that provisioning was successful.</t>
        <t>The child is now a valid member of the registry tree and uses its keypair and Self-Attestation with all provisioning requests towards it. The HIP RR for the child is populated into the local DNS along with any CERT RRs.</t>
        <section anchor="registering-an-raa" numbered="true" toc="default">
          <name>Registering an RAA</name>
          <t>Specifically handled by the Root (<xref target="root" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of RAA</td>
                <td align="left">Root: <tt>&lt;raa_value&gt;.det.remoteid.aero NS &lt;raa_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: Root, RAA</td>
              </tr>
              <tr>
                <td align="left">RAA Self-Attestation</td>
                <td align="left">Root: <tt>&lt;raa_det_fqdn&gt; AAAA &lt;raa_ip&gt;</tt></td>
                <td align="left">(Concise Attestation: Root, RAA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">RAA: <tt>&lt;raa_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">(Broadcast Attestation: Root, RAA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;raa_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;raa_det_fqdn&gt; CERT &lt;attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;raa_det_fqdn&gt; CERT &lt;concise_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;raa_det_fqdn&gt; CERT &lt;broadcast_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;concise_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;raa_det_fqdn&gt; CERT &lt;broadcast_attestation_root_raa&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="registering-an-irm" numbered="true" toc="default">
          <name>Registering an IRM</name>
          <t>Specifically handled by the Root (<xref target="root" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of IRM</td>
                <td align="left">Root: <tt>mfr.remoteid.aero NS &lt;irm_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: Root, IRM</td>
              </tr>
              <tr>
                <td align="left">IRM Self-Attestation</td>
                <td align="left">Root: <tt>1.det.remoteid.aero NS &lt;irm_det_fqdn&gt;</tt></td>
                <td align="left">(Concise Attestation: Root, IRM)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">Root: <tt>&lt;irm_det_fqdn&gt; AAAA &lt;irm_ip&gt;</tt></td>
                <td align="left">(Broadcast Attestation: Root, IRM)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">IRM: <tt>&lt;irm_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;irm_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;irm_det_fqdn&gt; CERT &lt;attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;irm_det_fqdn&gt; CERT &lt;concise_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(Root: <tt>&lt;irm_det_fqdn&gt; CERT &lt;broadcast_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;concise_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;irm_det_fqdn&gt; CERT &lt;broadcast_attestation_root_irm&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="registering-an-hda" numbered="true" toc="default">
          <name>Registering an HDA</name>
          <t>Specifically handled by an RAA (<xref target="raa" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of HDA</td>
                <td align="left">RAA: <tt>&lt;hda_value&gt;.&lt;raa_value&gt;.det.remoteid.aero NS &lt;hda_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: RAA, HDA</td>
              </tr>
              <tr>
                <td align="left">HDA Self-Attestation</td>
                <td align="left">RAA: <tt>&lt;hda_det_fqdn&gt; AAAA &lt;hda_ip&gt;</tt></td>
                <td align="left">(Concise Attestation: RAA, HDA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">RAA: <tt>&lt;hda_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">(Broadcast Attestation: RAA, HDA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;hda_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;concise_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(RAA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;broadcast_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;concise_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(HDA: <tt>&lt;hda_det_fqdn&gt; CERT &lt;broadcast_attestation_raa_hda&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="registering-an-mra" numbered="true" toc="default">
          <name>Registering an MRA</name>
          <t>Specifically handled by the IRM (<xref target="irm" format="default"/>).</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Inputs (Optional)</th>
                <th align="left">DNS Entries (Optional)</th>
                <th align="left">Outputs (Optional)</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">IP Address of MRA</td>
                <td align="left">IRM: <tt>&lt;icao_mfr_code&gt;.mfr.remoteid.aero NS &lt;mra_det_fqdn&gt;</tt></td>
                <td align="left">Attestation: IRM, MRA</td>
              </tr>
              <tr>
                <td align="left">MRA Self-Attestation</td>
                <td align="left">IRM: <tt>&lt;hda_value&gt;.1.det.remoteid.aero NS &lt;mra_det_fqdn&gt;</tt></td>
                <td align="left">(Concise Attestation: IRM, MRA)</td>
              </tr>
              <tr>
                <td align="left">ICAO Manufacturer Code</td>
                <td align="left">IRM: <tt>&lt;mra_det_fqdn&gt; AAAA &lt;mra_ip&gt;</tt></td>
                <td align="left">(Broadcast Attestation: IRM, MRA)</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">MRA: <tt>&lt;mra_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;mra_self_attestation&gt;</tt></td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;mra_det_fqdn&gt; CERT &lt;attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;mra_det_fqdn&gt; CERT &lt;concise_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(IRM: <tt>&lt;mra_det_fqdn&gt; CERT &lt;broadcast_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;concise_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">&nbsp;</td>
                <td align="left">(MRA: <tt>&lt;mra_det_fqdn&gt; CERT &lt;broadcast_attestation_irm_mra&gt;</tt>)</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="registering-a-serial-number" numbered="true" toc="default">
        <name>Registering a Serial Number</name>
        <t>Specifically handled by an MRA (<xref target="mra" format="default"/>).</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">Inputs (Optional)</th>
              <th align="left">DNS Entries (Optional)</th>
              <th align="left">Outputs (Optional)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Serial Number</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt>)</td>
              <td align="left">(Attestation: MRA, UA)</td>
            </tr>
            <tr>
              <td align="left">(UA Self-Attestation)</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;sn_self_attestation&gt;</tt>)</td>
              <td align="left">(Broadcast Attestation: MRA, UA</td>
            </tr>
            <tr>
              <td align="left">UA Metadata</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;attestation_mra_sn&gt;</tt>)</td>
              <td align="left">(Concise Attestation: MRA, UA)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;concise_attestation_mra_sn&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;sn_det_fqdn&gt; CERT &lt;broadcast_attestation_mra_sn&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
          </tbody>
        </table>
        <!-- Author Note (atw): when registering a SN it could either be a DRIP encoded SN or it could be a non-DRIP SN. In the former case Attestations are both provided and generated during the registration process. The later case there will be no DRIP Attestations produced and most likely an X.509? Also there would be no RRs - so what do we point to to avoid NXDOMAINs; perhaps SVR/AAAA records? -->

<figure>
          <name>Manufacturer Provision</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +--------------+    SA-a0a0 +-----------------+
    | Manufacturer | <--------> | Manufacturer CA |
    +--------------+ A-ma0      +-----------------+
        ^    |
        |    |
        |    |
SA-a0a0 |    |   A-ma0
        |    |
        |    v
    +----------+
    | Aircraft |
    +----------+
]]></artwork>
        </figure>
        <t>During the initial configuration and production at the factory the Aircraft MUST be configured to have a serial number. ASTM defines this to be an ANSI/CTA-2063A Serial Number for UAS. Under DRIP a DET can be encoded as such to be able to convert back and forth between them. This is covered in <xref target="drip-rid" format="default"/>.</t>
        <t>Under DRIP the Manufacturer SHOULD be using DETs and have their own keypair and Self-Attestation: Manufacturer (SA-m). (Ed. Note: some words on aircraft keypair and certs here?).</t>
        <t>Self-Attestation: Aircraft 0 on Aircraft 0 (SA-a0a0) is extracted by the manufacturer and sent to their Certificate Authority (CA) to be verified and added. A resulting attestation (Attestation: Manufacturer on Aircraft 0 [A-ma0]) SHOULD be a DRIP Attestation - however this could be a X.509 certificate binding the serial number to the manufacturer.</t>
      </section>
      <section anchor="registering-an-operator" numbered="true" toc="default">
        <name>Registering an Operator</name>
        <t>Specifically handled by a RIDR (<xref target="ridr" format="default"/>).</t>
        <!-- Author Note (atw): this could also be handled by the RAA run by the CAA and act as a registration point for Operators in their NAS in general. Many CAAs, for example the FAA, already have separate systems deployed to handle this information. We could be asking a lot of the user (registering to another place and specifically for DRIP) and CAA to deploy this new database in an attempt to unify the system -->

<table align="center">
          <thead>
            <tr>
              <th align="left">Inputs (Optional)</th>
              <th align="left">DNS Entries (Optional)</th>
              <th align="left">Outputs (Optional)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Operator Self-Attestation</td>
              <td align="left">
                <tt>&lt;op_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
              <td align="left">Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">Operator PII</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;op_self_attestation&gt;</tt>)</td>
              <td align="left">Broadcast Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;attestation_ridr_op&gt;</tt>)</td>
              <td align="left">(Concise Attestation: RIDR, Operator)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;concise_attestation_ridr_op&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">(<tt>&lt;op_det_fqdn&gt; CERT &lt;broadcast_attestation_ridr_op&gt;</tt>)</td>
              <td align="left">&nbsp;</td>
            </tr>
          </tbody>
        </table>
        <figure>
          <name>Operator Provision</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+            +---------+
| Registry | ---------> | HDA DNS |
+----------+  [HIP RR]  +---------+
    ^   |
    |   |
    |   |
Coo |   | Aro
    |   |
    |   v
+----------+
| Operator |
+----------+
]]></artwork>
        </figure>
        <t>The Operator generates a keypair and DET as specified in DRIP UAS RID. A self-signed attestation (Self-Attestation: Operator on Operator [SA-oo]) is generated and sent to the desired registry (HDA). Other relevant information and possibly personally identifiable information needed may also be required to be sent to the registry (all over a secure channel - the method of which is out of scope for this document).</t>
        <t>The registry cross checks any personally identifiable information as required. Certificate: Operator on Operator is verified (both using the expiration timestamp and signature). The DET is searched in the Registries database to confirm that no collision occurs. A new attestation is generated (Attestation: Registry on Operator) and sent securely back to the Operator. Optionally the DET/HI pairing can be added to the Registries DNS in to form of a HIP Resource Record (RR). Other RRs, such as CERT and TXT, may also be used to hold public information.</t>
        <t>With the receipt of Attestation: Registry on Operator (A-ro) the provisioning of an Operator is complete.</t>
      </section>
      <section anchor="sid-registration" numbered="true" toc="default">
        <name>Registering a Session ID</name>
        <t>Specifically handled by a RIDR (<xref target="ridr" format="default"/>).</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">Inputs (Optional)</th>
              <th align="left">DNS Entries (Optional)</th>
              <th align="left">Outputs (Optional)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Attestation: RIDR, Operator</td>
              <td align="left">
                <tt>&lt;session_det_fqdn&gt; HIP &lt;hip_rr_data&gt;</tt></td>
              <td align="left">Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">Attestation: Operator, UA</td>
              <td align="left">
                <tt>&lt;session_det_fqdn&gt; CERT &lt;session_self_attestation&gt;</tt></td>
              <td align="left">Broadcast Attestation: RIDR, Operator</td>
            </tr>
            <tr>
              <td align="left">Serial Number</td>
              <td align="left">
                <tt>&lt;session_det_fqdn&gt; CERT &lt;broadcast_attestation_ridr_session&gt;</tt></td>
              <td align="left">Attestation Certificate: RIDR, Operator, UA</td>
            </tr>
            <tr>
              <td align="left">(Concise Attestation: Operator, UA)</td>
              <td align="left">(<tt>&lt;session_det_fqdn&gt; CERT &lt;attestation_ridr_session&gt;</tt>)</td>
              <td align="left">(Concise Attestation: RIDR, Operator)</td>
            </tr>
            <tr>
              <td align="left">(Mutual Attestation: Operator, UA)</td>
              <td align="left">(<tt>&lt;session_det_fqdn&gt; CERT &lt;concise_attestation_ridr_session&gt;</tt>)</td>
              <td align="left">(Mutual Certificate: RIDR, Operator, UA)</td>
            </tr>
            <tr>
              <td align="left">(Link Attestation: Operator, UA)</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Concise Certificate: RIDR, Operator, UA)</td>
            </tr>
            <tr>
              <td align="left">(Operational Intent)</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Link Certificate: RIDR, Operator, UA)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Broadcast Attestation: RAA, RIDR)</td>
            </tr>
            <tr>
              <td align="left">&nbsp;</td>
              <td align="left">&nbsp;</td>
              <td align="left">(Broadcast Attestation: Root, RAA)</td>
            </tr>
          </tbody>
        </table>
        <section anchor="standard-provisioning" numbered="true" toc="default">
          <name>Standard Provisioning</name>
          <t>Under standard provisioning the Aircraft has its own connectivity to the registry, the method which is out of scope for this document.</t>
          <figure>
            <name>Standard Provision: Step 1</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+
    ^
    |
    |
    |  A-ro, A-oaN
    |
    |
+----------+                        +----------+
| Operator | <--------------------- | Aircraft |
+----------+        A-a0aN          +----------+
]]></artwork>
          </figure>
          <t>Through mechanisms not specified in this document the Operator should have methods to instruct the Aircraft onboard systems to generate a keypair and certificate. This certificate is chained to the factory provisioned certificate (Self-Attestation: Aircraft 0 on Aircraft 0 [SA-a0a0]). This new attestation (Attestation: Aircraft 0 on Aircraft N [A-a0aN]) is securely extracted by the Operator.</t>
          <t>With A-a0aN the sub-attestation (Self-Attestation: Aircraft N on Aircraft N [SA-aNaN]) is used by the Operator to generate Attestation: Operator on Aircraft N (A-oaN). This along with Attestation: Registry on Operator (A-ro) is sent to the registry.</t>
          <figure>
            <name>Standard Provision: Step 2</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+
    |
    |
    |
    |  Token
    |
    v
+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+        Token           +----------+
]]></artwork>
          </figure>
          <t>On the registry, A-ro is verified and used as confirmation that the Operator is already registered. A-oaN also undergoes a validation check and used to generate a token to return to the Operator to continue provisioning.</t>
          <t>Upon receipt of this token, the Operator injects it into the Aircraft and its used to form a secure connection to the registry. The Aircraft then sends Attestation: Manufacturer on Aircraft 0 (A-ma0) and Attestation: Aircraft 0 to Aircraft N (A-a0aN).</t>
          <figure>
            <name>Standard Provision: Step 3</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+---------+
| HDA DNS |
+---------+
    ^
    |
    | HIP RR
    |
    |
    |
+----------+ <----------------------------+
| Registry |                              |
+----------+ ------------------------+    |
    |                                |    |
    |                                |    |  Token,
    |  AC-roaN               BA-raN  |    |  A-ma0, A-a0aN
    |                                |    |
    |                                |    |
    v                                v    |
+----------+                      +----------+
| Operator |                      | Aircraft |
+----------+                      +----------+
]]></artwork>
          </figure>
          <t>The registry uses Attestation: Manufacturer on Aircraft 0 (with an external database if supported) to confirm the validity of the Aircraft. Attestation: Aircraft 0 on Aircraft N is correlated with Attestation: Operator on Aircraft N and Attestation: Manufacturer on Aircraft 0 to see the chain of ownership. The new DET tied to Aircraft N is then checked for collisions in the HDA. With the information the registry generates two items: Attestation Certificate: Registry on Operator on Aircraft N (AC-roaN) and Broadcast Attestation: Registry on Aircraft N (BA-raN). A HIP RR (and other RR types as needed) are generated and inserted into the HDA.</t>
          <t>AC-roaN is sent via a secure channel back to the Operator to be stored. BA-raN is sent to the Aircraft to be used in Broadcast RID as specified in <xref target="drip-auth" format="default"/>.</t>
        </section>
        <section anchor="operator-assisted-provisioning" numbered="true" toc="default">
          <name>Operator Assisted Provisioning</name>
          <t>This provisioning scheme is for when the Aircraft is unable to connect to the registry itself or does not have the hardware required to generate keypairs and attestations.</t>
          <figure>
            <name>Operator Assisted Provision: Step 1</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+






+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+     aN, SA-aNaN        +----------+
]]></artwork>
          </figure>
          <t>To start the Operator generates on behalf of the Aircraft a new keypair and Attestation: Aircraft N on Aircraft N (SA-aNaN). This keypair and certificate are injected into the Aircraft for it to generate Attestation: Aircraft 0 on Aircraft N (A-a0aN). After injecting the keypair and certificate, the Operator MUST destroy all copies of the keypair.</t>
          <figure>
            <name>Operator Assisted Provision: Step 2</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+
| Registry |
+----------+
    ^
    |
    |
    |  A-ro, A-ma0, A-a0aN, A-oaN
    |
    |
+----------+                        +----------+
| Operator | <--------------------- | Aircraft |
+----------+      A-ma0, A-a0aN     +----------+
]]></artwork>
          </figure>
          <t>Attestation: Manufacturer on Aircraft 0 (A-ma0) and Attestation: Aircraft 0 on Aircraft N (A-a0aN) is extracted by the Operator and the following data items are sent to the Registry; Attestation: Registry on Operator (A-ro), Attestation: Manufacturer on Aircraft 0 (A-ma0), Attestation: Aircraft 0 on Aircraft N (A-a0aN), Attestation: Operator on Aircraft N (A-oaN).</t>
          <figure>
            <name>Operator Assisted Provision: Step 3</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
+----------+            +---------+
| Registry | ---------> | HDA DNS |
+----------+   HIP RR   +---------+
    |
    |
    |
    |  AC-roaN, BA-raN
    |
    v
+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+        BA-raN          +----------+
]]></artwork>
          </figure>
          <t>On the registry validation checks are done on all attestations as per the previous sections. Once complete then the registry checks for a DET collision, adding to the HDA if clear and generates Attestation Certificate: Registry on Operator on Aircraft N (AC-roaN) and Broadcast Attestation: Registry on Aircraft N (BA-raN). Both are sent back to the Operator.</t>
          <t>The Operator securely inject BA-raN and securely stores AC-roaN of Aircraft N.</t>
        </section>
        <section anchor="initial-provisioning" numbered="true" toc="default">
          <name>Initial Provisioning</name>
          <t>A special form of provisioning is used when the Aircraft is first sold to an Operator. Instead of generating a new keypair, the built in keypair and certificate done by the Manufacturer is used to provision and register the aircraft to the owner.</t>
          <!-- Author Note (atw): this action of registration is the same as an owner needed to use something like FAA DroneZone to register the SN of the aircraft to their CAA Assigned ID. So it doesn't make a whole lot of sense to do this at the HDA level (then it would need to be done for every HDA the user wants to fly under - potentially many). Is this a concern? -->

<t>For this either Standard or Operator Assisted methods can be used.</t>
        </section>
      </section>
    </section>
    <section anchor="epp-command-mappings" numbered="true" toc="default">
      <name>EPP Command Mappings</name>
      <section anchor="common-attributes" numbered="true" toc="default">
        <name>Common Attributes</name>
        <t>There are a number of common attributes between the various EPP commands under DRIP that has specific encoding rules.</t>
        <ul spacing="normal">
          <li>The <tt>hi</tt> attribute is a Base64 encoding of the Host Identity.</li>
          <li>The <tt>det</tt> attribute is a string from of the DET.</li>
        </ul>
      </section>
      <section anchor="epp-query-commands" numbered="true" toc="default">
        <name>EPP Query Commands</name>
        <section anchor="epp-query-check" numbered="true" toc="default">
          <name>EPP &lt;check&gt; Command</name>
          <section anchor="epp-check-registry" numbered="true" toc="default">
            <name>Registry</name>
          </section>
          <section anchor="epp-check-operator" numbered="true" toc="default">
            <name>Operator</name>
          </section>
          <section anchor="epp-check-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
          </section>
          <section anchor="epp-check-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
          </section>
        </section>
        <section anchor="epp-query-info" numbered="true" toc="default">
          <name>EPP &lt;info&gt; Command</name>
          <section anchor="epp-info-registry" numbered="true" toc="default">
            <name>Registry</name>
          </section>
          <section anchor="epp-info-operator" numbered="true" toc="default">
            <name>Operator</name>
          </section>
          <section anchor="epp-info-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
          </section>
          <section anchor="epp-info-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
          </section>
        </section>
        <section anchor="epp-query-transfer" numbered="true" toc="default">
          <name>EPP &lt;transfer&gt; Command</name>
          <t>Transfer semantics do not apply in DRIP, so there is no mapping defined for the EPP &lt;transfer&gt; command.</t>
        </section>
      </section>
      <section anchor="epp-transform-commands" numbered="true" toc="default">
        <name>EPP Transform Commands</name>
        <!-- Author Note (atw): TODO: add DET/HI pairs to examples -->

<section anchor="epp-transform-create" numbered="true" toc="default">
          <name>EPP &lt;create&gt; Command</name>
          <section anchor="epp-create-registry" numbered="true" toc="default">
            <name>Registry</name>
            <t>The <tt>abbreviation</tt> field has a max of 6 characters, and is used by RID receivers to display a short decoded form for display of a received DET in the form of <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>. If the abbreviation is unknown then the receiver SHOULD use the hexadecimal encoding of the respective RAA/HDA field of the HID as the value in the form. For example if the HDA is unknown and the HDA value is 20 then the decoded display would be: <tt>DE 14 FE23</tt>. Typically for RAAs the <tt>abbreviation</tt> is RECOMMENDED to be set to the ISO 3166 country code (either Alpha-2 or Alpha-3) for the CAA. Dashes or underscores should be used in place of spaces.</t>
            <!-- Author Note (atw): does the above text need to be moved to DET draft instead (and possible expanded)? -->

<t>The <tt>mfrCode</tt> field is only used by an MRA (<xref target="mra" format="default"/>) when registering with an IRM (<xref target="irm" format="default"/>) and holds the ICAO assigned Manufacturer Code for ANSI CTA2063-A Serial Numbers. It has a max of 4 characters.</t>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<extension>
  <dripRegistry:dripRegistry xmlns:dripRegistry="urn:ietf:params:xml:ns:dripRegistry-1.0">
    <dripRegistry:det>2001:0030:00a0:0145:a3ad:1952:0ad0:a69e</dripRegistry:det>
    <dripRegistry:hi></dripRegistry:hi>
    <dripRegistry:selfAttestation>Hex of SelfAttestation(Registry)</dripRegistry:selfAttestation>
    <dripRegistry:raa>10</dripRegistry:raa>
    <dripRegistry:hda>20</dripRegistry:hda>
    <dripRegistry:abbreviation>FAA</dripRegistry:abbreviation>
    <dripRegistry:mfrCode>MFR0</dripRegistry:mfrCode>
    <dripRegistry:postalInfo type="int">
      <dripRegistry:name>Federal Aviation Administration</dripRegistry:name>
      <dripRegistry:phys_addr>
        <dripRegistry:street1>Orville Wright Federal Building</dripRegistry:street1>
        <dripRegistry:street2>800 Independence Avenue SW</dripRegistry:street2>
        <dripRegistry:city>Washington</dripRegistry:city>
        <dripRegistry:sp>DC</dripRegistry:sp>
        <dripRegistry:pc>20591</dripRegistry:pc>
        <dripRegistry:cc>US</dripRegistry:cc>
      </dripRegistry:phys_addr>
    </dripRegistry:postalInfo>
    <dripRegistry:voice x="1234">1 (866) 835-5322</dripRegistry:voice>
    <dripRegistry:email>stephen.dickson@faa.gov</dripRegistry:email>
  </dripRegistry:dripRegistry>
</extension>
]]></artwork>
          </section>
          <section anchor="epp-create-operator" numbered="true" toc="default">
            <name>Operator</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<extension>
  <dripOperator:dripOperator xmlns:dripOperator="urn:ietf:params:xml:ns:dripOperator-1.0">
    <dripOperator:postalInfo type="int">
      <dripOperator:phys_addr>
        <dripOperator:street1>123 Example Dr.</dripOperator:street1>
        <dripOperator:street2>Suite 100</dripOperator:street2>
        <dripOperator:city>Dulles</dripOperator:city>
        <dripOperator:sp>VA</dripOperator:sp>
        <dripOperator:pc>20166-6503</dripOperator:pc>
        <dripOperator:cc>US</dripOperator:cc>
      </dripOperator:phys_addr>
    </dripOperator:postalInfo>
    <dripOperator:part107_acct_name>some_faa_account</dripOperator:part107_acct_name>
    <dripOperator:rec_flyer_id>123456</dripOperator:rec_flyer_id>
    <dripOperator:caaId></dripOperator:caaId>
    <dripOperator:det></dripOperator:det>
    <dripOperator:hi></dripOperator:hi>
    <dripOperator:selfAttestation>Hex of SelfAttestation(Operator)</dripOperator:selfAttestation>
    <dripOperator:attestation>Hex of Attestation(Registry, Operator)</dripOperator:attestation>
  </dripOperator::dripOperator>
</extension>
]]></artwork>
          </section>
          <section anchor="epp-create-sn" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<extension>
  <dripSerial:dripSerial xmlns:dripSerial="urn:ietf:params:xml:ns:dripSerial-1.0">
    <dripSerial:serial>0000F000000000000000</dripSerial:serial>
    <dripSerial:det></dripSerial:det>
    <dripSerial:hi></dripSerial:hi>
    <dripSerial:selfAttestation>Hex of SelfAttestation(Aircraft)</dripSerial:selfAttestation>
    <dripSerial:broadcastAttestation>Hex of BroadcastAttestation(Registry, Aircraft)</dripSerial:broadcastAttestation>
    <dripSerial:manufacturer>Drones R Us</dripSerial:manufacturer>
    <dripSerial:make>Fast Drone</dripSerial:make>
    <dripSerial:model>9000</dripSerial:model>
    <dripSerial:color>White</dripSerial:color>
    <dripSerial:material>Plastic</dripSerial:material>
    <dripSerial:weight>12.0</dripSerial:weight>
    <dripSerial:length>5.0</dripSerial:length>
    <dripSerial:width>4.0</dripSerial:width>
    <dripSerial:height>3.0</dripSerial:height>
    <dripSerial:numRotors>4</dripSerial:numRotors>
    <dripSerial:propLength>2.0</dripSerial:propLength>
    <dripSerial:batteryCapacity>5000</dripSerial:batterCapacity>
    <dripSerial:batteryVoltage>12</dripSerial:batteryVoltage>
    <dripSerial:batteryWeight>5.2</dripSerial:batteryWeight>
    <dripSerial:batteryChemistry>Lithium-Ion</dripSerial:batteryChemistry>
    <dripSerial:takeOffWeight>15</dripSerial:takeOffWeight>
    <dripSerial:maxTakeOffWeight>25</dripSerial:maxTakeOffWeight>
    <dripSerial:maxPayloadWeight>10</dripSerial:maxPayloadWeight>
    <dripSerial:maxFlightTime>15</dripSerial:maxFlightTime>
    <dripSerial:minOperatingTemp>35</dripSerial:minOperatingTemp>
    <dripSerial:maxOperatingTemp>90</dripSerial:maxOperatingTemp>
    <dripSerial:ipRating>55</dripSerial:ipRating>
  </dripSerial:dripSerial>
</extension>
]]></artwork>
          </section>
          <section anchor="epp-create-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<extension>
  <dripSession:dripSession xmlns:dripSession="urn:ietf:params:xml:ns:dripSession-1.0">
    <dripSession:serial>0000F000000000000000</dripSession:serial>
    <dripSession:uasId></dripSession:uasId>
    <dripSession:sessionHi></dripSession:sessionHi>
    <dripSession:broadcastAttestation>Hex of BroadcastAttestation(Registry, Aircraft)</dripSession:broadcastAttestation>
    <dripSession:attestationCertificate>Hex of AttestationCertificate(Registry, Operator, Aircraft)</dripSession:attestationCertificate>
    <dripSession:operationalIntent></dripSession:operationalIntent>
    <dripSession:operationalIntentSrc>uss.example.com</dripSession:operationalIntentSrc>
    <dripSession:operatorId>NOP123456</dripSession:operatorId>
    <dripSession:operatorDet></dripSession:operatorDet>
    <dripSession:attestation>Hex of Attestation(Operator, Aircraft)</dripSession:attestation>
    <dripSession:mutualAttestation>Hex of MutualAttestation(Registry, Operator)</dripSession:mutualAttestation>
    <dripSession:fa3>N1232456</dripSession:fa3>
    <dripSession:sessionStart>2022-04-09T15:43:13Z</dripSession:sessionStart>
    <dripSession:sessionEnd>2022-04-09T20:43:13Z</dripSession:sessionEnd>
  </dripSession:dripSession>
</extension>
]]></artwork>
          </section>
        </section>
        <section anchor="epp-transform-delete" numbered="true" toc="default">
          <name>EPP &lt;delete&gt; Command</name>
          <section anchor="epp-delete-registry" numbered="true" toc="default">
            <name>Registry</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripRegistry:delete xmlns:dripRegistry="urn:ietf:params:xml:ns:dripRegistry-1.0">
        <dripRegistry:det>2001:0030:00a0:0145:a3ad:1952:0ad0:a69e</dripRegistry:det>
      </dripRegistry:delete>
    </delete>
    <clTRID>DEL-REGIS</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-delete-operator" numbered="true" toc="default">
            <name>Operator</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripOperator:delete xmlns:dripOperator="urn:ietf:params:xml:ns:dripOperator-1.0">
        <dripOperator:caaId></dripOperator:caaId>
        <dripOperator:det></dripOperator:det>
      </dripOperator:delete>
    </delete>
    <clTRID>DEL-OPER</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-delete-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripSerial:delete xmlns:dripSerial="urn:ietf:params:xml:ns:dripSerial-1.0">
        <dripSerial:serial>0000F000000000000000</dripSerial:serial>
      </dripSerial:delete>
    </delete>
    <clTRID>DEL-AIRCRFT</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
          <section anchor="epp-delete-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
            <t>Example:</t>
            <artwork type="xml" name="" align="left" alt=""><![CDATA[
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
  <command>
    <delete>
      <dripSession:delete xmlns:dripSession="urn:ietf:params:xml:ns:dripSession-1.0">
        <dripSession:uasId></dripSession:uasId>
      </dripSession:delete>
    </delete>
    <clTRID>DEL-SID</clTRID>
  </command>
</epp>
]]></artwork>
          </section>
        </section>
        <section anchor="epp-transform-renew" numbered="true" toc="default">
          <name>EPP &lt;renew&gt; Command</name>
          <t>Renewal semantics do not apply in DRIP, so there is no mapping defined for the EPP &lt;renew&gt; command.</t>
        </section>
        <section anchor="epp-transform-transfer" numbered="true" toc="default">
          <name>EPP &lt;transfer&gt; Command</name>
          <t>Transfer semantics do not apply in DRIP, so there is no mapping defined for the EPP &lt;transfer&gt; command.</t>
        </section>
        <section anchor="epp-transform-update" numbered="true" toc="default">
          <name>EPP &lt;update&gt; Command</name>
          <section anchor="epp-update-registry" numbered="true" toc="default">
            <name>Registry</name>
          </section>
          <section anchor="epp-update-operator" numbered="true" toc="default">
            <name>Operator</name>
          </section>
          <section anchor="epp-update-serial" numbered="true" toc="default">
            <name>Aircraft Serial Number</name>
          </section>
          <section anchor="epp-update-session" numbered="true" toc="default">
            <name>Aircraft Session ID</name>
          </section>
        </section>
      </section>
    </section>
    <section anchor="rdap-definitions" numbered="true" toc="default">
      <name>RDAP Definitions</name>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <!-- Author Note (atw): need help here: EPP/RDAP adds to existing registries, CERT RR update, HIP RR update -->

</section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="det-generation" numbered="true" toc="default">
        <name>DET Generation</name>
        <t>Under the FAA <xref target="NPRM" format="default"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>
        <dl newline="false" spacing="normal">
          <dt>1</dt>
          <dd>
  The entity generates its own DET, discovering and using the RAA and HDA for the target registry. The method for discovering a registry's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the registry to be accepted (thus generating the required Self-Attestation) or denied.</dd>
          <dt>2</dt>
          <dd>
  The entity sends to the registry its HI for it to be hashed and result in the DET. The registry would then either accept (returning the DET to the device) or deny this pairing.</dd>
        </dl>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations (see <xref target="security-considerations" format="default"/>) and connectivity it is acceptable under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft (as defined in <xref target="operator-assisted-provisioning" format="default"/>). The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
        <t>In either case the registry must decide on if the HI/DET pairing is valid. This in its simplest form is checking the current registry for a collision on the DET and HI.</t>
        <t>Upon accepting a HI/DET pair the registry MUST populate the required the DNS serving the HDA with the HIP RR and other relevant RR types (such as TXT and CERT). The registry MUST also generate the appropriate attestations/certificates for the given operation.</t>
        <t>If the registry denied the HI/DET pair, because there was a DET collision or any other reason, the registry MUST signal back to the device being provisioned that a new HI needs to be generated.</t>
      </section>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <ul spacing="normal">
        <li>Scott Hollenbeck for his initial guidance with EPP/RDAP</li>
      </ul>
    </section>
    <section anchor="contributors" numbered="true" toc="default">
      <name>Contributors</name>
      <ul spacing="normal">
        <li>Andrei Gurtov for his insights as a pilot</li>
        <li>Len Bayles for his help in formatting EPP definitions and creating an extension for FRED</li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="F3411-19">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="February"/>
          </front>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7519" target="https://www.rfc-editor.org/info/rfc7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem">
              <organization/>
            </author>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC8005" target="https://www.rfc-editor.org/info/rfc8005">
          <front>
            <title>Host Identity Protocol (HIP) Domain Name System (DNS) Extension</title>
            <author fullname="J. Laganier" initials="J." surname="Laganier">
              <organization/>
            </author>
            <date month="October" year="2016"/>
            <abstract>
              <t>This document specifies a resource record (RR) for the Domain Name System (DNS) and how to use it with the Host Identity Protocol (HIP). This RR allows a HIP node to store in the DNS its Host Identity (HI), the public component of the node public-private key pair; its Host Identity Tag (HIT), a truncated hash of its public key (PK); and the domain names of its rendezvous servers (RVSs).  This document obsoletes RFC 5205.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8005"/>
          <seriesInfo name="DOI" value="10.17487/RFC8005"/>
        </reference>
        <reference anchor="RFC4398" target="https://www.rfc-editor.org/info/rfc4398">
          <front>
            <title>Storing Certificates in the Domain Name System (DNS)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <date month="March" year="2006"/>
            <abstract>
              <t>Cryptographic public keys are frequently published, and their authenticity is demonstrated by certificates.  A CERT resource record (RR) is defined so that such certificates and related certificate revocation lists can be stored in the Domain Name System (DNS).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4398"/>
          <seriesInfo name="DOI" value="10.17487/RFC4398"/>
        </reference>
        <reference anchor="drip-requirements" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card">
              <organization/>
            </author>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter">
              <organization/>
            </author>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz">
              <organization/>
            </author>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="drip-arch" target="https://www.ietf.org/archive/id/draft-ietf-drip-arch-24.txt">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Shuai Zhao">
              <organization>Tencent</organization>
            </author>
            <author fullname="Andrei Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="10" month="June" year="2022"/>
            <abstract>
              <t>   This document describes an architecture for protocols and services to
   support Unmanned Aircraft System (UAS) Remote Identification (RID)
   and tracking, plus UAS RID-related communications.  This architecture
   adheres to the requirements listed in the DRIP Requirements document
   (RFC9153).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-arch-24"/>
        </reference>
        <reference anchor="drip-rid" target="https://www.ietf.org/archive/id/draft-ietf-drip-uas-rid-01.txt">
          <front>
            <title>UAS Remote ID</title>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="9" month="September" year="2020"/>
            <abstract>
              <t>   This document describes the use of Hierarchical Host Identity Tags
   (HHITs) as a self-asserting and thereby trustable Identifier for use
   as the UAS Remote ID.  HHITs include explicit hierarchy to provide
   Registrar discovery for 3rd-party ID attestation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-uas-rid-01"/>
        </reference>
        <reference anchor="hhit-registries" target="https://www.ietf.org/archive/id/draft-moskowitz-hip-hhit-registries-02.txt">
          <front>
            <title>Hierarchical HIT Registries</title>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <date day="9" month="March" year="2020"/>
            <abstract>
              <t>   This document describes using the registration protocol and
   registries to support hierarchical HITs (HHITs).  New and existing
   HIP parameters are used to communicate Registry Policies and data
   about the HHIT device and the Registries.  Further Registries are
   expected to provide RVS services for registered HHIT devices.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-hip-hhit-registries-02"/>
        </reference>
        <reference anchor="drip-secure-nrid-c2" target="https://www.ietf.org/archive/id/draft-moskowitz-drip-secure-nrid-c2-10.txt">
          <front>
            <title>Secure UAS Network RID and C2 Transport</title>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="27" month="June" year="2022"/>
            <abstract>
              <t>   This document defines a transport mechanism for Unmanned Aircraft
   System (UAS) Network Remote ID (Net-RID).  The Broadcast Remote ID
   (B-RID) messages can be sent directly over UDP or via a more
   functional protocol using CoAP/CBOR for the Net-RID messaging.  This
   is secured via either HIP/ESP or DTLS.  HIP/ESP or DTLS secure
   messaging Command-and-Control (C2) for is also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-secure-nrid-c2-10"/>
        </reference>
        <reference anchor="dane-clients" target="https://www.ietf.org/archive/id/draft-ietf-dance-client-auth-00.txt">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <author fullname="Ash Wilson">
              <organization>Valimail</organization>
            </author>
            <date day="24" month="March" year="2022"/>
            <abstract>
              <t>   The DANE TLSA protocol [RFC6698] [RFC7671] describes how to publish
   Transport Layer Security (TLS) server certificates or public keys in
   the DNS.  This document updates RFC 6698 and RFC 7671.  It describes
   how to additionally use the TLSA record to publish client
   certificates or public keys, and also the rules and considerations
   for using them with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-00"/>
        </reference>
        <reference anchor="drip-auth" target="https://www.ietf.org/archive/id/draft-ietf-drip-auth-14.txt">
          <front>
            <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="21" month="June" year="2022"/>
            <abstract>
              <t>   This document describes how to add trust into the Broadcast Remote ID
   (RID) specification discussed in the DRIP Architecture.  It defines a
   few message schemes (sent within the Authentication Message) that can
   be used to authenticate past messages sent by a unmanned aircraft
   (UA) and provide proof of UA trustworthiness even in the absence of
   Internet connectivity at the receiving node.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-14"/>
        </reference>
        <reference anchor="NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="drip-attestations-certificates" numbered="true" toc="default">
      <name>DRIP Attestations &amp; Certificates</name>
      <t>See <xref target="drip-arch" format="default"/> for definitions of claim, assertion, attestation and certificate as used in this document.</t>
      <section anchor="attestation-structure" numbered="true" toc="default">
        <name>Attestation Structure</name>
        <t>All Attestations (<xref target="attestations" format="default"/>) and Certificates (<xref target="certificates" format="default"/>) under DRIP share the following format structure:</t>
        <figure anchor="att-struct">
          <name>Attestation Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                 Attestor Identity Information                 .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                       Attestation Data                        .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|               Expiration Timestamp by Attestor                |
+---------------+---------------+---------------+---------------+
|                 Signing Timestamp by Attestor                 |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                     Signature by Attestor                     |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Attestor Identity Information: (0, 16-bytes or 120-bytes)
    Field containing Attestor Identity Information in various forms.

Attestation Data:
    A field of variable length containing the attestation data.

Expiration Timestamp by Attestor (4 bytes):
    Timestamp denoting recommended time to trust data to.

Signing Timestamp by Attestor (4 bytes):
    Current time at signing.

Attestor Signature (64 bytes):
    Signature over preceding fields using the keypair of 
    the Attestor.
]]></artwork>
        </figure>
        <section anchor="attestor-identity-information" numbered="true" toc="default">
          <name>Attestor Identity Information</name>
          <t>This can be either of the following:</t>
          <ol spacing="normal" type="1"><li>Attestor DET: 16-bytes</li>
            <li>Attestor Self-Attestation: 120-bytes</li>
          </ol>
          <t>A specific definition of an Attestation (<xref target="attestations" format="default"/>) or Certificate (<xref target="certificates" format="default"/>) defines which of these are used.</t>
        </section>
        <section anchor="attestation-data" numbered="true" toc="default">
          <name>Attestation Data</name>
          <t>The data being attested to. It can be one of the following forms:</t>
          <ol spacing="normal" type="1"><li>Claims</li>
            <li>Assertions</li>
            <li>Attestations</li>
          </ol>
          <t>This field is variable length with no limit and specific definitions of an Attestation (<xref target="attestations" format="default"/>) or Certificate (<xref target="certificates" format="default"/>) indicate the fields, size and ordering of any subfields.</t>
        </section>
        <section anchor="expiration-timestamp" numbered="true" toc="default">
          <name>Expiration Timestamp</name>
          <t>A UTC timestamp set some time into the future to indicate a point the Attestation Structure should not be trusted.</t>
          <!-- Author Note (atw): we need to highlight here how important the delta needs to be, but not over constrain -->

<t>The time delta into the future is of important concern as replay attacks on during flight could compromise the goals of DRIP. Attestations and certificates intended for public use and lower in the tree (importantly any generated for a Session ID (<xref target="sid-registration" format="default"/>)).</t>
          <t>For this reason deltas SHOULD be kept as short as possible for the given use-case to avoid issues with replays.</t>
        </section>
        <section anchor="signing-timestamp" numbered="true" toc="default">
          <name>Signing Timestamp</name>
          <t>A UTC timestamp set to the time when the Attestation Structure was signed.</t>
        </section>
        <section anchor="signature" numbered="true" toc="default">
          <name>Signature</name>
          <t>An EdDSA25519 signature using the signing parties private key over the preceding fields in the Attestation Structure.</t>
          <ul empty="true" spacing="normal">
            <li>
              <ul empty="true" spacing="normal">
                <li>Note: the preceding fields of the Attestation Structure actually form an Assertion, with all fields acting as Claims</li>
              </ul>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="attestations" numbered="true" toc="default">
        <name>Attestations</name>
        <section anchor="self-attestation" numbered="true" toc="default">
          <name>Self-Attestation (SA-x)</name>
          <t>The only attestation to use a claim (the Host Identity) in the <tt>Attestation Data</tt> with the DET acting as the <tt>Attestor Identity Information</tt>.</t>
          <figure anchor="axx-fig">
            <name>DRIP Self-Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                              DRIP                             |
|                           Entity Tag                          |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                          Host Identity                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                         Trust Timestamp                       |
+---------------+---------------+---------------+---------------+
|                        Signing Timestamp                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 120-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="attestation" numbered="true" toc="default">
          <name>Attestation (A-x.y)</name>
          <t>The standard first level DRIP Attestation form using a Self-Attestations of the signer and of the data being signed.</t>
          <figure anchor="axy-fig">
            <name>DRIP Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-xx                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-yy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by X                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by X                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 312-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="concise-attestation" numbered="true" toc="default">
          <name>Concise Attestation (CA-x.y)</name>
          <t>In constrained environments and when there is the guarantee of being able to lookup the DETs to obtain HIs this attestation can be used.</t>
          <figure anchor="c-axy-fig">
            <name>DRIP Concise Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by X                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by X                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 104-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="mutual-attestation" numbered="true" toc="default">
          <name>Mutual Attestation (MA-x.y)</name>
          <t>An attestation that perform a sign over an existing Attestation where the signer is the second party of the embedded attestation. The DET of party Y is used as the <tt>Attestor Identity Information</tt> (<xref target="attestor-identity-information" format="default"/>).</t>
          <figure anchor="m-axy-fig">
            <name>DRIP Mutual Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              A-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Y                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Y                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Y                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 400-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="link-attestation" numbered="true" toc="default">
          <name>Link Attestation (LA-x.y)</name>
          <t>An attestations that perform a sign over an existing Concise Attestation where the signer is the second party of the embedded attestation. The DET of party Y is used as the <tt>Attestor Identity Information</tt> (<xref target="attestor-identity-information" format="default"/>).</t>
          <figure anchor="l-axy-fig">
            <name>DRIP Link Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             CA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Y                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Y                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Y                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 192-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="broadcast-attestation" numbered="true" toc="default">
          <name>Broadcast Attestation (BA-x.y)</name>
          <t>Required by DRIP Authentication Formats for Broadcast RID (<xref target="drip-auth" format="default"/>) to satisfy <xref target="drip-requirements" format="default"/> GEN-1 and GEN-3.</t>
          <figure anchor="b-axy-fig">
            <name>DRIP Broadcast Attestation</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                       Host Identity of Y                      |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by X                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by X                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 136-bytes
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="certificates" numbered="true" toc="default">
        <name>Certificates</name>
        <t>In DRIP certificates are signed by a third party that has no stake in the claims/assertions/attestations being attested to.</t>
        <t>It is analogous to a third party in legal system that signs a document as a "witness" and bears no responsibility in the document.</t>
        <section anchor="attestation-certificate" numbered="true" toc="default">
          <name>Attestation Certificate (AC-z.x.y)</name>
          <figure anchor="a-cxy-fig">
            <name>DRIP Attestation Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-zz                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              A-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 504-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="concise-certificate" numbered="true" toc="default">
          <name>Concise Certificate (CC-z.x.y)</name>
          <figure anchor="c-cxy-fig">
            <name>DRIP Concise Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Z                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             CA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 192-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="link-certificate" numbered="true" toc="default">
          <name>Link Certificate (LC-z.x.y)</name>
          <figure anchor="l-cxy-fig">
            <name>DRIP Link Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Z                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             LA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 300-bytes
]]></artwork>
          </figure>
        </section>
        <section anchor="mutual-certificate" numbered="true" toc="default">
          <name>Mutual Certificate (MC-z.x.y)</name>
          <figure anchor="m-cxy-fig">
            <name>DRIP Mutual Certificate</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SA-zz                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             MA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                      Trust Timestamp by Z                     |
+---------------+---------------+---------------+---------------+
|                     Signing Timestamp by Z                    |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Z                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+

Length = 576-bytes
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="abbreviations-file-naming-conventions" numbered="true" toc="default">
        <name>Abbreviations &amp; File Naming Conventions</name>
        <t>The names of attestation and certificates can become quite long and tedious to write out. As such this section provides a guide to a somewhat standardized way they are written in text.</t>
        <section anchor="in-text-abbreviation" numbered="true" toc="default">
          <name>In Text Abbreviation</name>
          <t>In a long form the name of a particular attestation/certification can be written as follows:</t>
          <ul spacing="normal">
            <li>
              <tt>Self-Attestation: Unmanned Aircraft</tt></li>
            <li>
              <tt>Attestation: Operator on Aircraft</tt> or <tt>Attestation: Operator, Aircraft</tt></li>
            <li>
              <tt>Attestation Certificate: Registry on Operator on Aircraft</tt> or <tt>Attestation Certificate: Registry, Operator, Aircraft</tt></li>
          </ul>
          <t>When multiple entities are listed they can be separated by either <tt>on</tt> or by <tt>,</tt>. These long forms can be shortened:</t>
          <ul spacing="normal">
            <li>
              <tt>SA(Unmanned Aircraft)</tt> or <tt>SA-ua</tt></li>
            <li>
              <tt>A(Operator, Unmanned Aircraft)</tt> or <tt>A-op.ua</tt></li>
            <li>
              <tt>AC(Registry, Operator, Aircraft)</tt> or <tt>AC-reg.op.ua</tt></li>
          </ul>
          <t>Typical abbreviations for the entity can be used such as <tt>Unmanned Aircraft</tt> being shorthanded to <tt>ua</tt>.</t>
        </section>
        <section anchor="file-naming" numbered="true" toc="default">
          <name>File Naming</name>
          <t>For file naming of various certificates a similar format to the short form is used:</t>
          <ul spacing="normal">
            <li>
              <tt>sa-{hash of entity}</tt></li>
            <li>
              <tt>a-{hash of entity x}_{hash of entity y}</tt></li>
            <li>
              <tt>ac-{hash of entity z}_{hash of entity x}_{hash of entity y}</tt></li>
          </ul>
          <t>Some examples of file names:</t>
          <ul spacing="normal">
            <li>
              <tt>sa-79d8a404d48f2ef9.cert</tt></li>
            <li>
              <tt>a-120b8f25b198c1e1_79d8a404d48f2ef9.cert</tt></li>
            <li>
              <tt>ac-aac6b00abba268b7_120b8f25b198c1e1_79d8a404d48f2ef9.cert</tt></li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="x509-certificates" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <section anchor="certificate-policy-and-certificate-stores" numbered="true" toc="default">
        <name>Certificate Policy and Certificate Stores</name>
        <t>X.509 certificates are optional for the DRIP entities covered in this
document.  DRIP endpoint entities (EE) (i.e., UA, GCS, and Operators)
may benefit from having X.509 certificates.  Most of these certificates
will be for their DET and some will be for other UAS identities.  To
provide for these certificates, some of the other entities covered in
this document will also have certificates to create and manage the
necessary PKI structure.</t>
        <t>Any Certificate Authority (CA) supporting DRIP entities SHOULD adhere to
the ICAO's International Aviation Trust Framework (IATF) Certificate
Policy [ICAO-IATF-CP-draft].  The CA(s) supporting this CP MUST either
be a part of the IATF Bridge PKI or part of the IATF CA Trust List.</t>
        <t>EEs may use their X.509 certificates, rather than their rawPublicKey
(i.e. HI) in authentication protocols (as not all may support
rawPublicKey identities).  Some EE HI may not be 'worth' supporting the
overhead of X.509.  Short lived DETs like those used for a single
operation or even for a day's operations may not benefit from X.509. 
Creating then almost immediately revoking these certificates is a
considerable burden on all parts of the system.  Even using a short
notAfterDate will completely mitigate the burden of managing these
certificates.  That said, many EEs will benefit to offset the effort. 
It may also be a regulator requirement to have these certificates.</t>
        <t>Typically an HDA either does or does not issue a certificate for all its
DETs.  An RAA may specifically have some HDAs for DETs that do not
want/need certificates and other HDAs for DETs that do need them.  These
types of HDAs could be managed by a single entity thus providing both
environments for its customers.</t>
        <t>It is recommended that DRIP X.509 certificates be stored as DNS TLSA
Resource Records.  This not only generally improves certificate lookups,
but also enables use of DANE <xref target="RFC6698" format="default"/> for the various servers in the
UTM and particularly DRIP registry environment and DANCE <xref target="dane-clients" format="default"/> for EEs (e.g. <xref target="drip-secure-nrid-c2" format="default"/>). 
All DRIP certificates MUST be available via RDAP.  LDAP/OCSP access for
other UTM and ICAO uses SHOULD also be provided.</t>
      </section>
      <section anchor="certificate-management" numbered="true" toc="default">
        <name>Certificate Management</name>
        <t>(mostly TBD still)</t>
        <t>PKIX standard X.509 issuance practices should be used.  The certificate
request SHOULD be included in the DET registration request (<xref target="registry-operations" format="default"/>).  A successful DET registration then MUST
include certificate creation, store, and return to the DET registrant.</t>
        <t>Certificate revocation will parallel DET revocation.  TLSA RR MUST be
deleted from DNS and RDAP, LDAP, and OCSP return revoked responses. 
CRLs SHOULD be maintained per the CP.</t>
        <t>Details of this are left out, as there are a number of approaches and
further research and experience will be needed.</t>
      </section>
      <section anchor="examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>TBD</t>
      </section>
      <section anchor="alternative-certificate-encoding" numbered="true" toc="default">
        <name>Alternative Certificate Encoding</name>
        <t>(CBOR encoded certs here.  TBD)</t>
      </section>
    </section>
    <section anchor="blockchain-based-registries" numbered="true" toc="default">
      <name>Blockchain-based Registries</name>
      <t>The implementation of the registries and Network Remote Identification
(Network RID; identify a UA through the network) in DRIP
is yet to be determined. Blockchain, being synonymous with ledger,
is a technology that could naturally fulfil the role of a registry, while
simultaneously offering its benefits such as auditability, persistency
and decentralization. We suggest that blockchain is an
ample candidate to be used as registry within DRIP. We also show
that it can be used to effectively leverage Network RID in certain
scenarios. Thus 1) We propose a novel drone ID architecture based on Hyperledger
Iroha and describe its proof-of-concept implementation with DRIP.
2) Its performance and scalability is empirically evaluated. 3) We
perform an informal security analysis of the system against various
types of attacks [<eref target="https://doi.org/10.1145/3479243.3487305">Secure Drone Identification with Hyperledger Iroha</eref>].</t>
      <t>Figure 1: Architecture using blockchain as registry for DRIP</t>
      <t>The proposed architecture is presented in Fig. 1. It consists of the
usual actors in a UAS network, along with the blockchain registry
based on Hyperledger Iroha. Key components:
o Authorized users (administrators) can register new UAs to
the network, and store with them any relevant data such as
public keys and certificates.</t>
      <t>Drones can either send location updates directly to the blockchain,
given that they are connected to the Internet, or send location
updates to their connected Ground Control Station (GCS)
that forwards it on behalf of the drones.
o Observers can receive drone messages either through bluetooth
and WiFi broadcasts from drones, or by polling the
blockchain. They can also fetch the public key associated
with a drone in order to validate its messages.
o The blockchain network and its nodes are an entirely separate
entity, no other actor participates in the consensus of
new blocks.</t>
      <t>Actors within DRIP (except observers) will be registered as accounts
on the blockchain network. Each of these accounts will have their
DRIP identities, certificates and public keys stored and available so
that they can be validated and used for validation by any account
on the blockchain. Note that DRIP crypto key-pairs are separate
from the blockchain crypto key-pairs. DRIP key-pairs are used to
sign, verify and validate DRIP identities and messages, while the
blockchain key-pairs are used to sign, verify and validate transactions
on the blockchain.</t>
      <t>The DRIP requirements for a registry are the following:
(1) REG-1: Public lookup
(2) REG-2: Private lookup
(3) REG-3: Provisioning (of static/dynamic data of UAs)
(4) REG-4: AAA Policy</t>
      <t>REG-1 &amp; REG-2. In Hyperledger Iroha, accounts are created
on domains. The same account name can be used for multiple domains,
and these are seen as separate accounts on Iroha. PII for
an account can therefore be stored on a separate account (with
the same account name) existing on a separate domain, that only
allows certain accounts to view its account details. Accordingly, a
registry using Iroha would need at least two domains associated
with it for any given account, one for public lookup and one for
private lookup.</t>
      <t>REG-3 &amp; REG-4. The details for an account are set with a
key/value pair. Key/value pairs can not be removed once they are
set, values can only be modified through the corresponding key.
Furthermore, the account that sets a key/value pair is included in
the account details as a key/value pair itself, meaning one account
can not modify details set by another account. See Listing 1 for
clarification. Notice that both accounts have set the same key but
contain different values. This sort of implementation supports both
non-repudiation, but also trust in the sense that a drone (assuming
the drone is not compromised) can always trust its own data, and
does not have to interpret data coming from other accounts. Similarly,
other accounts accessing another account's data can trust
that it is set by the corresponding account (e.g. fetching gps data).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
