<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-10" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="DETIM Architecture">DRIP Entity Tag (DET) Identity Management Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-10"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2023" month="June" day="13"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the high level architecture for the registration and discovery of DRIP Entity Tags (DETs) using DNS. Discovery of DETs and their artifacts are through DRIP specific DNS structures and standard DNS methods. A general overview of the interfaces required between involved components is described in this document with future supporting documents giving technical specifications.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to Unmanned Aircraft System (UAS) Remote ID (RID). Only very limited operational information can be Broadcast, but extended information is sometimes needed. The most essential element of information is the UAS ID, the unique key for lookup of extended information in relevant registries (see Figure 4 of <xref target="drip-arch" format="default"/>).</t>
      <t>While it is expected that DRIP Identity Management Entity (DIME) functions will be integrated with UAS Service Suppliers (USS) (Appendix A.2 of <xref target="drip-arch" format="default"/>), who will provide DIME-like functions is not yet determined in most, and is expected to vary between, jurisdictions. However this evolves, the essential DIME-like functions (including the management of identifiers (such as the DRIP Entity Tag (DET))) are expected to remain the same, so are specified herein.</t>
      <t>While most data to be sent via Broadcast RID (Section 1.2.1 of <xref target="drip-arch" format="default"/>) or Network RID (Section 1.2.2 of <xref target="drip-arch" format="default"/>) is public, much of the extended information in registries will be private. As discussed in Section 7 of <xref target="drip-arch" format="default"/>, Authentication, Attestation, Authorization, Access Control, Accounting, Attribution, and Audit (AAA) for registries is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose. As specific AAA requirements will vary by jurisdictional regulation, provider choices, customer demand, etc., they are left to specification in policies, which should be human readable to facilitate analysis and discussion, and machine readable to enable automated enforcement, using a language amenable to both (e.g., eXtensible Access Control Markup Language (XACML)).</t>
      <t>The intent of the access control requirements on registries is to ensure that no member of the public would be hindered from accessing public information, while only duly authorized parties would be enabled to access private information. Mitigation of Denial of Service (DoS) attacks and refusal to allow database mass scraping would be based on those behavior, not on identity or role of the party submitting the query per se, but querant identity information might be gathered (by security systems protecting DRIP implementations) on such misbehavior.</t>
      <t>Registration under DRIP is vital to manage the inevitable collisions in the hash portion of the DET (Section 9.5 of <xref target="RFC9374" format="default"/>). Forgery of a DET is still possible, but including it as a part of a public registration mitigates this risk.</t>
      <t>This document creates the DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., Unmanned Aircraft (UA), Registered Assigning Authority (RAA), Hierarchical HIT Domain Authority (HDA), Ground Control Station (GCS), and USS).</t>
      <t>This document uses the Concise Data Definition Language (CDDL) <xref target="RFC8610" format="default"/> for describing the registration data.</t>
    </section>
    <section anchor="abstract-process-and-reasoning" numbered="true" toc="default">
      <name>Abstract Process and Reasoning</name>
      <t>In DRIP each entity (DIME, Operator, UA, etc.) is expected to generate a DET <xref target="RFC9374" format="default"/> on the local device their key is expected to be used. These are registered with a Public Information Registry (e.g. DNS) within the hierarchy along with whatever data is required by the cognizant CAA and the DIME. Any Personally Identifiable Information (PII) is stored in a Private Information Registry protected through industry practice AAA or stronger. In response, the entity will obtain an endorsement from the DIME proving such registration.</t>
      <t>Manufacturers that wish to participate in DRIP should not only support DRIP as a Session ID type for their aircraft but could also generate a DET then encode it as a Serial Number (Section 4.2 of <xref target="RFC9374" format="default"/>). This would allow aircraft under CAA mandates to fly only ID Type 1 (Serial Number) could still use DRIP and most of its benefits. Even if DRIP is not supported for Serial Numbers by a Manufacturer it is hoped that they would still run a DIME to store their Serial Numbers and allow look ups for generic model information. This look up could be especially helpful in UTM for Situational Awareness when an aircraft flying with a Serial Number is detected and allow for an aircraft profile to be displayed.</t>
      <t>Operators are registered with a number of registries or their regional RAA. This acts as a verification check when a user performs other registration operations; such as provisioning an aircraft with a new Session ID. It is an open question if an Operator registers to their CAA (the RAA's direct HDA) or multiple USS's (HDA's). PII of the Operator would vary based on the CAA they are under and the DIME.</t>
      <t>Finally, aircraft that support using a DET would provision per flight to a USS, proposing a DET to the DIME to generate a binding between the aircraft (Session ID, Serial Number, and Operational Intent), operator and DIME. The aircraft then follows <xref target="drip-auth" format="default"/> to meet various requirements from <xref target="RFC9153" format="default"/> during a flight.</t>
      <section anchor="supported-scenarios" numbered="true" toc="default">
        <name>Supported Scenarios</name>
        <ol spacing="normal" type="1"><li>UA using manufacturer generated Serial Number for UAS ID. No additional information provided.</li>
          <li>UA using manufacturer generated Serial Number for UAS ID. Manufacturer using a DIME. Manufacturer MUST provided pointer to additional information via DNS (even if null).</li>
          <li>UA using manufacturer generated Serial Number which is mapped to a DET by manufacturer for UAS ID. UA using manufacturer generated DET for Authentication. Manufacturer using a DIME. DIME MUST place public DET information into DNS (i.e. HI). DIME MUST provide mapping of Serial Number to DET in DNS. Manufacturer MUST provide pointer to additional information via DNS (even if null).</li>
          <li>UA using manufacturer generated DRIP enhanced Serial Number for UAS ID. UA using manufacturer generated DET for Authentication. Manufacturer using a DIME. DIME MUST place public information into DNS (i.e. HI) - either directly or as a mapping to a DET. DIME MUST provide pointer to additional information via DNS (even if null).</li>
          <li>UA using manufacturer generated Serial Number for UAS ID. UA using user generated DET for Authentication. User uses DIME with capability to publically map Serial Number to a DET (via a USS). DIME MUST place public DET information into DNS (i.e. HI). DIME MUST provide mapping of Serial Number to DET in DNS. DIME MUST provide pointer to additional information via DNS (even if null).</li>
          <li>UA provisioned with DET (i.e. Session ID) with a DIME (via a USS) for UAS ID and Authentication. DIME MUST place public DET information into DNS (i.e. HI). DIME MUST NOT (unless required) provide mapping of DET to Serial Number in DNS. USS MUST provide pointer to additional information via DNS (even if null).</li>
        </ol>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions" numbered="true" toc="default">
        <name>Additional Definitions</name>
        <t>This document makes use of the terms (PII, USS, etc.) defined in <xref target="RFC9153" format="default"/>. Other terms (DIME, Endorsement, etc.) are from <xref target="drip-arch" format="default"/>, while others (RAA, HDA, etc.) are from <xref target="RFC9374" format="default"/>.</t>
      </section>
    </section>
    <section anchor="dime-roles" numbered="true" toc="default">
      <name>DIME Roles</name>
      <t><xref target="drip-arch" format="default"/> defines the DRIP Identity Management Entity (DIME) as an entity that vets Claims and/or Evidence from a registrant and delivers, to successful registrations, Endorsements and/or Certificates in response. The DIME encompasses various logical components and can be classified to serve a number of different roles, which are detailed in the following subsections. The general hierarchy of these roles are illustrated in <xref target="reg-class-fig" format="default"/>.</t>
      <figure anchor="reg-class-fig">
        <name>DIME Roles and Hierarchy</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
                +----------+
                |   Apex   | 
                +-o------o-+
                  |      |
******************|******|*****************************
                  |      |
            +-----o-+  +-o-----+
RAAs        |  IAM  |  |  RAA  o------.
            +---o---+  +---o---+      '
                |          |          |
****************|**********|**********|****************
                |          |          |
            +---o---+  +---o---+  +---o---+
HDAs        |  MAA  |  | SIDA  |  |  HDA  |
            +-------+  +-------+  +-------+
]]></artwork>
      </figure>
      <section anchor="apex" numbered="true" toc="default">
        <name>Apex</name>
        <t>The Apex is a special DIME role that holds the values of RAA=0-3 and HDA=0. It serves as the branch point from the larger DNS system in which DETs are defined. The Apex the IPv6 prefix portion of the DET associated with it (2001:30/28) which is assigned by IANA from the special IPv6 address space for ORCHIDs.</t>
        <t>The Apex manages all delegations and allocations of the DET's RAA to various parties. Allocations of RAAs SHOULD be done in contigous groups of 4.</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">RAA Decimal Range</th>
              <th align="left">RAA Hex Range</th>
              <th align="left">Status</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0 - 3</td>
              <td align="left">0x0000 - 0x0003</td>
              <td align="left">Apex</td>
            </tr>
            <tr>
              <td align="left">1 - 3999</td>
              <td align="left">0x0001 - 0x0F9F</td>
              <td align="left">ISO 3166-1 Countries (<xref target="iso3166" format="default"/>)</td>
            </tr>
            <tr>
              <td align="left">4000 - 4095</td>
              <td align="left">0x0FA0 - 0x0FFF</td>
              <td align="left">Manufacturer Code Authorities (<xref target="irm" format="default"/>)</td>
            </tr>
            <tr>
              <td align="left">4096 - 16384</td>
              <td align="left">0x1000 - 0x3FFF</td>
              <td align="left">Reserved</td>
            </tr>
            <tr>
              <td align="left">16376 - 16384</td>
              <td align="left">0x3FF8 - 0x3FFF</td>
              <td align="left">DRIP WG Experimental Use</td>
            </tr>
          </tbody>
        </table>
        <t>RAA values of 0 (0x0000) to 3 (0x0003) are reserved to the Apex exclusively.</t>
        <t>The Experimental range of 16376 (0x3FF8) to 16384 (0x3FFF) is allocated to the DRIP working group itself. 16381 to 16383 are setup by DRIP experts to act as RAAs for potentional HDA users to test against. 16384 is setup to be an RAA to act as a MCA <xref target="irm" format="default"/> for UAS manufacturers to test their HDAs against and have their Manufacturer Code properly managed. The rest of the range (16376 to 16380) are reserved to be allocate by the DRIP experts to buisnesses that wish to test being an RAA.</t>
      </section>
      <section anchor="raa" numbered="true" toc="default">
        <name>Registered Assigning Authority (RAA)</name>
        <t>RAA's are the upper hierarchy in DRIP (denoted by a 14-bit field, i.e. 16,384 RAAs, of an DET). An RAA is a business or organization that manages a DIME of HDAs (<xref target="hda" format="default"/>). Most are contemplated to be Civil Aviation Authorities (CAA), such as the Federal Aviation Authority (FAA), that then delegate HDAs to manage their National Air Space (NAS). This is does not preclude other entities to operate an RAA if the Apex allows it.</t>
        <t>An RAA must provide a set of services to allocate HDAs to organizations. It must have a public policy on what is necessary to obtain an HDA. It must maintain a DNS zone minimally for discovering HID RVS servers. All RAA's have a single reserved HDA value: 0 (0x0000) for itself to support various functions or services. Other HDA values can be allocated or reserved per RAA policy.</t>
        <ul empty="true" spacing="normal">
          <li>Note: A single entity may control more than one NAS (for example LU and BE being covered by Skeyes.be) and would manage two allocation spaces.</li>
        </ul>
        <section anchor="iso3166" numbered="true" toc="default">
          <name>ISO 3166-1 Numeric Nations (INN)</name>
          <t>The RAA range of 4 (0x0004) to 3999 (0x0F9F) are reserved for CAAs using the ISO 3166-1 Numeric Nation Code. The RAA can be derived from the ISO 3166-1 numeric code by multiplying the value by 4 (i.e. <tt>raa_code = iso_code * 4</tt>). Four contigous values are used in a single allocation. The inverse (RAA to ISO) works out as: <tt>iso_code = floor(raa_code / 4)</tt>.</t>
          <t>As an example the United States has an ISO 3166-1 Numeric Code of 840. This derives the following RAAs: 3360, 3361, 3362 and 3363.</t>
          <t>It should be noted that the range of codes from 900 to 999 are defined as "user assigned code elements" without specific claimaint predefined in the RAA space. Withdrawn and other special codes also do not have predetermined claimants.</t>
          <t>How a CAA handles their 4 allocations are out of scope of this document. Control of these values are expected to be claimed by their respective owner. Protection against fraudulent claims of one of these values is out of scope for this document.</t>
        </section>
        <section anchor="irm" numbered="true" toc="default">
          <name>Manufacturer Code Authority (MCA)</name>
          <t>An RAA-level DIME that hands out HDA values to participating Manufacturer's that hold an Manufacturer Code used in <xref target="CTA2063A" format="default"/> that is issued by ICAO.</t>
          <t>To manage the large Manufacturer Code space (34 character set; 4 characters; 1,336,336 possible codes) a range of RAA values are set aside for the use case. These are the RAA values of 4000 (0x0FA0) up to 4095 (0x0FFF). This allows a single HDA for each Manufacturer Code.</t>
          <t>See <xref target="mra" format="default"/> for the HDA allocation of Manufacturer Codes under these RAAs.</t>
          <ul empty="true" spacing="normal">
            <li>Note: the upper RAAs in the range (4083 to 4095) are not used but are left reserved in this space for future action if requried.</li>
          </ul>
        </section>
      </section>
      <section anchor="hda" numbered="true" toc="default">
        <name>Hierarchial HIT Domain Authority (HDA)</name>
        <t>An HDA may be an USS, ISP, or any third party that takes on the business to register the actual entities that need DETs. This includes, but is not limited to UA, GCS, UAS Operators and infrastucture (such as Supplemental Data Service Providers). It should also provide needed UAS services including those required for HIP-enabled devices (e.g. RVS).</t>
        <t>The HDA is a 14-bit field (16,384 HDAs per RAA) of a DET assigned by an RAA.  An HDA should maintain a set of RVS servers for UAS clients that may use HIP.  How this is done and scales to the potentially millions of customers are outside the scope of this document. This service should be discoverable through the DNS zone maintained by the HDA's RAA.</t>
        <t>An RAA may assign a block of values to an individual organization. This is completely up to the individual RAA's published policy for delegation. Such policy is out of scope.</t>
        <section anchor="mra" numbered="true" toc="default">
          <name>Manufacturer Unmanned Aircraft Authority (MAA)</name>
          <t>An HDA-level DIME run by a manufacturer of UAS systems that participate in Remote ID. Stores UAS Serial Numbers under a specific Manufacturer Code (assigned to the manufacturer by ICAO). The specific RAA (out of MCA space) and HDA use the following derivation:</t>
          <artwork name="" type="" align="left" alt=""><![CDATA[
mfr_int = radix34(mfr_code)
hid = (4000 << 14) + mfr_int
raa = hid >> 14
hda = hid & 0x3FF
]]></artwork>
          <t>The Manufacturer Code radix character set is defined in <xref target="CTA2063A" format="default"/> with the values being set as integers from 0 to 33. Standard base conversion is used to convert from the base 34 character set to base 10.</t>
          <t>A DET can be encoded into a Serial Number (see <xref target="RFC9374" format="default"/>, Section 4.2) and this DIME would hold a mapping from the Serial Number to the DET and its artifacts.</t>
        </section>
        <section anchor="ridr" numbered="true" toc="default">
          <name>Session ID Authority (SIDA)</name>
          <ul empty="true" spacing="normal">
            <li>Author Note: this subsection could be rolled into the main HDA section removing the somewhat unnecessary abstraction.</li>
          </ul>
          <t>An HDA-level DIME that holds the binding between a UAS Session ID (for DRIP the DET) and the UA Serial Number. The Serial Number MUST have its access protected to allow only authorized parties to obtain. The Serial Number SHOULD be encrypted in a way only the authorized party can decrypt.</t>
          <t>As part of the UTM system they also hold a binding between a UAS ID (Serial Number or Session ID) and an Operational Intent. They may either be a direct logical part of a UAS Service Supplier (USS) or be a UTM wide service to USS's.</t>
        </section>
      </section>
      <section anchor="role-abbreviation-in-dets" numbered="true" toc="default">
        <name>Role Abbreviation in DETs</name>
        <t>On receiver devices a DET can be translated to a more human readable form such as: <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 Characters of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>. To support this DIMEs are RECOMMENDED to have an abbreviation that could be used for this form. These abbreviations SHOULD be a maximum of six characters in length. Spaces MUST NOT be used and be replaced with either underscores (<tt>_</tt>) or dashes (<tt>-</tt>).</t>
        <t>For RAAs allocated in the CAA range, the abbreviation MUST be set to the ISO 3166-1 country code (either Alpha-2 or Alpha-3).</t>
        <t>If a DIME does not have an abbreviation or it can not be looked up then the receiver MUST use the uppercase 4-character hexadecimal encoding of the field it is missing.</t>
      </section>
      <section anchor="text-conventions" numbered="true" toc="default">
        <name>Text Conventions</name>
        <t>When talking about a DIME in documents it should be referred to as the role it is serving. For example a CAA level DIME running services both as an RAA (its primary role in the hierarchy) and as an HDA (optionally) would be be referred to "RAA" when performing its RAA duties and "HDA" when performing its HDA duties. The rest of the document will follow this convention unless verbosity or clarity is needed.</t>
      </section>
    </section>
    <section anchor="dime-arch" numbered="true" toc="default">
      <name>DIME Architecture</name>
      <t>The DIME, in any of its roles (<xref target="dime-roles" format="default"/>), is comprised of a number of logical components that are depicted in <xref target="dime-arch-fig" format="default"/>. Any of these components could be delegated to other entities as a service both co-located or remote. For example:</t>
      <ul spacing="normal">
        <li>
          <t>The Name Server component could be handled by a well-established DNS registrar/registry with the DRIP Provisioning Agent (DPA) (<xref target="dpa" format="default"/>) interfacing to them
          </t>
          <ul spacing="normal">
            <li>Either the DPA or the Registry/Name Server interfaces to the DRIP Information Agent (DIA)</li>
          </ul>
        </li>
        <li>The DPA, Registry, and Name Server may all be co-located in one implementation with an interface to a DIA offered by another organization from any one of the co-located components</li>
      </ul>
      <figure anchor="dime-arch-fig">
        <name>DIME Logical Components</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+--------------------+
| Registering Client |
+---------o----------+
          | 
**********|******************************************************
*         |        DRIP Identity Management Entity              *
*         |                                                     *
*  +------o-------+      +-------------+      +--------------+  *
*  | DRIP         |      |             |      |              |  *
*  | Provisioning o------o             |      |              |  *
*  | Agent        |      |             |      |              |  *
*  +-------o------+      |             |      |              |  *
*          |             |             |      |              |  *
*          |             | DRIP        |      | Registration |  *
*  +-------o--+          | Information o------o Data         |  *
*  | Registry o----------o Agent       |      | Directory    |  *
*  +-------o--+          |             |      | Service      |  *
*          |             |             |      |              |  *
*          |             |             |      |              |  *
*  +-------o-----+       |             |      |              |  *
*  | Name Server |       |             |      |              |  *
*  +------o------+       +-----o-------+      +------o-------+  *
*         |                    |                     |          * 
*         |                    |                     |          *
**********|********************|*********************|***********
          |                    |                     |
          |            +-------o-------+             |
          '------------o Lookup Client o-------------'
                       +---------------+
]]></artwork>
      </figure>
      <section anchor="dpa" numbered="true" toc="default">
        <name>DRIP Provisioning Agent (DPA)</name>
        <t>The DPA performs the important task of vetting information coming from clients wishing to register and then delegate (internally or externally) various items to other components in the DIME.</t>
        <t>A standard interface MUST be provided for clients to access. An HTTPS based interface is RECOMMENDED. This interface specification is out of scope for this document.</t>
        <t>There MUST be an interface from the DPA to a Registry (<xref target="registry" format="default"/>) component which handles the DNS specific requirements of the DIME as defined by the Registry. There MAY also be interface from the DPA to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
      </section>
      <section anchor="registry" numbered="true" toc="default">
        <name>Registry</name>
        <t>The Registry component handles all the required DNS based requirements of the DIME to function for DRIP. This includes the registration and maintenance of various DNS Resource Records.</t>
        <t>A standardized interface MUST be implemented for interactions with the DPA (<xref target="dpa" format="default"/>). This interface MAY be over HTTPS using JSON/CBOR encoding or MAY use the Extensional Provisioning Protocol (EPP) <xref target="RFC5730" format="default"/>. The detailed specification of either of these interfaces is out of scope for this document.</t>
        <t>There MAY be interface from the Registry to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
      </section>
      <section anchor="nameserver" numbered="true" toc="default">
        <name>Name Server (NS)</name>
        <t>The interface of the Name Server to any component (nominally the Registry) in a DIME is out of scope as typically they are implementation specific.</t>
        <ul empty="true" spacing="normal">
          <li>Author Note: This may be very important here as we should not preclude a USS from running his own Name Server but they are not DNS experts and will need guidance or at least pointers to it to not mess it up. Such as SOA and NS formats to allow delegation if acting as an RAA.</li>
        </ul>
      </section>
      <section anchor="dia" numbered="true" toc="default">
        <name>DRIP Information Agent (DIA)</name>
        <t>The DIA is the main component handling requests for information from entities outside of the DIME. Typically this is when an Observer looks up a Session ID from an UA and gets pointed to the DIA to obtain information not available publicly (i.e. via DNS).</t>
        <t>The information contained in the DIA is generally more oriented around the Operator of a given UAS and is thus classified as Personally Identifiable Information (PII). To protect the privacy of an Operator of the UAS this information is not publicly accessible and is only available behind policy driven differentiated access mechanisms (see <xref target="dap" format="default"/>).</t>
        <t>For DRIP, the Registration Data Access Protocol (RDAP) (<xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) is the selected protocol to provide policy driven differentiated access for queries of information from clients.</t>
        <t>There MUST be a standardized interface for the DPA or Registry to add, update or delete information into the DIA. Specific details for these interfaces are out of scope for this document.</t>
        <t>An interface defined by the Registration Data Directory Service (RDDS) (<xref target="rdds" format="default"/>) is also required as specified by the RDDS.</t>
      </section>
      <section anchor="rdds" numbered="true" toc="default">
        <name>Registration Data Directory Service (RDDS)</name>
        <t>This is the primary information database for the DIA. An interface MUST be provided to the DIA but its specification is out of scope for this document.</t>
      </section>
    </section>
    <section anchor="registrationprovisioning-process" numbered="true" toc="default">
      <name>Registration/Provisioning Process</name>
      <t>The general process for a registering party is as follows:</t>
      <ol spacing="normal" type="1"><li>Verify input Endorsement(s) from registering party</li>
        <li>Check for collision of DET and HI</li>
        <li>Populate Registry/Name Server with resource record(s)</li>
        <li>Populate RDDS via DIA with PII and other info</li>
        <li>Generate and return Endorsement(s)</li>
      </ol>
      <t>In the following subsections an abbreviated form of <xref target="dime-arch" format="default"/> using co-located components is used to describe the flow of information. The data elements being transmitted between entities is marked accordingly in each figure for the specific examples.</t>
      <section anchor="serial-number" numbered="true" toc="default">
        <name>Serial Number</name>
        <t>There are four ways a Serial Number is supported by DRIP:</t>
        <ol spacing="normal" type="1"><li>As a clear-text string with additional information (<xref target="serial-1" format="default"/>)</li>
          <li>As a clear-text string mapped to a DET "post" generation by the <strong>manufacturer</strong> (for use in authentication) and additional information (<xref target="serial-2" format="default"/>)</li>
          <li>As a clear-text string mapped to a DET "post" generation by the <strong>user (via an HDA)</strong> (for use in authentication) and additional information (<xref target="serial-3" format="default"/>)</li>
          <li>As an encoding of an HI and associated DET by the <strong>manufacturer</strong> (for use in authentication) with additional information (<xref target="serial-4" format="default"/>)</li>
        </ol>
        <ul empty="true" spacing="normal">
          <li>Note: additional information here refers to any subset of keys defined in <xref target="ua-info-registry" format="default"/>.</li>
        </ul>
        <section anchor="serial-1" numbered="true" toc="default">
          <name>Type 1</name>
          <t>This is where a UA is provisioned with a Serial Number by the manufacturer. The Serial Number is just text string, defined by <xref target="CTA2063A" format="default"/>. The manufacturer runs an MAA and uses the mechanisms of this document to provide additional information.</t>
          <figure anchor="dime-sn1-example">
            <name>Example DIME:MAA with Serial Number Registration</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: MAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number,
    UA Information
(b) Success Code
(c) NAPTR RR
(d) UA Information
]]></artwork>
          </figure>
        </section>
        <section anchor="serial-2" numbered="true" toc="default">
          <name>Type 2</name>
          <t>This is where a UAS is provisioned with a Serial Number and DET by the manufacturer enabling their devices to use <xref target="drip-auth" format="default"/> and provide additional information. A public mapping of the Serial Number to DET and all public artifacts MUST be provided by the manufacturer. This document RECOMMENDS the manufacturer use an MAA for this task.</t>
          <figure anchor="dime-sn2-example">
            <name>Example DIME:MAA with Serial Number + DET Registration</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: MAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number,
    UA Information,
    Self-Endorsement: UA
(b) Success Code,
    Broadcast Endorsement: MAA on UA
(c) HIP RR,
    CERT RRs,
    NAPTR RR,
    "Link" RR
(d) UA Information
]]></artwork>
          </figure>
        </section>
        <section anchor="serial-3" numbered="true" toc="default">
          <name>Type 3</name>
          <t>This is where a UAS has a Serial Number (from the manufacturer) and the user (via a DIME) has a mechanism to generate and map a DET to the Serial Number after production. This can provide dynamic signing keys for DRIP Authentication Messages via <xref target="drip-auth" format="default"/> for UAS that MUST fly only using Serial Numbers. Registration SHOULD be allowed to any relevant DIME that supports it. A public mapping of the DET to the Serial Number SHOULD be provided.</t>
          <figure anchor="dime-sn3-example">
            <name>Example DIME with Serial Number + DET Registration</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |      DIME                  *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number,
    UA Information,
    Self-Endorsement: UA
(b) Success Code,
    Broadcast Endorsement: DIME on UA
(c) HIP RR,
    CERT RRs,
    NAPTR RR,
    "Link" RR
(d) UA Information
]]></artwork>
          </figure>
        </section>
        <section anchor="serial-4" numbered="true" toc="default">
          <name>Type 4</name>
          <t>This is where a UAS manufacturer chooses to use the Serial Number scheme defined in <xref target="RFC9374" format="default"/> to create Serial Numbers, their associated DETs for <xref target="drip-auth" format="default"/> and provide additional information. This document RECOMMENDEDS that the manufacturer "locks" the device from changing its authentication method so identifiers in both the Basic ID Message and Authentication Message do not de-sync. The manufacturer MUST use an MAA for this task, with the mapping between their Manufacturer Code and the upper portion of the DET publicly available.</t>
          <figure anchor="dime-sn4-example">
            <name>Example DIME:MAA with DRIP Serial Number Registration</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: MAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number,
    UA Information,
    Self-Endorsement: UA
(b) Success Code,
    Broadcast Endorsement: MAA on UA
(c) HIP RR,
    CERT RRs,
    NAPTR RR,
    "Link" RR
(d) UA Information
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="operator" numbered="true" toc="default">
        <name>Operator</name>
        <t>Provided either by USS or CAA run HDAs. Regulation might require interaction between them. An Operator can request that certain information normally generated and provisioned into DNS be omitted due to privacy concerns.</t>
        <figure anchor="dime-operator-example">
          <name>Example DIME:HDA with Operator (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +----------+
    | Operator |
    +--o---o---+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME:HDA                *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Operator Information,
    Operator Self-Endorsement
(b) Success Code,
    Generic Endorsement: HDA on Operator
(c) HIP RR,
    CERT RRs
(d) Operator Information

Note: (c) MAY be requested by the Operator to be omitted due to PII concerns.
]]></artwork>
        </figure>
        <t>The definition of Operator Information is out of scope of this document and left to local regulations (both in its format and contents).</t>
      </section>
      <section anchor="session-id" numbered="true" toc="default">
        <name>Session ID</name>
        <t>Session IDs are generally handled by HDAs, specifically SIDAs. In <xref target="dime-sid-example" format="default"/> the UAS comprises of an unmanned aircraft and a Ground Control Station (GCS). Both parties are involved in the registration process.</t>
        <figure anchor="dime-sid-example">
          <name>Example DIME:SIDA with Session ID (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +---------+
    |   UAS   |
    +--o---o--+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: SIDA              *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Mutual Endorsement: SIDA on GCS,
    Generic Endorsement: GCS on UA,
    Session ID Information
(b) Success Code,
    Broadcast Endorsement: SIDA on UA,
    Generic Endorsement: SIDA on UAS
(c) HIP RR,
    TLSA, RR,
    CERT RRs
(d) Session ID Information
]]></artwork>
        </figure>
        <t>Through mechanisms not specified in this document the Operator should have methods (via the GCS) to instruct the unmanned aircraft onboard systems to generate a keypair, DET and <tt>Self-Endorsement: UA</tt>. The <tt>Self-Endorsement: UA</tt> is extracted by the Operator onto the GCS.</t>
        <t>The GCS is already pre-provisioned and registered to the DIME with its own keypair, DET, <tt>Self-Endorsement: GCS</tt> and <tt>Generic Endorsement: SIDA on GCS</tt>. The GCS creates a new <tt>Generic Endorsement: GCS on UA</tt> and also creates <tt>Mutual Endorsement: SIDA on GCS</tt>. These new endorsements along with Session ID Information are sent to the DIME via a secure channel.</t>
        <t>The GCS injects the <tt>Broadcast Endorsement: SIDA on UA</tt> securely into the unmanned aircraft. <tt>Endorsement: SIDA on GCS</tt> is securely stored by the GCS.</t>
        <ul empty="true" spacing="normal">
          <li>Note: in <xref target="dime-sid-example" format="default"/> the Session ID Information is expected to contain the Serial Number along with other PII specific information (such as UTM data) related to the Session ID.</li>
        </ul>
        <t>Session ID Information is defined as the current model:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
sessionid_info = {
    serial: tstr .size 20,
    session_id: tstr,
    operational_intent: tstr,
    intent_src: tstr,
    operator_id: tstr,
    * tstr: any
}
]]></artwork>
        <t>Future standards or implementations MAY add other keys to this list (for local features and/or local regulation).</t>
        <section anchor="ua-based" numbered="true" toc="default">
          <name>UA Based</name>
          <t>There may be some unmanned aircraft that have their own Internet connectivity allowing them to register a Session ID themselves without outside help from other devices such as a GCS. When such a system is in use its imperative that the Operator has some method to create the <tt>Generic Endorsement: Operator on UA</tt> to send to the DIME. The process and methods to perform this are out of scope for this document but MUST be done in a secure fashion.</t>
        </section>
        <section anchor="uas-based" numbered="true" toc="default">
          <name>UAS Based</name>
          <t>Most unmanned aircraft will not have their own Internet connectivity but will have a connection to a GCS. Typically a GCS is an application on a user device (such as smartphone) that allow the user to fly their aircraft. For the Session ID registration the DIME MUST be provided with an <tt>Generic Endorsement: GCS on UA</tt> which implies there is some mechanism extracting and inserting information from the unmanned aircraft to the GCS. These methods MUST be secure but are out of scope for this document.</t>
          <t>With this system it is also possible to have the GCS generate the DET based Session ID and insert it securely into the unmanned aircraft after registration is done. This is NOT RECOMMENDED as this invalidates the objective of the asymmetric cryptography in the underlying DET as the private key MAY get in the possession of another entity other than the unmanned aircraft. See <xref target="det-gen-concern" format="default"/> for more details.</t>
        </section>
      </section>
      <section anchor="child-dime" numbered="true" toc="default">
        <name>Child DIME</name>
        <t>Handled by the Apex and RAA's. This is an endpoint that handles dynamic registration (or key roll-over) of lower-level DIMEs (RAAs to Apex and HDAs to RAAs) in the hierarchy.</t>
        <figure anchor="dime-hda-example">
          <name>Example DIME:RAA with DIME:HDA Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +---------------+
    |   DIME: HDA   |
    +--o---o--------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: RAA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Self-Endorsement: HDA,
    HDA Information or
    Generic Endorsement: old HDA, new HDA
(b) Success Code,
    Broadcast Endorsement: RAA on HDA
(c) HIP RR,
    CERT RRs
(d) HDA Information
]]></artwork>
        </figure>
        <t>It should be noted that this endpoint DOES NOT hand out dynamically RAA/HDA values to systems that hit the endpoint. This is done out-of-band through processes specified by local regulations and performed by cognizant authorities. The endpoint MUST NOT accept queries it is not previously informed of being expected via mechanisms not defined in this document.</t>
        <t>It is OPTIONAL to implement this endpoint. This MAY be used to handle lower-level DIME key roll-over.</t>
      </section>
    </section>
    <section anchor="dap" numbered="true" toc="default">
      <name>Differentiated Access Process</name>
      <t>Per <xref target="drip-arch" format="default"/> all information classified as public is stored in a datastore protected using some form of differentiated access (i.e. AAA) to satisfy REG-2 from <xref target="RFC9153" format="default"/>.</t>
      <t>Differentiated access, as a process, is a requirement for DIMEs as defined in <xref target="RFC9153" format="default"/> by the combination of PRIV-1, PRIV-3, PRIV-4, REG-2 and REG-4. <xref target="drip-arch" format="default"/> further elaborates on the concept by citing RDAP (from <xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) as a potential means of fulfilling this requirement.</t>
      <t>Typically the cognizant authority is the primary querant of private information from a DIME if a Session ID is reported (the case of the owner of the private information is ignored for the moment). This capability MAY be delegated to other parties at the authorities discretion (be it to a single user or many), thus requiring a flexible system to delegate, determine and revoke querent access rights for information. XACML MAY be a good technology choice for this flexibility.</t>
      <t>It is noted by the authors that as this system scales the problem becomes a, well known and tricky, key management problem. While recommendations for key management are useful they are not necessarily in scope for this document as best common practices around key management should already be mandated and enforced by the cognizant authorities in their existing systems. This document instead focuses on finding a balance for generic wide-spread interoperability between DIMEs with authorities and their existing systems in a Differentiated Access Process (DAP).</t>
      <t>A system where cognizant authorities would require individual credentials to each HDA is not scalable, nor practical. Any change in policy would require the authority to interact with every single HDA (active or inactive) to grant or revoke access; this would be tedious and prone to mistakes. A single credential for a given authority is also strongly NOT RECOMMENDED due to the security concerns it would entail if it leaked.</t>
      <t>A zero-trust model would be the most appropriate for a DAP; being highly flexible and robust. Most authorities however use "oracle" based systems with specific user credentials and the oracle knowing the access rights for a given user. This would require the DAP the have some standard mechanism to locate and query a given oracle for information on the querent to determine if access is granted.</t>
      <t>DRIP has no intention to develop a new "art" of key management, instead hoping to leverage existing systems and be flexible enough to adapt as new ones become popular.</t>
    </section>
    <section anchor="dns" numbered="true" toc="default">
      <name>DRIP in the Domain Name System</name>
      <t>Per <xref target="drip-arch" format="default"/> all information classified as public is stored in the DNS to satisfy REG-1 from <xref target="RFC9153" format="default"/>.</t>
      <ul empty="true" spacing="normal">
        <li>Author Note: this section needs a little rework due to the ISO-3166 delegation that we do, thus taking ICAO somewhat out of the loop.</li>
      </ul>
      <t>The apex for domain names MUST be under the administrative control of ICAO, the international treaty organization providing the critical coordination platform for civil aviation. ICAO SHOULD be responsible for the operation of the DNS-related infrastructure for these domain name apexes. It MAY chose to run that infrastructure directly or outsource it to competent third parties or some combination of the two. ICAO SHOULD specify the technical and administrative criteria for the provision of these services: contractual terms (if any), reporting, uptime, SLAs (if any), DNS query handling capacity, response times incident handling, complaints, law enforcement interaction and so on.</t>
      <t>ICAO SHOULD delegate domains beneath these apexes to national civil aviation authorities. This ensures DRIP complies with national law and regulation since these are matters of national sovereignty. The HHIT has a designated field, the RAA, for this exact purpose and SHOULD be used instead of a ISO-3166 entries: ie a two- or three-letter or a three digit country code.</t>
      <t>Each national aviation authority SHOULD be responsible for the operation of the DNS-related infrastructure for their delegated subdomains. As with the domain apexes overseen by ICAO, each national aviation authority  MAY chose to run that infrastructure directly or outsource it to competent third parties or some combination of the two. National aviation authorities SHOULD specify the technical and administrative criteria for the provision of these services: contractual terms (if any), reporting, uptime, SLAs (if any), DNS query handling capacity, response times, incident handling, complaints, law enforcement interaction and so on. These are National Matters where national law/regulation prevail. National policy and reguations will define how long DNS data are stored or archived.</t>
      <t>DNSSEC is strongly RECOMMENDED (especially for RAA-level and higher zones). When a DIME decides to use DNSSEC they SHOULD define a framework for cryptographic algorithms and key management <xref target="RFC6841" format="default"/>. This may be influenced by frequency of updates, size of the zone, and policies.</t>
      <section anchor="drip-entity-tags" numbered="true" toc="default">
        <name>DRIP Entity Tags</name>
        <t>The REQUIRED mechanism is to place any information into <tt>ip6.arpa</tt> when using a DET. Since the DET is an IPv6 address it can be nibble-reversed and used in the zone, per standard conventions.</t>
        <t>The prefix <tt>2001:30/28</tt> is registered with IANA <xref target="RFC9374" format="default"/> and <tt>3.0.0.1.0.0.2.ip6.arpa</tt> - the corresponding reverse domain - SHOULD be under the administrative control of ICAO. In addition to the DNS infrastructure for <tt>3.0.0.1.0.0.2.ip6.arpa</tt>, ICAO SHOULD be responsible for the allocation of IPv6 addresses in this prefix. An addressing plan will need to be developed.</t>
        <t>Distribution of HHIT (IPv6 address) blocks SHOULD be done on a country by country basis, using the 14-bit RAA space as a framework. ICAO SHOULD allocate blocks to each National Aviation Authority who can then assign them to HDAs in accordance with local law and policy. All HDAs MUST have an IPv6 address in <tt>2001:30/28</tt>. A discrete zone SHOULD be delegated for each HDA. These MUST contain an HHIT resource record for itself.</t>
        <t>Reverse lookups of these IPv6 addresses will translate the address into a domain name in the manner defined in <xref target="RFC1886" format="default"/>. However, these lookups will query for an DET RRtype and not a PTR RRtype.</t>
        <section anchor="det-resource-record" numbered="true" toc="default">
          <name>DET Resource Record</name>
          <ul empty="true" spacing="normal">
            <li>Author Note: This section is very much a WIP, comments are welcome.</li>
          </ul>
          <artwork name="" type="" align="left" alt=""><![CDATA[
<domain> DET IN ( OGAID DET HI RVS RAA HDA URI Endorsement )

OGAID = Integer value of OGA ID -- taken from HIP RR
DET = Base16 DET -- taken from HIP RR
HI = Base64 Host Identity -- taken from HIP RR
RVS = List of Rendevous Server addresses -- taken from HIP RR
RAA = RAA Abbreviation
HDA = HDA Abbreviation
URI = URI to assocaited DIA
Endorsement = Broadcast Endorsements in CBOR encoding
]]></artwork>
        </section>
      </section>
      <section anchor="serial-numbers-other-uas-id-types" numbered="true" toc="default">
        <name>Serial Numbers &amp; Other UAS ID Types</name>
        <ul empty="true" spacing="normal">
          <li>Author Note: There MUST be an entry point in DNS for the lookup of UAS Serial Numbers. This section is very much a shot in the dark.</li>
        </ul>
        <t>This document specifies the creation and delegation to ICAO of the subdomain <tt>uas.icao.arpa</tt>. To enable lookup of Serial Numbers a subdomains of <tt>sn.uas.icao.arpa</tt> is maintained. All entries under <tt>sn.uas.icao.arpa</tt> are to follow the convention found in <xref target="sn-fqdn" format="default"/>. This is to enable a singular lookup point for Serial Numbers for UAS.</t>
        <t>Note that other subdomains under <tt>uas.icao.arpa</tt> can be made to support other identifiers in UAS. The creation and use of other such other subdomains are out of scope for this document. The further use and creation of items under <tt>icao.arpa</tt> is the authority of ICAO (which has been delegated control).</t>
        <t>DETs MUST not have a subdomain in <tt>uas.icao.arpa</tt> (such as <tt>det.uas.icao.arpa</tt>) as they fit within the predefined <tt>ip6.arpa</tt> as they are IPv6 addresses.</t>
      </section>
    </section>
    <section anchor="endorsements" numbered="true" toc="default">
      <name>Endorsements</name>
      <t>DRIP Endorsements are defined in a CDDL <xref target="RFC8610" format="default"/> structure (<xref target="endorsement-cddl" format="default"/>) that can be encoded to CBOR, JSON or have their CDDL keys removed and be sent as a binary blob. When the latter is used very specific forms are defined with naming conventions to know the data fields and their lengths for parsing and constrained envirornments. CBOR is the preferred encoding format.</t>
      <t>The CDDL was derived from the more specific structure developed for <xref target="drip-auth" format="default"/>. As such the structures found in <xref target="drip-auth" format="default"/>, such as the UA Signed Evidence and the contents of DRIP Link (known as a Broadcast Endorsement), are a subset of the below definition in a strict binary form.</t>
      <t><xref target="drip-endorsements" format="default"/> specifies specific Endorsement structures for the UAS RID use-case.</t>
      <ul empty="true" spacing="normal">
        <li>Note: this section uses the term HHIT instead of DET as the Endorsements are designed to be generic and re-useable for other HHIT use-cases. Specific use-cases SHOULD add new keys for each section (if required) and define the valid keys and encoding forms for their use-case.</li>
      </ul>
      <section anchor="endorsement-structure" numbered="true" toc="default">
        <name>Endorsement Structure</name>
        <figure anchor="endorsement-cddl">
          <name>Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
endorsement = {
    ; TODO: add tag for self-describing type or leave up to cbor?
    scope: {
        vnb: number,
        vna: number,
        * tstr => any
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16, ? hi: bstr // * tstr => any
        },
        signature: {
            sig: bstr,
            * tstr => any
        }
    }
}
]]></artwork>
        </figure>
        <section anchor="scope" numbered="true" toc="default">
          <name>Scope</name>
          <t>The <tt>scope</tt> section is more formally "the scope of validity of the endorsement". The scope can come in various forms but MUST always have a "valid not before" (<tt>vnb</tt>) and "valid not after" (<tt>vna</tt>) timestamps.</t>
          <t>Other forms of the scope could for example be a 4-dimensional volume definition. This could be in raw latitude, longitude, altitude pairs or may be a URI pointing to scope information. Additional scope fields are out of scope for this document and should be defined for specific Endorsement structures if they are desired.</t>
        </section>
        <section anchor="evidence" numbered="true" toc="default">
          <name>Evidence</name>
          <t>The <tt>evidence</tt> section contain a byte string of evidence. Specific content of evidence (such as subfields, length and ordering) is defined in specific Endorsement structures.</t>
        </section>
        <section anchor="identity" numbered="true" toc="default">
          <name>Identity</name>
          <t>The <tt>identity</tt> section is where the main identity information of the signer of the Endorsement is found. The identity can take many forms such as a handle to the identity (e.g. an HHIT), or can include more explicit data such as the public key (e.g. an HI). Other keys, for different identifiers, can be provided and MUST be defined in their specific Endorsement.</t>
          <t>The length of the <tt>hi</tt> can be determined when using <tt>hhit</tt> by decoding the provided IPv6 address. The prefix will inform of the ORCHID construction being used, which informs the locations of the OGA ID in the address. The OGA ID will then inform the user of the key algorithm selected which has the key length defined.</t>
        </section>
        <section anchor="signature" numbered="true" toc="default">
          <name>Signature</name>
          <t>The <tt>signature</tt> section contain the signature data for the Endorsement. The signature itself MUST be provided under the <tt>sig</tt> key. Other forms or data elements could also be present in the <tt>signature</tt> section if specified in a specific Endorsement. Signatures MUST be generated using the preceding sections in their binary forms (i.e. as a bytestring with no keys).</t>
        </section>
      </section>
    </section>
    <section anchor="x509" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <section anchor="certificate-policy-and-certificate-stores" numbered="true" toc="default">
        <name>Certificate Policy and Certificate Stores</name>
        <t>X.509 certificates are optional for the DRIP entities covered in this document.  DRIP endpoint entities (EE) (i.e., UA, GCS, and Operators) may benefit from having X.509 certificates.  Most of these certificates will be for their DET and some will be for other UAS identities.  To provide for these certificates, some of the other entities covered in this document will also have certificates to create and manage the necessary PKI structure.</t>
        <t>Any Certificate Authority (CA) supporting DRIP entities SHOULD adhere to the ICAO's International Aviation Trust Framework (IATF) Certificate Policy [ICAO-IATF-CP-draft].  The CA(s) supporting this CP MUST either be a part of the IATF Bridge PKI or part of the IATF CA Trust List.</t>
        <t>EEs may use their X.509 certificates, rather than their rawPublicKey (i.e. HI) in authentication protocols (as not all may support rawPublicKey identities).  Some EE HI may not be 'worth' supporting the overhead of X.509.  Short lived DETs like those used for a single operation or even for a day's operations may not benefit from X.509. Creating then almost immediately revoking these certificates is a considerable burden on all parts of the system.  Even using a short not AfterDate will completely mitigate the burden of managing these certificates.  That said, many EEs will benefit to offset the effort. It may also be a regulator requirement to have these certificates.</t>
        <t>Typically an HDA either does or does not issue a certificate for all its DETs. An RAA may specifically have some HDAs for DETs that do not want/need certificates and other HDAs for DETs that do need them. These types of HDAs could be managed by a single entity thus providing both environments for its customers.</t>
        <t>It is recommended that DRIP X.509 certificates be stored as DNS TLSA Resource Records.  This not only generally improves certificate lookups, but also enables use of DANE <xref target="RFC6698" format="default"/> for the various servers in the UTM and particularly DIME environment and DANCE <xref target="dane-clients" format="default"/> for EEs (e.g. <xref target="drip-secure-nrid-c2" format="default"/>). All DRIP certificates MUST be available via RDAP. LDAP/OCSP access for other UTM and ICAO uses SHOULD also be provided.</t>
      </section>
      <section anchor="certificate-management" numbered="true" toc="default">
        <name>Certificate Management</name>
        <t>(mostly TBD still)</t>
        <t>PKIX standard X.509 issuance practices should be used. The certificate request SHOULD be included in the DET registration request. A successful DET registration then MUST include certificate creation, store, and return to the DET registrant.</t>
        <t>Certificate revocation will parallel DET revocation. TLSA RR MUST be deleted from DNS and RDAP, LDAP, and OCSP return revoked responses. CRLs SHOULD be maintained per the CP.</t>
        <t>Details of this are left out, as there are a number of approaches and further research and experience will be needed.</t>
      </section>
      <section anchor="examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>TBD</t>
      </section>
      <section anchor="alternative-certificate-encoding" numbered="true" toc="default">
        <name>Alternative Certificate Encoding</name>
        <t>(CBOR encoded certs here.  TBD)</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <section anchor="iana-drip-registry" numbered="true" toc="default">
        <name>IANA DRIP Registry</name>
        <section anchor="ua-info-registry" numbered="true" toc="default">
          <name>Aircraft Information Registry</name>
          <t>This document requests a new registry for aircraft information fields under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>Aircraft Information Fields:</dt>
            <dd>
  list of acceptable keys to be used in <tt>UA Information</tt> during a UA registration to a DIME. Future additions to this registry are to be made through First Come First Served (Section 4.4 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Key Name</th>
                <th align="left">Type</th>
                <th align="left">Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">length</td>
                <td align="left">float</td>
                <td align="left">length, in millimeters</td>
              </tr>
              <tr>
                <td align="left">width</td>
                <td align="left">float</td>
                <td align="left">width, in millimeters</td>
              </tr>
              <tr>
                <td align="left">height</td>
                <td align="left">float</td>
                <td align="left">height, in millimeters</td>
              </tr>
              <tr>
                <td align="left">constructionMaterial</td>
                <td align="left">tstr</td>
                <td align="left">materials, comma separated if multiple</td>
              </tr>
              <tr>
                <td align="left">color</td>
                <td align="left">tstr</td>
                <td align="left">colors, comma separated if multiple</td>
              </tr>
              <tr>
                <td align="left">serial</td>
                <td align="left">tstr</td>
                <td align="left">ANSI CTA 2063-A Serial Number</td>
              </tr>
              <tr>
                <td align="left">manufacturer</td>
                <td align="left">tstr</td>
                <td align="left">manufacturer name</td>
              </tr>
              <tr>
                <td align="left">make</td>
                <td align="left">tstr</td>
                <td align="left">aircraft make</td>
              </tr>
              <tr>
                <td align="left">model</td>
                <td align="left">tstr</td>
                <td align="left">aircraft model</td>
              </tr>
              <tr>
                <td align="left">dryWeight</td>
                <td align="left">float</td>
                <td align="left">weight of aircraft with no payloads</td>
              </tr>
              <tr>
                <td align="left">numRotors</td>
                <td align="left">int</td>
                <td align="left">Number of rotators</td>
              </tr>
              <tr>
                <td align="left">propLength</td>
                <td align="left">float</td>
                <td align="left">Length of props, in centimeters</td>
              </tr>
              <tr>
                <td align="left">numBatteries</td>
                <td align="left">int</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">batteryCapacity</td>
                <td align="left">float</td>
                <td align="left">in milliampere hours</td>
              </tr>
              <tr>
                <td align="left">batteryWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">batteryVoltage</td>
                <td align="left">float</td>
                <td align="left">in volts</td>
              </tr>
              <tr>
                <td align="left">batteryChemistry</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">maxTakeOffWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">maxPayloadWeight</td>
                <td align="left">float</td>
                <td align="left">in kilograms</td>
              </tr>
              <tr>
                <td align="left">maxFlightTime</td>
                <td align="left">float</td>
                <td align="left">in minutes</td>
              </tr>
              <tr>
                <td align="left">minOperatingTemp</td>
                <td align="left">float</td>
                <td align="left">in Celsius</td>
              </tr>
              <tr>
                <td align="left">maxOperatingTemp</td>
                <td align="left">float</td>
                <td align="left">in Celsius</td>
              </tr>
              <tr>
                <td align="left">ipRating</td>
                <td align="left">tstr</td>
                <td align="left">standard IP rating</td>
              </tr>
              <tr>
                <td align="left">engineType</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">fuelType</td>
                <td align="left">tstr</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">fuelCapacity</td>
                <td align="left">float</td>
                <td align="left">in liters</td>
              </tr>
              <tr>
                <td align="left">previousSerial</td>
                <td align="left">tstr</td>
                <td align="left">legacy serial number(s)</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During key rollover the DIME MUST inform all children and parents of the change - using best standard practices of a key rollover.</t>
        <t>A DET has a natural ability for a single DIME to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute could also allow for a single DIME to be "federated" across multiple DETs sharing the same HID value. This method of deployment has not been thoroughly studied at this time. An endpoint such as in <xref target="child-dime" format="default"/> is a possible place to have these functions.</t>
      </section>
      <section anchor="det-gen-concern" numbered="true" toc="default">
        <name>DET Generation</name>
        <ul empty="true" spacing="normal">
          <li>Author Note: is this section valid anymore? Perhaps we hard specify that devices ONLY generate on their own hardware instead of "out-sourcing" as this section implies.</li>
        </ul>
        <t>Under the FAA <xref target="NPRM" format="default"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>
        <t>Option 1:</t>
        <ul empty="true" spacing="normal">
          <li>The entity generates its own DET, discovering and using the RAA and HDA for the target DIME. The method for discovering a DIME's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the DIME to be accepted (thus generating the required Self-Endorsement) or denied.</li>
        </ul>
        <t>Option 2:</t>
        <ul empty="true" spacing="normal">
          <li>The entity sends to the DIME its HI for it to be hashed and result in the DET. The DIME would then either accept (returning the DET to the device) or deny this pairing.</li>
        </ul>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations and connectivity it is acceptable, though not recommended, under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft. The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
      </section>
    </section>
    <section anchor="contributors" numbered="true" toc="default">
      <name>Contributors</name>
      <t>Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT Consulting, LLC) for their early work on the DRIP registries concept. Their early contributions laid the foundations for the content and processes of this architecture and document. Bob Moskowitz is also instrumental in the PKIX work defined in this document with his parallel work in ICAO.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author fullname="C. Vigano" initials="C." surname="Vigano">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9153" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card">
              <organization/>
            </author>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter">
              <organization/>
            </author>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz">
              <organization/>
            </author>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9374" target="https://www.rfc-editor.org/info/rfc9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz">
              <organization/>
            </author>
            <author fullname="S. Card" initials="S." surname="Card">
              <organization/>
            </author>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter">
              <organization/>
            </author>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov">
              <organization/>
            </author>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking. </t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs).  HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement. </t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="drip-arch" target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-arch-31">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Shuai Zhao" initials="S." surname="Zhao">
              <organization>Intel</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="6" month="March" year="2023"/>
            <abstract>
              <t>   This document describes an architecture for protocols and services to
   support Unmanned Aircraft System (UAS) Remote Identification (RID)
   and tracking, plus UAS RID-related communications.  This architecture
   adheres to the requirements listed in the DRIP Requirements document
   (RFC 9153).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-arch-31"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC1886" target="https://www.rfc-editor.org/info/rfc1886">
          <front>
            <title>DNS Extensions to support IP version 6</title>
            <author fullname="S. Thomson" initials="S." surname="Thomson">
              <organization/>
            </author>
            <author fullname="C. Huitema" initials="C." surname="Huitema">
              <organization/>
            </author>
            <date month="December" year="1995"/>
            <abstract>
              <t>This document defines the changes that need to be made to the Domain Name System to support hosts running IP version 6 (IPv6).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1886"/>
          <seriesInfo name="DOI" value="10.17487/RFC1886"/>
        </reference>
        <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository.  Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects.  This document includes a protocol specification, an object mapping template, and an XML media type registration.  This document obsoletes RFC 4930.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC6841" target="https://www.rfc-editor.org/info/rfc6841">
          <front>
            <title>A Framework for DNSSEC Policies and DNSSEC Practice Statements</title>
            <author fullname="F. Ljunggren" initials="F." surname="Ljunggren">
              <organization/>
            </author>
            <author fullname="AM. Eklund Lowinder" initials="AM." surname="Eklund Lowinder">
              <organization/>
            </author>
            <author fullname="T. Okubo" initials="T." surname="Okubo">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document presents a framework to assist writers of DNS Security Extensions (DNSSEC) Policies and DNSSEC Practice Statements, such as domain managers and zone operators on both the top level and secondary level, who are managing and operating a DNS zone with Security Extensions implemented.</t>
              <t>In particular, the framework provides a comprehensive list of topics that should be considered for inclusion into a DNSSEC Policy definition and Practice Statement.  This document is not an Internet Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6841"/>
          <seriesInfo name="DOI" value="10.17487/RFC6841"/>
        </reference>
        <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
          <front>
            <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <author fullname="B. Ellacott" initials="B." surname="Ellacott">
              <organization/>
            </author>
            <author fullname="N. Kong" initials="N." surname="Kong">
              <organization/>
            </author>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP).  It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP).  RDAP is a successor protocol to the very old WHOIS protocol.  The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="7480"/>
          <seriesInfo name="DOI" value="10.17487/RFC7480"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <author fullname="T. Narten" initials="T." surname="Narten">
              <organization/>
            </author>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
          <front>
            <title>Registration Data Access Protocol (RDAP) Query Format</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns.  These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9082"/>
          <seriesInfo name="DOI" value="10.17487/RFC9082"/>
        </reference>
        <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
          <front>
            <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs).  These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9083"/>
          <seriesInfo name="DOI" value="10.17487/RFC9083"/>
        </reference>
        <reference anchor="CTA2063A" target="https://shop.cta.tech/products/small-unmanned-aerial-systems-serial-numbers">
          <front>
            <title>ANSI/CTA 2063-A Small Unmanned Aerial Systems Numbers</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="drip-auth" target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-auth-30">
          <front>
            <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="27" month="March" year="2023"/>
            <abstract>
              <t>   This document describes how to add trust into the Broadcast Remote ID
   (RID) specification discussed in the DRIP Architecture; first trust
   in the RID ownership and second in the source of the RID messages.
   The document defines message types and associated formats (sent
   within the Authentication Message) that can be used to authenticate
   past messages sent by an unmanned aircraft (UA) and provide proof of
   UA trustworthiness even in the absence of Internet connectivity at
   the receiving node.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-30"/>
        </reference>
        <reference anchor="drip-secure-nrid-c2" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-secure-nrid-c2-12">
          <front>
            <title>Secure UAS Network RID and C2 Transport</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="26" month="March" year="2023"/>
            <abstract>
              <t>   This document defines a transport mechanism for Unmanned Aircraft
   System (UAS) Network Remote ID (Net-RID).  Either the Broadcast
   Remote ID (B-RID) messages, or alternatively, appropriate MAVLink
   Messages can be sent directly over UDP or via a more functional
   protocol using CoAP/CBOR for the Net-RID messaging.  This is secured
   via either HIP/ESP or DTLS.  HIP/ESP or DTLS secure messaging
   Command-and-Control (C2) for is also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-secure-nrid-c2-12"/>
        </reference>
        <reference anchor="dane-clients" target="https://datatracker.ietf.org/doc/html/draft-ietf-dance-client-auth-02">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <date day="12" month="May" year="2023"/>
            <abstract>
              <t>   The DANE TLSA protocol [RFC6698] [RFC7671] describes how to publish
   Transport Layer Security (TLS) server certificates or public keys in
   the DNS.  This document updates RFC 6698 and RFC 7671.  It describes
   how to additionally use the TLSA record to publish client
   certificates or public keys, and also the rules and considerations
   for using them with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-02"/>
        </reference>
        <reference anchor="NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="drip-fqdn" numbered="true" toc="default">
      <name>DRIP Fully Qualified Domain Names</name>
      <section anchor="det-fqdn" numbered="true" toc="default">
        <name>DRIP Entity Tag</name>
        <ul empty="true" spacing="normal">
          <li>{hash}.{oga_id}.{hda}.{raa}.{prefix}.{apex}.</li>
        </ul>
        <t>When building a DET FQDN it MUST must be built using the exploded (all padding present) form of the IPv6 address.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Apex: .det.uas.icao.arpa.
DET: 2001:0030:0280:1405:c465:1542:a33f:dc26
ID: c4651542a33fdc26
OGA: 05
HID: 0028014
HDA: 0014
RAA: 000a
Prefix: 2001003
FQDN: c4651542a33fdc26.05.0014.000a.2001003.det.uas.icao.arpa.
]]></artwork>
      </section>
      <section anchor="sn-fqdn" numbered="true" toc="default">
        <name>UAS Serial Number</name>
        <ul empty="true" spacing="normal">
          <li>{id}.{length}.{manufacturer-code}.{apex}.</li>
        </ul>
        <artwork name="" type="" align="left" alt=""><![CDATA[
Apex: .sn.uas.icao.arpa.
Serial: MFR0ADR1P1SC00L
Manufacturer Code: MFR0
Length: A
ID: DR1P1SC00L
FQDN: dr1p1sc00l.a.mfr0.sn.uas.icao.arpa.
]]></artwork>
      </section>
    </section>
    <section anchor="drip-endorsements" numbered="true" toc="default">
      <name>DRIP Endorsements for UAS</name>
      <section anchor="ge" numbered="true" toc="default">
        <name>Generic Endorsement</name>
        <figure anchor="ge-cddl">
          <name>Generic Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
generic_endorsement = {
    scope: {
        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t><tt>evidence</tt> is a binary string with specified contents (in format and ordering) by specific use-cases. As an example this format is used by <xref target="drip-auth" format="default"/> to support Authentication over F3411 constrained links. <tt>evidence</tt> data is defined by <xref target="drip-auth" format="default"/> for DRIP Wrapper, Manifest and Frame formats.</t>
      </section>
      <section anchor="se" numbered="true" toc="default">
        <name>Self Endorsement</name>
        <figure anchor="se-cddl">
          <name>Self Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
self_endorsement = {
    scope: {
        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t>Used during registration process as an input. <tt>evidence</tt> is filled with the corresponding HI of the <tt>hhit</tt>.</t>
        <figure anchor="se-binary">
          <name>Self Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                              HI                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             HHIT                              |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="se-cbor">
          <name>Self Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="be" numbered="true" toc="default">
        <name>Broadcast Endorsement</name>
        <figure anchor="be-cddl">
          <name>Broadcast Endorsement CDDL</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
broadcast_endorsement = {
    scope: {
        vnb: number,
        vna: number
    },
    evidence: bstr,
    endorser: {
        identity: {
            hhit: bstr .size 16
        },
        signature: {
            sig: bstr
        }
    }
}
]]></artwork>
        </figure>
        <t>Defined by <xref target="drip-auth" format="default"/> in a binary format to support Authentication over F3411 constrained links. Used in the DRIP Link format. A required output of registration to a DIME at any level. <tt>evidence</tt> is a binary string of the concatination of a child entities (e.g. a UA) HHIT and its associated HI. <tt>hhit</tt> is of the parent entity (e.g. a DIME).</t>
        <figure anchor="be-binary">
          <name>Broadcast Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                            HHIT of                            |
|                             Child                             |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                             HI of                             |
|                             Child                             |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                            HHIT of                            |
|                            Parent                             |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="be-cbor">
          <name>Broadcast Endorsement CBOR</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAGnkiGQAA+19e3fbVpLn//wUd5VzJmRC0nrZsdWTnmEkOda0LatFudN9
5sxGIAGKaJMABwAlK7b3zAfZ/XLzSbZ+VXUfACHLeWw6vW3NdCyRwH3UrVvv
x2Aw6EzzOM2uDsy6mg0edzpVWi2SA3N0fnJmjjP669ZcRFeme3R80TMncSIf
vYiy6CpZ0l9mVEznaZVMq3WRdKLJpEiu6fXji5MX9a/ifJpFSxo6LqJZNUgT
mi8u0tWgSK7SsirSpBzsbHemUZVc5cXtgUmzWd7ppKviwFTFuqx2t7efbO92
oiKJDsxJViVFllSdmyuMmK7Md3nxmjZivi3y9arz+sY/MzjCjBjZDlpWURZ/
Hy3yjNZzm5SdVXpg/r3Kp31T5kVVJLOSfrtdyi/TfImdlv/R6UTrap4XB53O
wBgaqzwwo6H5jvYyXyfTOU3Xoc+N7HMUR8vN7/KCFjz6M2CbFKsi/SHpm+fP
D/k7gkKS0CL3n+x/ZQ4xazFNo4U5KtLrhJ+YEvAPzF9oq9fpYiGfAX55dmBO
/yKP5DFNvrO3/+Sh/r3OKsDz1XjEHyTLKF0cmIiWN7wJlvev0ZvELWpIm/ab
/LehOU/SONjcv6VL/xHv6fzi6QuzWKxqOxkTfmRxkdyU5lm+LsNN7D3eNc9o
E3RmVZ6Z8zyK++bbRVRe5TdmPM2rBZ1RsKNvH+6Y/W+eN/b0h3BLf02X/1rM
pjvbew95/Z0sL5ZRRcA74MfOnx4+frSzfWA+M4dHR8/tZ092Hu7hM8XG/1yn
BaN26R7Y+2rfPRAT0uFz/iMiDCdEGxwNPT7jM8JbQrTm5DuPHz/COOnq+pFZ
5Pnr9cp+9fCrPV5XsnIfPXr05DHPGmXJg2pRRu6Lx/s7/EVWlsnUrPJFOr21
X361/5gHKuJoNZhX1WpgwY7d7+zKAuj6Dq7WaZwQ+BO/z+3Hu+7d/1wnxe1A
NhE8sOce+GuZZwSucpVnpY5xeDHa3X60N5Id40fJyeh0fPKAvjX4ejAy42W0
WJhX2TLKsiQ2o6QAno9vyypZluZ0vZwkRekGsbfO/s34tnVI867pipgLwt8s
X+RXt2ZUljldmYouhOnSfL0tv5KouAJKAiblwYMH5TxfDadVNCQCNX+wKvJ4
Pa3KByVWNljrygYRr2xQysoGpfyZNRYYE9E6oL3tPBlsPwmwg9a9gR30mX+C
zo9o4yAr0ngw3ZVnl3n5Or9Jqx8GLY/Iq4QRg+kiBY6G40fZ1H7u5zk9O3+x
cR5bp3mVThOTz8xZka/ykg7hfL1IiLAzEcWFTJZ5lSjJn6VTASq94E8tLaag
rPbctu45sFcZMYOYaAJBqzRPkzgp6NBH13peo3iZZuAEenxPR+HxBSDe2SX6
OxiYaIKHp1WnczFPS0MMZs0cKU7KaZFOaI5qnph5ejU3i+Q6WZgo4EeGMJu/
V/YjkxLJMXFaTvNrQn5stsEHS2aEZc+sS4Dp6HQ8NEe15+lbHoWGTguakWBH
S6TPaMpqTryJVsODlqtkCrhiENDLNS9LXmb+FBUxf7ckEp3H5dCMzFWSMcww
3XWa3GBG7CEF3aZ56HWlX7GZJNVNkmT03XW+uKYPiCLSVQXOGEBLgRTTAzRG
CD/CvbmZrRlK5Xq1Io6IzdrvS3OVXuMDXJyMEGPh9sJALIdyPMs0jolFdT4D
I5brRd92OueO3zNQZmvaKsalcar8Tuwy3Vejcc9h5ZHpnp8c9YbmZba4NQz9
Rbpk/MpXiZwmDeioMJ3tNMoIKOabgjjNNCqrvpmsK5O8qZIsZjD4RwkaZU5w
T5e0yCwhTI2H5oIATXeTXiGySxhBwycLkYHoGBqv41RowbTQPv++zlIiqOZ1
csuIJ8Qf77XPn9E5Es5GNLYXj0y3TBLzNL3Cwezj5bdvHcd5/75HcP9untIl
TissIXlDpwKAVPOoEpxrk98UubtHJy+OezgNPqaSsIAo9ERw64oASgMxYmBX
Y6AfkY8xYQeRm4KW9mpMp9MdrVa0m/QNiUW7mwvsm5t5LgMTvb0m9mMw62CR
vk6CmWntWV6RXIarTIhNZEHQFNDv8wWpbS831xGdvyJ83/x1XaRlnMpoQxI8
buj2F4LkCV+GUg7FH2TbMrppNl2sY8Z0HL0HGY5bySLvvVxP5yaSQ28VnHs9
RvVwyQVkloxfKQn9IXjyM3qV6KF5UiRp5g6VUY+oYIS36VywdEO00yO0Oce1
GCe8frMz3B3ubJ4B0WJzSpAiEXLz+ZYzA6hX6wmJGH2zxD6V5NyNtw5dLQaR
QHlN+EMErGTiui5LOU879Vcb0/bNiFgIQCw0hf6uiGlU9g/mL+kP9s8pUb6S
JGbQmQX/DQGRTo7fIzK3lgeBOiM60oowlbgLX8VgwcAPixJ9xsG/kt4BeCck
ajABp5sUyWz0MF2LjCkOaBA9RcPk2RX9HvnFJyTVxmv9DGum51dgC0BCEKBo
QSePl4XS0r+Tkmg4TjfyaweEooyIXBK9phcj3gR9hgslC2ocxQ0tgPeLPd5g
3at1AUbPx+CYD4HBhCKvHJrcp9vaTaJbQqBaLxTmeoELM53nRAqgJhGscshj
MaF2RttOqumQL9otY/YimTEsa8wCaMACLMPjZp4ShpFktl6AgZn5mkaiaUlX
mdAVoJeJyaWLFBIEbS5a3JZp6Zg24ZU75WVErD5Lau8mGf9GB5EvmZ4lgNeU
N95Xjh4ZUjuu1nTTDZiSfXWSE+XrJsMr2lDyZ8L8MsU3dcQjqlqAqj+3I3T/
PDp88bwHwnyhXFqoBy6QotFU360dQp410LKBgllOUgFEUDuY3FBz4wCX0t2E
FDAr8qVOhe3pcwGiMNBpK4zDdyCqH1cgwgRM16+XOxxyaF6kVXrlBMajJAON
pd8s3+ge5cQtCL2j6Ws5P9K016VIACR/kwYISjeJStBdmoVklWiFDbiV4Dvc
PNo+ITV9Mo+u07yQawu8sqwOVzxfJA5StKVbXDISFipL21nXMSQ3EFWVW4lP
wH3dMOHdWpJIWWERtMc5g7lLl4UFdTyqygKuCIRNFhTBFdLlSuQFEZN6WCaz
jmVa2vUPnXwkU61xjvp6SeRepSRhRir7JfgY6DjNSZ0uhYcKa5lH5dywACdH
wRzq+MJT/SfDh0J8Vc2FGGGekryu8mzEj0Meqpht5yVjvgDJM0giRsT/Ioau
vKaYVpOul4IWLJjTkERbXg+bwvuUbmylojum/oB4nkxzAfXQGB5E1gO5kpYa
irsCDPe8vcmbsiYJmSSlyAnwwZJCmV5l2KLyHIhK5yM89YyYP2sUkICfnVyY
o5xZevDgsyM8CIsULdxSiXGlCs63h+OeUCsITxuQIL1dwEAvTlPC8SMw/6Nk
RloSD+DpDKwZPTlEGDjev2eqryK+RfIaJHG9hpDNR6pEQQ/kC431nCcRKff0
Yqdzkgn2JURQTRLIin3zkgVt3LlXI6H2vaZgJgoLiDUfZoBmcnWJK+QAX5ww
XRClCUJyYxy6awQOEcIJEmAnhT8klksjcyYodxLcVL1Lt3LiUKd6/LS9HnqE
RPQWOagLBgKzZIGRha00VKlu+a1pThjxA6jDIXFPVfZYhCTeSjz6jIRC8Eui
pVZ75usZLqx7dnLSk3uVFyIN0QaUlrbuQKkJy/OiRhKNX+tXdICAH7g5HbzI
IUkxpJGMtdCoyCsnyFw+n1TAV+KwJMnlRSnCLXMMuyFh8wQZplMhBhHykBKx
hnJLbKkohTHdpERv6LyYcUzTlXAGVXiFrQt9Xtw6gYe/ZOoxTpiDQ7urbldO
RYcebS8oyM6Ux2G5qYFfkLpoMzAYOpI0FtuS2JQ84du3wm5I+PgC3ujw4EJu
XqHDOG/INkKhSBqhbfBeaMUXWPEOJgjm6+lihXquS9UPWEKBPA9NggjUhLYx
o1+G5vgaKvvMUXxASwGViCxXG78ETkYmPAnV/uakBqvqxxLYTbCOYg1s4/Nl
qTUv7NVrDI51CiCgsJr1quQlMNTppi0Jzos652cI6sO6d4gNLPPxjZgni9Vs
jbfMq4sXsqO0WluFfXRDdzsDHVIB1h8BATu1d7R5rGzQ0OvhF43BwxEImWep
CnQJGMlqEd0SVel0LCkr7yAtYvDDcQVymcNOscDTaogxKAjE5gP8I0ripd3p
PJm+1q0BHQoIHQAfjQZRok6knSWj/J2xOiZfSNwSllaDzdmVJjfBPSIKwNgQ
8WAZxJpSxG6oE46Cux0zVsumgOtd0AHa1OdQ3AoCrwFHw8aX60WVkjgD1kXf
gtN9XtINIrJm5Qw3uKCe6BReakt4BqcdyAWrEdNO52nKZLTvd8kIbSmHFdlx
9WUSBx0W5mYLFtQgU2KdrLSQBONfks26mxBQE+KaLNhYKxpL7E5K8ADu1xFR
2PnLwAJ1wkI/8fncggNPCLO4CAdl2jXLgbilU4ZJlCBWCYEvSSqAMM3XZV1X
YHotZGzn4R49HZMUyjuU7YPLf8aWGqEh4ykJ8TRO2ensDIlzKxSXIQmxgIgb
1wwXSqxaQ3NKUI3jtMXQpqoh3avdnzNBjai5o2bA1b568Wp84eYkCZWNoXzo
7cuDzQR21W6itDZbLxYkfu392MWKtkq3axmtVqoUMVoRTa4NEO7qvinwPp6v
2z8+CA1GX4HCIpo6ZZAF95pxhhbIG0+HyZAk1l7tVTXIYS/sAZg1douXeUSx
et95BD/jBPY/Ajwsi2ZzuDo+hDy/Hpg/DGIzMEnKlF0I6IIVUmYMFtIWbdpO
46fD8uHPuXruTWZR90PtVcnQIp7IW2BWNI1W0QS2GjaNCbBYAqB9b6KWXJwu
dhOJOvS3Qetf8ggeMSAdS7LSBG+U1+rZSM+yb54/AENwLGq9rEP+FwHS6Uta
0TpbQOyyyk6vDXTKMxuyl4KOlvtLQY700gu2+4tX9+1nlf/rPfOzc6uTBc+J
le01C7tFXJotrGarL/9ik/j9/PiPr07Oj4/w+/jZ6Plz94t9Yvzs5avnR/43
/+bhyxcvjk+P5GUArfHRi9FftkQC2Hp5dnHy8nT0fGvTvcaewNy6VopVkbDU
2nDJfXN4Znb2ibH/D+Lsuzs7T4izyx+Pd1h/hhApk7EGIn+KOEXcKOJzYTtI
tILVCEbjEjrYTcaeBRELRv5cvGGhbFoiltFrutrQXlS0w3GUrMP2RbAS5T/G
ELL8QCAZmpdMAPUlsR0ce43Tvs3OQBFmap4AtU9ijJJtL31IoS1vOU2OEYjR
+zwnpCb8idNlMoAZsCT0qY2viw6cN/c7yaJSlGb+jCXS64QkscNFlC5ZaXpA
l/YYd4C4lJpgnWQPDIAZK1mkpBrAEwXbPxtToReFCkBZg5Mb+TAp1COflOJy
EQ1fBEreN3Tg5SoqQZKt1EhXhE1VgWEMC1G36HRBT4vjCQtKiuukpvfE6WxG
aAOHJMBobfUAP2leUbqwnuREhVixGkzKxPrhsDjrwPaGF8EoQi0elscjFXXN
ILCoRDAZ8PoGs/SKj/ftAf12APc6HFmDiCTd7OutKccvbb3v/C/6cZED9ufL
gfv5cuPLd/S/0Sp5w7+2vJrLi3nLq/Iy/ul8sfHzrvbPHT8fGnJzB7QGv6Iv
O3QhyuCtk9EL/pf+n74xRhc+3BgIX3xZ+xU/n7dCpuXXjb2+u+/XO/Z61/j3
r9f92iF6EMLgBTbOMBifHNlfQTTaAeoGa/4qeMS4Zj6rIaHE0Xy9FRAZ3CVr
Er7dEi4FjBKuxLgFRdyoKUTuKXsmmILM80UsROg6WqxhXZjhAL/eHuzJ0Ef0
O6vzfDdL62+eEEWZzoXXetvdAsFOhYSWiMk7zfTGSoQKX1um1nIxeX148+Ts
+hFxcPruTZvjINIAKyvMwJW6u729c7C3/WD3cc/rRBEbzsVoejI6Hfm1WQDw
TCQYFBA7yhWkFwg7L88Pn50clcMAbuLtELM+0c1EXEvePKVxJ8E6Py8Z+yU0
gKmfurKGZlR/ga+PMnoYhYgyAlZwy6VXePEK8aT86D6t6R2Pe0Q7WMLeE2VX
iZHPntFC7d8w8dOr7zrvBhs/9HX733jcbJPCsNe4H9tvtumHvuBf9ugThgoe
38HjT5482Xh8Rx5/+uQpfXIyfmn2dh49GuyYQ46c5GCSt2/TMsfH8PJjsH2Z
ZX/7ycNwsKcjnfvpUwxW05AOYWm1Dg87arH0Iz55RO/uPNp7vO9H3LG72ZMR
zxNG6Vh29Gjvq/o77+TJx+ErzKi/+9Ycv1mRLKrRQ6SF0BAgiMEd2jZdgV8P
2LCnf+311NCnM6shiOGavJkS/yHmvLhVJKzNUvAZ08iy0q4sjkeXNcsnT9m6
r9jpZ+CF32ioMqMWDMDJYjbkt3fsMHsSDJJU9ADdIFF7sYyqFOcrW7cZeXFp
VjmsTCLIgc5BbxNbXlLSk1dRmpXVUBcIrwMPLFIo8X+9KzpqZF4cjowepFNA
lnVrvw4ttkKmvzoL38p5dG1Nypv4AitcUrAmiHutFKhISucbFxh3BcIKke3N
I8PiFcDWN9ME1GSdljAnJw0HBS9+kqgRFXZbVSvu9/yROFlE0XtGtM9tYF9i
1iuYHL1gY90eXZIC80oIYUQi/WBCNJPkrEXcN6yM7Tzq41Rwln0J8wAF68GX
xAfDXGMCfRyEkk4jL66iTINfZFeOQApXoUH4ROgyzuOIPRsv4G3AUkHYkiUp
i96zdphep2EcZnidD9nVGQY4bcZtevA85aet0yGzxDqR5dT81oQZp87oD88D
M4Du6Whs/TCsgSTiAiGGxK5dtZKz6J2KD0bsqg6N05m/yZEYU1PYQBWYSwT0
WAU1wj0AtEqJSyht+ME0XHMI7pI5MA/CKO783BKEbTjwJmKTe5ZApIfRG2M4
VxuN6seAv1i+YFb9A5gPgmCXbChhH656u4GHxBbN+Z/GIgAUwsrUOq+Lgc1m
EdwRkAImhQchHcS4QnTCuCPLKH0AHDyJChirw7kBS6s3eArHbgSdGFcB4Baw
EPh/b05zBPCO7BpVe1pGty4EZil+KPgqCA6ECaaLpSZvIgROmOevmLR8c6z3
luEi92pMSj8tcpL0+BHxBVhcu8kDIUEEjZJv+2chYzxFKDkd5KmKBt2T01Nc
dcsjhRNgT44B7CtI94W1gA13hec2SBV2cQhSLUY1FrPumplJpFBETKZQpiuX
Xttwnsb7mb7PXk+YnsU1c2un4vPCF/tq/bkk8vU9P/01IWouv35h9i859GNd
BMKPnjU7aErrptYT9ECV5aYZsDJhIgmA0BJ7zOoIkxDnVh6YSzfd12a2yPOi
65bywOz3LnFPRbfWM+cw2lrY+FyU7xb4MW+hY3m8v60URKBWNpRSENoDs7f3
aLuP/+7wf3cZceiXPVoDhGwXgybE29I0f/pYtXpfnpA8QxsGAgSCNQjmFhtQ
nSzMO9Wg4XKLJWiAxkXjTWFBAE0AwQusKeqGE+RFwlE1j4voRgJihCRaqVqW
xc7xOGfaybSBx3OxtDIPrYE2+wxubvbF0c2LFwIuIsj7NdEa+8JSQSynRHKF
UwdGoqGLb3EafYA8jVgOnt8FVLAHFetHsozJbzJELpxp8BSiflSwmBXROl4v
OEpITC00FUhFc8a0rK9V4gjCxcr1v1uUJV5GMhDffxKCLPcYSBqBuAtZaSOI
yVwBYayFPwDhwmk+L726BzzeXIK9Z2/f2mwaeACVqaRluVad6nD0EuJpLRaM
1b6WMUW76u7tm+k8QrAIR7pVvzPBB+XvzE6fLgD+5+K8BJ16MF9ZvA/EaxVR
Cb/BTW1CBeyE00jNURqsYxHYy+WsbHRFvegZEUZZ8+iKpmGlAOXhjuoA0MwV
EI+0sVOCyDhJCHbLIlLZFVPjpYAH0PQbb5bqgRZEAo0IuJaX71ji1hupUur+
Nknrunoh/Lh1fIwc32tDXx07sBZhr/NqskU0tb55WOFJS4tFKnWRZh8MNCNk
hbTHyIoNg7WKeM8m2pPxWZ99TxkuXVrEGgoplI0tvOqXd7Imh6mLQKwhq9Ua
WQ9O+uJY1EQcQ+WwHoSnIYIiv9ncDCR4jPrm28Nxn5WKIO4i4/jlIioryYTx
YfWcZZCo+sVBcDaO9EyDkBF54Ik2Ez8r40n2Bk/mpLwwsB/Boy7AC2fx7ORs
YMNcJSyt1Ogxkr1sKC/gy3J5KM9DYWFRniVHxZaej6IMTSKqdBijh6VLDwRC
FU0Dgc+pYpr6ZWX/W75ytG4aDtS8ctJzlkg60TRaJDa0w+qK4otDAqZaQmz8
tiP2fKvZYnMHxefzVqgGHNPKrBI8rcFqrJw5GVe36WPqOH5E9TArqtPGBGTQ
f+jyvsYSPJGN4NaKSXeJgZShlO4VCNi6F8T3aKtCYiRi1r0l0jPL8OWcowdY
jJfoSWtoGhIGsomNv2swlzZWshlXGvIVUSFBoOxVDfkKYrNYU6w5bZF2Nxq7
yGI++EaMncuMouUioqu0mTphQJdG2XiJY5NXdB2aKrhqC1HO0xORzw2D8+oq
WGA8YNLWs4ZLxs+6EMaiGUP3oCNm1uWs+B6Sz9dEV+P0zd5+F5+A//Q68zSm
z7vMM/75n+nS9cyXRl/okAhJX+KR3/+evuoQEdS//0kMRjI+39vN7fJkdbYo
0WSBKytgxGz0DKy0oooIE5RUKb6okApZJtzbw3FoNh/Hs5NwjcuseWLMJug5
+TSw4PKzTYbN4hO+2NnGPWGqohqCRD3G4undiHosmSk6B1nfBGGQPY26Sq33
nu+xCCjO+evWteE9d5ZhEHBOdNSUR70ZQVBncAtgmGdLShoX78Fo5TvHb0FY
nPPIBxKSfLmwmxTcTJV+6pMF3YJrq/kgh4/V8XXmtXGbNSoxrJsXsGGNbwaC
RXqt3KZYR2VLj0LCwhMJgHVwyaWpQ5B90yyiM/BsUoWL9bX5EOzkbUnNcMaF
tsG9XZvQo7hdVVaFu4k0cJXZen3UW0apOOEXRCOzYf28qYsX1qcg3mZwW8WW
dmBJllm4Lg5j9bEPbMfPWsLmeE9iJNAoGgg0NhbROjR90kFbbqKmJub6LpZ/
A8Zm+RZEEsQwqgEQDpkRV7FIXYISpJtO5yWwa5qkHBqugkEUXkE4d0tnWIvE
ntFIYULsgzWnkT78FoQznO69eQt0bnz0HNl9++bQyeo2GONZVM7fX7Kp0KrM
lk27TJnLV2PzlKZ5ery7R49eeJOPu/PC8oNoBmxAbEp0iCE0+Ha468jUy2lX
2JsT+oOXQv8KKMqbdLleMgMNKS+L1aTcXVXzoVgDSx+dYucCpoAMJBztoj4o
RQ3mbcSTwfq6l99f8pnHBCD+e3AJ2e1priK8N1ulPhiVBXqJk69tmpcxSSwF
bthftBiFKPddXcxosZpHg10sQX7dw/QnM2uidZbNViizgY7RCo9MEo6oprVC
hplrNKrDRV6d5bCspUD7MvsDzzrmhByx+qyYUWg8D/NkFl0laHyZcpqYXIWL
5E0Fpf5aPAslElExd7Rg50U0YauObIeA6NPD09B8UiSzpCj0SghJZaenTMiX
kCZEypHDYLFG1GWiTNisCvCcjieGIJY8QDpXBW2PjkFGb+R3KI0p1QJLsspK
CM3ithfklNWXu0Vjb0mwtkZpS6qT+BbjNdNfjvahIdsfxFzy4KaTI8i3XyxU
NJKLNHVANxqVRec8yUtNZ5uSms8paS433cW7hBV3bNgLx7mI+COxN2yIvrW5
BxJ30X37NoiRQaq2Ss9FyhHbs1owSEsoiaTGsvVrlU5d6IZbgYZucIKMs9cE
7zuaYn0GfAQNcz87pyzhZiSY5oOa/RkycA2buFYP9n4aLZk94sq4ef20YvxS
L81NslgMkG5s9QJoLjYyp3hQ2JwcJw0y/z8LQ/NHVxi+e3RGYg6Au4o4mVoL
NWjcJ7267BgzMMdCNXios5FmFrjcnwfh2oNaD6FPMcwZsnOfjHq6eRq074aT
qLFwTFa1JFk7AGgqhvh62qIGKmZ+HRq+eULL5hAh1W/l6Gq+KomEAgI4o104
n8cGVQm+3PSeIyrjnXPTAYyHrAybd8HTeXukzzvT+UBgysf9dL7YjFa5L2qs
9tM6wo/64RG+rO/0y3o8ywc+xKc8gjrRG2upL6n1Q/ypI9Qw3oZI/agRBFV/
+hrs5vLaln/MCI2nPvTXjxwhhK8boZbd27KLL8MRwkvtwMsWsOYa3MC3JsD+
vAZft4Yjlp/z4jYc4a41tMLBCtm/EiQ/foQ6Pnz5E0Z4V6OM737CCPW7adfw
Zfhh424Gn95LH9qJRvDpF+bnD3EfoWynnuGnndaB713DXa817nmIoo3XPg+J
XW6eS6Ud5RJ5+OVgM9ixMZujmbVIwJpMU4sEfK5y0aHjZBoI+GH5gAS1VWRF
NGL/LieQrZVL6GoIG66iUkygiVQuqBU3ypfOTGPNw4h1UUHDmfHVNBGEZnSZ
kUu6MotN9q+eCwlIxehoxbHNzHpN1xv5wlVeOrDKk8vQmrEIqxZsW0eCVdhn
FxdnY80R9AOQIBpops7LYL9ulBP5CNffBeLf3bpqooxPfj6TiKggg5zjkPl3
SHJehJSQx8B5KmGX1jRaL+wx8wmHkbcyqhHczsW6ApY4+ouYVybJB9d4lwAI
8ZvFzs2pSFwLI54KTZ5wu/XbsxuDfCh6pzpLsEs5qzu3iBRpDScx1kzWcBPp
mI0iD+wgSDJkeYnRXxARU54nZb4upljrFGkeNbxjI9Ym7jkRVtGPn4hcoSsr
xBM8nai+gWc4DBoKjg1FVInm+Lfxy9MHh9+8PA8064Kftjr58RsuGMN2rRoN
gI87n+YL0z0+O9P6DSgECT0Jp+EC6+s4jqphoi84RSpQCn7EDZAdtWCWQ4Of
jV4hL+2i+sLbz1BAVDxa731dHFmA4k74Ejt6QnzsZiB1TK7CpfbEsCnWiAYI
YHe4XWn6WWUzjht6jYXxcMMazYig3lQuPOJJMsORhr9JwvIGLlqNc7gErNaG
gbGQgxPuEY5StywMADy3QYwc0AQLATtaUbRTbgXR8grloBDPJolWTE5TNlFh
kCVXqarMeqUOLLhSX0rBChpfjrP0Fmbv8OLscClc44wsQ8/H7lA12d7g2NjJ
yJbBYxt9g55gaFAN0rFLvZF+TIaX0/mtIzKgK0MUW3DHKZ4+Wy7g5URwi01m
JSxmtboSqoLCNA84XCFvR8DnQ3RPRkHIXrgwQDW6pivJplyJ/KMlSFSV5rL5
Yk8hc7beTscvGTqaDQM/LEzFeZEKiYqkYEwVJtGzBeYqRZ4crNxaBK+aE1UM
UnfouD66+gibgtXTII5huOSmtxqDGs4szoyxArte6ZAR3oJCK01xmS1Zofgt
HNAmCUpTWV9qXPCGXG6RJBaoE2SZTAlX0nJZWv9VHK2kzOFT5SX9kATIilg7
0rpcnr6eH43O2A6jFXLhAhN/2Pbj3ffvebH27z2tesceJLoTbMxa2aGqPMhv
vH8TwG3Ukkol6mUDzVUQ2pRK7mJpNqRFzUQ1Sh3HfUJ4VCcx6sCuF+byfjPQ
ZzO2IorwmdKOXecnG5FfbQxlFApR7VJNcDxe/3QFwc6PjsZ8QEUcl3oALPo4
cSMqg9qIdmh6qybGfMwkbz/jOTTJUQ/aWo9DaLkSZA7mgFptqxvCbUBDOPyl
Kn+CgFrfzoOmzADEEiJj0+lWWruJC544YZ8LvrFDj/NxbHGJAy788CeUJcF+
V+sqzDLslj1lWM1RUM3hkOuXsARva41ZVxT7+k9QReEsX6FM4B32Sxa3CivE
FSzE0aRI/vcv0kEJQSU48guoK+KDHbmK+8Oh+dYV7OASctW6yBp74QJW9dCD
ICmx5ngR2XCptSid5fy9ynmthsrQhW/Td2U69tnWLrzKdMBNGwKq4QPsOEQ9
usSX7XX8j2WP4rWQFIJVyhUmiZFwBNxMqsFaDHVah1q/1atZ875aUsOZswj3
vYluNwslsQPe1gzRDBTBHHjPiG4lUTGo4CJCNRxXl6c9z5vutVbO3qG7DUS6
Y5BmJY2tVV5WW7YCAYbSm//FF2FYyhdfiBt+zaQrLL9Jr6jv576V7WJle7/E
yjjmV3L42dvU+yWWB66EO6Lx0YETD5OcqH/LJedpGZIfDaqPO0VUy/LRkXc8
zkjG/rTSSvF89Zj4vU5uG0E262iAtwdeydYAEi2s9fYzh0KedN8IJkOcS8vN
UgtNpFaIhPBoC5ugoaTwqz//fsjVwoggrQsdxhWRqM+H9EKrw7lCfoFE0wym
C+WKdngOOz6tuc0xIp6Ody3BZ+/sO/mg5hsJvCOwtf1P/NGNevzHO9Od9MJv
XcLvu3udJ9b8+M4a8SCzH0hWbu1n88m7ftyT1xtPhmnd7km/2XZb9jv3JH6D
LGUC2+Dv87Ynv3T2R4zZjXt3jtmc7e7Z9c/utFd7ktjeA+aBjSevP2ZMv87A
UHrH3j2HHrcYtRtjDj5mzNaf1jP6mJ/QEH3PT6cD3K1X42IEJtoQ6D4dwmuo
w1q4N046AP7p6Ozi3Jyfd3CsjRc2TL9ltjNwCSpi/T3WPxnTgehMfupUJZTp
xCystG3X07bdVto2/ijixnXFPNmvkSQOaNawuNSHLxHRAR+oVxvDOPeQIjOy
eW9BcZjW6EArGcJ6qK/4nggb0vMd9Dmkk84UPN7cJfaidNeJ1TCafyKd+PlE
Ou8d8xPp/BDplM/GyWI2CJSsA3pqg6jKo74zQe15YHOe8Wt0eM9OzojwyguH
x+cX9Ecpf1miLH9tPU+z11sfT6N3fwqN/pIJ1p2Ues9T6r07KPW8reisM6yH
5MrHCQcKg5EKQzKKkxfrxSnZP7Kql7BssIIZfH0r13RFiSgCCi1lj2+zaEnU
2Ca5s0DuQpnrZcbMC8ROI8Eca6xzC5uTwvFfTNBdUVzRm+sZCMO6pSYIDIV6
rgoWaQqu/YmPyVZ1lPO572RAd4LEz+TLU/7dcgXhC613fuPJO6mD/PKJK9w7
5ieu8GtwBalc8f+cLex9iC38BJaw71nC/h0soSajTud5XnrRe5NQldM5QWSz
lp5UzUeqEHdIaNDVvkr2dROQUPQfL97fIXIfHymd35C8t5CeV25JXLPU8hf3
BvGvKxsMXbc1aV8z9D0KmynRfjmwFyN9E5Wo539k+U9LBUz3lSa7x3TGt9m0
xSrjwuTbNIS+jwKwDCWo/NxaxcYxb84LbimV5Z1i1vv1d8xxPukh9zz5iePc
8fPb5Ti/jh6y/3F6CIvd9xmMnFO+0zmzNhObGHfLsSZSaYaziJGFzuK29uzS
tkXqUA1joEJat2QPp3P+Tzl5jQM1NPcrKVriIgqpWOQrRTsuoxYrV4AYIVTq
6orXiZi9Jexgmmc0OLePbKOSlji6pW3QxF+TFHIxyQ1Ebzz5gSshv3wihfeO
+Q9NCh2ub1A/902TDN5BAr/Vli01Aggkzv1lv5MMMqVrW0unIx5AvKjRhEos
vDHXvSelfxqXH359f/E3yKdtmvFBGoptMA11U0m3+ib9lJBK1z6LRLW2PW1E
aGy46kDbbDNDaV/lGyOWRGkgvoJCSmjbMpI3uPBeVpU965K3MWkoWWN/l3Ab
HxcWZKWBnPd9MAm+RRJ9yU2eNGChTGMLKS4aJFFbNo2vVG+xbW7te4+whf6D
fcqG5htsy2adc/ykbSxsy+GEhh2NSGmn5ZaUG16e2aDkv6pMKyWCG9e08eQH
LrT88omQ3zvmPzQhf7Hmykk16suIR1cFxZDuptH0rQipVup1oawfcmp+UO61
E9sxW+f1D403+MLF8zHSSdu4xB3r25SLPaVqpek8vVpjfKmNO8i6VBgKoiu4
a5oLFtzowFBjSxq3zXn42mpdbPF4CqSPo6oz6dAuGv8G/cyzSY6sF1efp9ZL
6nVyu6JH+84Zetmmu1yKzaL9O+mHyHVLWjhrbsM6abkafgy04RBKVJ5Ah8Bk
EIrjEi/nat2GfbC0rLdEqYdL77etjea5lD19EIvwmOwPC7M9PqVbWfubDu8v
1X9c5u69y3uu06WtQoHhk1oHBd/msR1TtaZdVtVgIq4ZbvCasE0rSxYhoLO/
JtNKYnwu7710lzoQR/HpLBsoNTSXd+5OCifoENo/UlFCEMAGZqUfEAzu2H6j
76ZGrre5mDwkJSYTkpwLP6yFjdk6bii9gvDHHrw7YVHsoF9dKAw1FxbU1eTM
8XXB/Si4C6GtIlXK22n8PZZgvjZvmUaJhfbAVHSNzbBMf0jM7nZfv+I3vk9j
+Vo+zX0tmu+lb3P4rXzyfVlMN9/Ji8ZQX/DvB3BrdbQ1ReepFPyzMd5ca7fR
Hliyv2Ib8sr+OYYXGizSxZUwPpE/Z3Qv1kXiOoQ0pdKehtK9GsGmmsQ2BFST
WlAnqYWqaYlLV8kbBOGEkwUTFE5ATaUqvUaGe2Rja2FAqOcb1pp60rdlsrhO
Slf61GZ3oC2kmIxluzZCxeJOxKhtuAKJfOYaG7DNmMMZ4RtcysFdJ95S7egk
vKq8VzU9e2M639xWOhQQWb673Bwlq5FMIWyroH+u5SOwbkgup5zb/bH0HDVu
42JsMwJHemZROZdQQDnNsT1OLu+9eYKSN5R/5Clian5Dq0nbL1H2J7cn4DNv
IsdkMrQcWrj0NNfbUj0BjgCUS1IfVnPaVU/rhWjNE3WBV9JRtaq1fJVqHg2S
VdM1HJneiCeytSruZTHatmKJilFMXQrOO1VksV545cBSNB5yRYlOPI1MXOfr
b7lQnksrg7KI4isM8TnbuqH3Zgp8J14LLFVvQ+UyJ1wNV1vLSef2oon1VEgW
ZwBevzsu5nM/u9KIg9qxaAVKX4yx0TFL6Dhf3+tokcau7Xc++autBSzelKi8
XRKkuMg1ipLlV0W0khL7spoY7QS4zzqX2fTZTJX0AwMpvUJhP3kBkNHNskYc
VJm5VfrDZcjv4MxSYTZOqgFBcqDWCw2F4EQuzacRRf9wni6k4Wen88yr8xhb
itSj3zbKUHpASUdmaeni6gwjB9cGbdTg3M2lZTZq4w2QntqTEj03SRHUtZPW
WUyS3LS2wj2+6G3UTPqQt8pr8KJEizm03Uv1q2rz5588VHc9+Umbv+PnJ3io
mmoQGtIxIuMi1Kq2FHer2KiZyJ3soKbQLz9Oiz8X7xW/9yG7bWNFm6r4PI4+
qIqfOxeVNbY2NfC76+VDnbCU7Ojl8Zh5wJwTuYi1KTljaYJmeVAvol4rdjtP
RZazo4U9QjJmlIN8NpiIU17sASqQJY28wU2LLfuqREyTR6b5FWpWwdTre6GI
lOd240oTItFzVbkkz9TVvF4hrSxflwubVSh11CTlyylZUC0blota4f86v5du
3ra5JFsmrNZQh7bCR43yNkVN+MgGb6izD6kmV89m9Qm1/O/bz5CK2+mcJUW9
WyPHeddSn2u5ybZlbmnVVhZuoRNKE3pf91RiB1n+skl57Qm2knw9QlFl4AzN
Ws4Im46/HexutMamnR21DdIXDUMRpi+VvYOiFhIXKXUyy83IHGm7rTx9mi8n
aeYKNZydn/xpsNOXf/f03/2+LpB5P/22P2yAcbYuRCZZRJO8YMlIBV0WNwjf
gKYpC5/IbdYQ04/Pb5YN20rghIGRFAGfrRcz1ARnXS6ttRqHwSOsotByTW6b
6bS4FXiARrby2IasbIs2zOrKIk+u+Yfch56rWqpEyE0i7B9tI4M2XGW5LerO
gT05dtFzsbCuPbFekpbCg87dIcQnoAZc5LxIRACbJFp2wXUpYHUG4iAp/dwR
yXVtt63Zkzcsm9tKurmbHplm2qhDzXTX+euEIcnOJ0H7Ar78jdIJQ/Pn0eGL
53ZHkbnKoeYSedFOutN5nk4DVULWwWBw1MV1q/JbtuUdy5quYcvKi/JLu1nS
pIT/AFifayia11muXUogvb++7TOpWfoSefoiNPt0IenAJOpnsZLmmcq2wRva
iwa9UquwZoat8JxKduxd+nWEpNsSmu9yyX4qKHSS587er8ZsrqWA2FEnHFQW
uxCHBLCfenC1cg6VrFMUVyK+yYRNeFsz0g5mZpqHlj3lpEFcES2pHJGWtuDK
H9jTlcoTqGQ8KFdYnAR0sA1K8dpGdQjlEl04WJUGsLUsS0upfJAFdFFRQWrv
CDZIxGM7AKTCqo88cfX3p2hLwySIWT6nNGtvBbbhE4YhcK6PEBN7VtFCqohy
bCHbR7QQQ32W8MLeig1fAl60aDBXcgmainQj1Tlxo+R3ZilXQsAKexHlAv7O
1IssE4S4QpHGvWSsdS8JrGisMfRtr/yGNVlfSnrUCChr7yRf5Zzp3dSa1XEu
1SlIMcdL1oMOMiRLghkxXYCoplwl5jXHu4/MD4Qig6rg5mOwmwY7YBKJLnEr
NOgrcOq6Rjrq36ncMie6g9Zkln4xhcona3QXlB5zwbHPSc641rysLWJj00Wy
pcYGi2l8Fs5szGQzxAkbZCkvMzmxxd03CaEFJkbRm7WJEmCWrObCIsLyhatZ
Vku30CZwWABI760bXZfSLFqj7NmSaSboloxzOR1eLYq+AJ/4NDjkCzbJLFeL
spraYkhm+Ur9I1vEhLY0ZzogTX1HLeb5Ssu8QaQrEA27caO1cLY7tySTrhyo
GhKtmCxirjzjngYg4nSrUI1BxUEs1Ravke4zUtNB7j7Jg1n5C8mDPAVpig1p
bqdNmmttG6AmS5RLgpBDpLBizoJWZOHtORm/HKCEd1j4SHpEwvKqTJvuL8CI
nhe+nYCa5TDIIs9X6gmKYFbhziECIK5z5Sx7rrsQARwt/kR/uk5c9zsaELNI
SRutyaex2RWM1Lf1Wrpi47SXYYobJxWZuUSEPkMaDkvPXLCDuzxGWmJ8KFvy
WTHaRDzVIvVy66wTxIU1n44H1nejzXoK7dbja8cE22eYJNI0ETLJlNvtwD+w
Vlg3RpHK/lKJEK4BKRIiwhXCWJJKNZ3Cd0CADxf42pC8sd7qJq9vVCiN8GoW
ixhoUoChfioEUPiMHCyc99QXXbPlyA/kDLU7kra5x51n2U+EWC4hsF5VpHD3
zfj5KHwC2C40xtXGgnRK4v1t3zV3N3iVy+ZxtLx7tC89blAvjzSXRXRjZRIV
KHyQJ3cCIskW7oMQJq4SpBwc7n9G+DbXXcoRclExi491VGoqyayFluyOYrLB
60vV5+MHwVLVDW0DVIlHThM7LbunKtvswL1WctdHku0rKZNonqEjluTLxQmy
2aSSizRYxcmdj0Z9LwgmbyACrNbFKi+FvPs7oK3XhKpywS1HIxLpmnxgUojV
hFcDKdJdJAkp0lgmV2STTwiNr9Kq1hiAYH4M4cbtYwN6t7/8ZUyLQKkp1xM9
YC4i4vId9LrqMefcwzHJbKOfvshkH1r23+5mn965Krz9/8mV7/8ydz5oxufA
9kLvl4ju4c18ENxK2LFIlgzArfK2vb2RraPJ7dlhHIHkZzhAABvlkkccVyFM
HhcFfQquRQo6HY+PD0UGUJE3FHe7iXa21Ia4vg0j95km6Y+uHpqKoQccu4dt
h40EUHOJVjoNq4yO8PFaIzSWXIp4wIzSu5hQrWBxBYSaqwzVUA9ZHHn0eH9H
CsH4OpGE/Yt1kqlqOOOo2Exq60mFNsRyIgxB8Rk7kLr8DNzUVm5iCqp15C+i
K637dX78x1cn5wQdL7Km4m1GWxROoN0o+3aZrh4No2IVXUqtRLGwcRLx0Iwt
5WUPmrigTs6uHyEAodA6ktrlJksnRJaI8jCliG2FGye7yU6QE+UEa9/PQgvd
Aadm6Rtzubu9vXOwt/1g9/GlGHxcSBLTp5PR6aiW/saRRnvDbfq/Hf7v7tBv
azBQHbyQGxRLlUnpSqtkjp4J6P1HymQcYmtz5Zzn/3TcRnbvWl3/YwSueo/K
8ACsFYELgQB2nKahX3KJtkWUBXVCJdhaFQm5Z9heOlnb0ZlvdsM5etJlL2zX
I8b1jIMBhJmxeVx/jcqU0Ng3NdZmiK5TrVgZ3e2qi2K+c7tMatV/3xV8s8H4
zTxnNKz4nktvQBtyws5MMDKuksaWEsYhsfdbaUMbUnPrbH7D99/aQPmshp9Q
4tXoJ0gegslx2ZltTcp9voXm8hQ2kgrVugD5RgW8oCk3ndW5Iu2Ci5eXnv80
UILP27WdUky2q2d7ZCiM6wVlf3axYcbeefz4EajYM1Ha+zqjXQJPJSyLde1M
0mLPKyTBArJcHNVIphQ+1CAVSZ6tlWxuL7Br9ba0lCK7S4ny+Q5VPsUoWEkA
zU2ygH5q3dP/LFv8Pc90cmq65uW3o5MjaY91wv0zgZAw8bw6Pwl9aKbX6ciz
X3NEzBVBRZplIzXg2xGs0KAp0etETdXiZOtg6K859GbnEc/T+hRNLg892ieg
lpVvEdL6OBb6tXmeSoOg84Ro0zUsSlo20R96+9u0xa9Ns5tYB7v+2jQ7inUA
iK8ZHNyVqaQrwu1Zj05GnRBAX7c7H/lu1Epea1hbs9Rgaf5JG8drHzikTJct
598oyJ4wfRFHG/qvSbliq3Cjnr82xGwWl/gQJpXz3EWAEFt6PdRsbWd9tW5C
DS+E0m1lqNBEkAsZU8btxGpzuY7KIQmXuRB8Lq8rjWSDRTfAEwViOb6+LLNh
fRip/2jbpQrhUmVE+VfLO9xyOfc9pZKwpdSM7dx87ctsMPvPOHPCiwgRumhx
ZsAEZNcvBzLjrKPaNrQIyFDygUT+17bkfnu62sZSVapYRjEv2bam0zqf9cRw
TME6X+1s1uIWsvNN55tTf0QsFY9r3W5rVQ3dPNwrC3Y03UT9fOqmZhUaTNc2
BoBGHXRciK14AfM5J+kz5vtmcAFObaKVj6a7jJOqcfA9DX4iGp2KndtGPPl2
8oEcaB8GeOqchY1+4Y1Xa2WNCIS97tljcHh09FyYyeNHO9skrnnRqPv2bRCI
PZjG8QJuSEkprXcwJSwAbelzZX3DYZsueJFn4FBYbvTpOwKW6tvhHpTwPJJU
MVGFgMkGqzquXKsY/63ZWZpthNtRU8VSCr866RVrgw1aaQipNWxnCH0p0sFQ
rgTpsaUNFqRRIF7y6El2nRZ5kTEYh0JJnePUNqBzJT5FjlfBmQFww15olJ2O
fbghR565LQWKt5UBN2tBsCGA0YkpmX2lDElE8HjfReNWc2luKn2CjxFsmU19
SQSb6salgYE2SJk2XXUG4pBa2QrpxVGh+K9lQjHaJJHq9C5xTyJi4VCs7GkD
RgQhXW4Y8g8sdHTdgSdkcrV9F7o3EhqIXRGuDLiVfdgKPuAwrrInLAAi1wXm
oyAYseXe+CbLk8T580SlHtC4tluoEjMe2y6nDGp3u8+cXB3HbMp3BZ1YHLUr
7mpzeZTU7ilrYy0Yq+QwTHlRnJsBBpaBUSkAy2c1MmHGFpYqnCU1YUJi8X9n
Ll4eveSysSTI8Oiosz4baAFl1iYgVSKQPcHdl9bd00le/IuE7IOGH+hw+LnO
JgfanrAffBhtfijB+Obr33M4Pj55L18misQHZuIi93X1RThVqkJc+Bl+5vO0
knc1v2DnUd/8i5mn+uGDBy1zB/Pzvth6SdBrDk5fhOu6ezM8oGzL5hpoqFeT
+rpQr+CEQFxscZsxYCw055LhfRnKVUxsZjbtf4vJh02WZSxSRqghW3aGLW0b
zo+C7LOjie6zbfAimOZi4KMF16ZWtrgl+CktUenJZMt0L+noLwWRg685Glm+
BVNkO1oVLVfgayKPykRWhpP1sK9wFjQi5RCK/QGi5Gz/lut8sV6GacQ2nMS6
UWkzBemasJ1V6zjpsxlMf40W8qFBTlUp8SG32paYZHEWr9STJ0uq19z0xXpU
iFHec39SAZsB577DpjA5vnj3UMR05kUE0KxCuo3i2uuFURyx98ejidN4zeS2
SmwdbTSv0UcDKqYcI/w2SBtYT2SrfeWuUgm+iLk4fa/Rrv2eHenqrS6mq7e3
uobkYhYVlRmymFXfam5fxSAQcxeQFM6cKjcVzHdjsBWDtDiOEFJs9LkuGqen
lib3UjcZXg2tBYG4pdbn0FZKcimTN8jEIOmPxZOQYauzFRZMPxDagMiNANkX
P4kLtAvl774V01xyBQ7BZaqEIYtgEW2noCKMnqHC6nKeOiXAeczj0ER5CdJ6
CcNTnChDctZ5rCOUXG0qDlsX2WQhh2Vne3l++Iz4ughja1v8BENCLOzbPJBs
5tqvWYOcIxZqGFDBujavfiVWGWxAJ69sgosO8Zrbpqtd2fcY8fqCfUhBpdBV
1B1bLmGps/178+pZ1IxEEmSBVUWc8FyEKLvnxAy1mU3jzaWY8xIrtMij5LRo
tDeYavCUtDCjYynFQeEGaS6cyE0tbzdqRyQPA+9g97VnvEESjZiSWFpHa8cH
h6GB5GijSEV/IGIVtjTIcr4anEJn/jx8uP3EHCLthzt6JIiFfUOfSXme4Atz
5p0k4cdj+EBInZKRpuFITMi1L7XvOQL52TWDmLL3syU02NgHNTzZvdE9Pu7J
9vpI+OZsc16UTWwre8qFsgRKI+sTxHCx/8010jwc5eM7OIcbYMSfhO5Hm/HM
brzw69xZhZS6sfNYOxJxbTofUBDO0ZehbBhoVWsPfRd0ZGZGQxYlaov2SYBS
WBW+HR7cBhTemrM/nHgOwt1ubmtn6g3U3cNRz9owOB+pdnpOQhfGomEoh6OX
n5eakrdh+77gUK2nzkHVPRldPO21Idq/Y6ABvh4cng1ipCr9ByAKpXGEri7B
shg6h2dyd2wBKYgh8Lxa4GIoUtTSmOABCIhCW//6cKQrhN0SPu5j8YBpaUPC
gE0c6pOAVIU5VvQUiUxnzJ7+kNh+WsSaNhtUuD5MhNiRxAgiwghTWstRbSiP
XMTnzBioc3wMszDeEEHSfE6Areaf1+Ejjf7mqsnxJjDAHDMsWPFmy80ifY2N
wvfNdgUJQ9NYv8BjXyDeMNOv4+iWDtx9WwaLCe6gznnIJihZE0FjwSF66XJJ
ZI2AubiVsER9oHkhOZAdzI7gUEj/rTWJTZKjiYrsUeE7NkqoGO3y+DpwD5a8
ZaxuBKH6CBjH14ld0AkvYUkQvrIOCDvDTO5S+8oYMVHTN0qJ67IMdHzsCIhA
AVHYsxkMAaxFzAh4FUcSSbdy4SmRjR/hAE0fsR/kPDanDsPYpUGLvQJxLkEH
/C+2nJblmjNhg+vGZwjBgiAHHGBHHAzvjIRheR4fYsieJk4iANKw0UvrVd5E
WfWAPXZ1VuBaHd3xKvv4uFqb+JigMPNJ8vNOGxFypl3tFS1VmOTwNh9FxlWL
xDAldinrkTJTut+0iaJ0EeIuStsm+jCZa+FoE+fzj6R5JyqHbHbwNKJDAR5c
ONrXP0qXWCFIe3AC6pLqS5osEEEs1qU1BR+NTo/VNf/oyWPNzBQDh6iZ0iLQ
ta9FYQJ2DiLuZAqLN03NQQQBQKS/wuj08Jg70WXJQHu36fjAX5Gr1QolabOD
jCjoYLrLLUVhvJeYqBBKzvHhuuQhKQhpHUPznP774OXh+CxsKKfMU1fNxuZ1
aAFy8pYrdN2QTXyP+k6nC4pC+7345ogOiy5gr9Mhcv9n776Xg8VdYK+qD5n3
KiWIn5rmg2ls4UDvKFVVxQd6Hl/Uk1n1FY6Ylkw4BPpvPMbEkOFmlZ9wXmu2
7wv29cP2YNZ7H4zImslhbd3X1g3PFInwgrAxseuwXw4Vnc8DNQgUUY2ywHdO
8KEj7PNBquCF09TVSEx57EJ+YA0+fx564L3vh2MqsPbDMzgOtGefrU4G4ZGL
kuXrqq8qnzb5itQKxiFtCO6OpnOlMdbhAckcMTli90Pn0TQRD7qIbKA3FpE0
ORChKN8c8SejhcouRO9COB5b72Cn672FSupK7g+Fq//NUQ+iNcd6HFpexYyR
B+fP+dL4VsVQg1xt3DDd0rVDfPvZRj+pprvP9R+VMGv7nBB4O3gtW0nsLV4N
+ndelnvxqsjXq//ozqtqVR48eHBzczNM6aIN8+LqgQQrMGF9AOrA/xm+mVdL
dgO1buYpz3fQ6RxIwY98psmGTCNsQRAft2gu69VIL0281nwj+qJ+f3INkxoa
LUViw1t8kRG3L/UmOi+d5lc+TQta1CH4m/zKnurYdMeqzO0P96WZHhxCO7uP
tKty2ItPsz0D1wtt952B6Mbx5e+kyPY7c8S2YVaOzLvOO5fpS18F/7gPaQzV
nd+hFR+xKPsBwulIYFks0mXCwW949iaNa4/y361PkrSKIqr+Ufmg9dnQyvAi
qsRl+k5stu8Q3MqflBLegBofoDMczUmy03pRpbBBykAL1Du1b/KfH/Fa2Zhx
dDo+MYcXI4PWZYNRo6AP3qgVzA5WGnzKkSTy7OvEP+MujHyM7zm9pOUB+Zye
iIvb75rgvJEPgOq+iIlo4avolh6KBbZE0c5zaK/0DvTdd3Yb9CapCJF8RQ8i
l+V5ExWeOxMUvuYQSyJKWRWeHs3wDTsNobnZSfDFhD+9PdR4zWBYiwMRitAg
CHKtY+krG7ulF16nC8QaLmsP/ilfVFBDa09e04e1pw5J/pMb6qAsB/Pmgg7h
5Wx2/3z07JmA9aOefbrAQxfpMmnuOltDkuHH0kxMC3S/L5Llqv7kYbIo07Ub
8COfTFfnogS5jTrhBARYv6MHE1SbT5RmBDCZrZNF+6ftx7hIHR7YNO5x4zbB
mU9qt14y4bBQs9+BmY1tZlYLQwNxOwcFRFjPP5mnif2amLrQa5uOzU+wtOKq
26hFEQrIFIVFiiSzoqv1uLIHVnLjBqrGccajA5kX4DjGPZyNc8Qg5UhAPdvY
EC2tGYU19VY6s5CehToG3mZcD5/1CnjAN0vQENhhhfwHufw+O4dz1M0jjih0
2+JiNYmwNFqhMyIHpm3rg8bwG285G6H3fMebIO+LFrK5CskmU9hKzdSpa4gb
BS1xXVKddbXaWCO6uByDmYSmUamC1ApbGmJrJgiSxFvE/oscnbEtlWedsJxH
hTVa1CFrQ5Kl2hVS6JPVIr9dSix5qTYHjpDImadzPbl1zNlZWlAANJFVXGda
tD4FDg9gJGQPGalBqSSVa9khiUWuK+KzdTa1ccAaHPit76D69rNmUZ2NULHU
piCrjCE+vyi7hfPjX9D8fB4hWhEJfijI6IL/oTdrTbGXp8//4osg5dYGheAE
vHQjxW2dG38LxSVYYyUob/kkaGuyluwW2tArh+BPRwhbPj07f4GoCSkJIRUf
5KBoMaj1a3snsZBeakCAZhJb7a5eDzgntRMnApFPe1xoBSnn9LNJl5wnnXlr
OlzpPPtNrlZm9oaKSLVzAEhfzJ11wIKndKUguQIkAmBxRWxUize1n2uzU5hT
rLpdRQWqLvkaaYqJ4mQKRuJHPi9rgzTLMIu6ILeI+1i7abTMWL1Hlu0E1SzW
prdKBGkpLUBMxrbx1c24puPNSi89aayepXylFXi7TeBhzrI2KYD47ERNKroE
EDBXirOkKx0oxQIuqcfJhIIVXjVTacWRruiQds1B5ysBiF3rreAFfM70LC37
D1LUU8TusNpjzYuiCa0KXH8xKqcUstoBNfhorfdcnyEpOLVVDDX2yVeZ0wpl
TpFBoDHrE6BGgWWprwyDdazwbF/b5dvzH/kyrL5cn73sXKwbonZYxgz1xdh8
5kuajVx5r/BWMQLVX2N3Blcr0YU0Ui0Im//7v/63FnJTT9h//9f/sczILfa+
MuPsb+Ja3GAYhIBgIVEmkfLjag1T/CFoXHf0Z2SIJMWqSH8gcD5/figBEd/k
E3hrXpOqVf1gus8uLlgcAfNADhE/5101CVu92Mlga+oF2q24V7j0CEPIvTC1
K+TTXkSpsF/2eQdFHIKwMJsjr8V5vAGDeAmqv7A2isAk59uqb8RmyEtNXi6Y
ubBXhw1Xkuh7RxEdUSfkQqhVh5+n5zjVo9OBAjmJpq9d3vPTNUjvH9fEapiS
BgnQXAoHxj4Oo23L2FGmpt//3rzFtX8/fJtfRd+nMf0yjyP6bxHhv+K4pl+Q
jYcEZ45fnKyJx7pkHfP0j0enuEUsDy7hfJkk/EwVkGOEAbCtpSt2/pgHUA9s
z9XUYUdO6D/XuC2UiDsww40I0yECVg8Mp0Vsb+9tH2zvPt4+2Nnffngw3X/0
8GDn4f7uQbS3NzuIp7uPOidHBwaf42N8yh++/HZ0YLYfdp7h220MsLOPQHX8
Qb8RD8Bv21HnjKEhs9FkHWx8c7zh9sMhXhzinaE+27ZyF6K+ETiOFl5ZcER8
LmIuoF9C9XcAA1ZwPiGwmmHYw85Yq86+eHq+PTo63znbGR9ubz/vbDSTkkc6
opYemBEDLnhBdh4XO6udcrq9vRhGw+Ws2G6ZUjdpNqN1rbChCFuLkWSwtNQo
o4evkve6TY1R/L4tpu9HR+T9Pw69+2nRdfeE0F0ltci5NnjZCLogHCoNgpLD
uAIvmblw2W6ahR0jfITT5LZWI8MGgY6kVKSt3cYFfeR1G+fMzerD7m9BiH2j
kRorm0/39nd2arHKi5RYzjCM7+IQjyDmamOOme0i+h0pgSvoU4Tw6Qw6KLbF
zmxdaGmbYSxmDbwrHd4hGOUfF+nKOtJtQMpi3KuSm6oUkvO42YmDg1sgn6zW
Ve04gTQk0Nmg92ojg5LkVherhUgsS/a2zebPTstnuy2f7dHbO/TNntk3D80j
85V5bJ6YH/FZZ6Mi6Y/9u/PBWqDG/On0mw8/8O7XWMNGl6lffQ33/rz7exiB
kPhvvoa/kxF++xjFyRA/a4Sfv4aPGeG3D8lPI/xWRnARrX/DNXwa4e9thJ9P
YRqypioqd0mb3/DXW1Y0RyLXhrQ6gbnnLmn1m5fn2sq0NQWQBP+JE/wn9ol/
XOl/Upf+22FmVYCjuxQyScLx8e5R9ZP1wFdBpRef2qkpqmbkLef5ulqJebM9
8MSwknvLJQsXTYWkqTBbr2aeYZG+ElQkTtAg2l0SW8yrUU+kBO5kgRgf3xf9
2cnQ5pSkzrMo/lNrwLfDYKE91wfh5yk8P0a7+aTx/C3XcO/PPZSbEY/w6qeP
oE1Dfs4I9//8HUDyNzGC2D9+zgi/zmn+Fkb4zWPUz7+bZ8IpfsYIH/HzdwDJ
TyP8Zkb4pDt+GuHHj/DL6o6Tpu7Yrqvcp0BO6grkHQqPaJH/Fz0mXTO+/AAA

-->

</rfc>
