<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-17" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="DETIM Architecture">DRIP Entity Tag (DET) Identity Management Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-17"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter" role="editor">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="28"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the high level architecture for the registration and discovery of DRIP Entity Tags (DETs) using DNS. Discovery of DETs and related metadata is performed via DRIP specific DNS structures and standard DNS methods. A general overview of the interfaces required between involved components is provided in this document with future supporting documents to provide technical specifications.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to Unmanned Aircraft System (UAS) Remote Identification (RID). Only very limited operational information can be sent via Broadcast RID, but extended information is sometimes needed. The most essential element of information is the UAS ID, the unique key for lookup of extended information in relevant registries (see Figure 4 of <xref target="RFC9434" format="default"/>).</t>
      <t>Such extended information is retrieved from the UAS ID via the use of a DRIP Entity Tag (DET) <xref target="RFC9374" format="default"/> which is managed by the DRIP Identity Management Entity (DIME). In this document we assume the DIME is a function of UAS Service Suppliers (USS) (Appendix A.2 of <xref target="RFC9434" format="default"/>) but a DIME can be independent or handled by another entity as well.</t>
      <t>Registration is necessary to guarantee the uniqueness of the DET and thus to ensure the extended information is bound to the UAS ID and that the required public/private information has been submitted, approved and recorded.</t>
      <t>While most data to be sent via Broadcast RID (Section 1.2.1 of <xref target="RFC9434" format="default"/>) or Network RID (Section 1.2.2 of <xref target="RFC9434" format="default"/>) is public, much of the extended information will be private. As discussed in Section 7 of <xref target="RFC9434" format="default"/>, Authentication, Attestation, Authorization, Access Control, Accounting, Attribution, and Audit (typically known as AAA) is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose. As specific AAA requirements will vary by jurisdictional regulation, provider choices, customer demand, etc., they are left to specification in policies which are out of scope for this document.</t>
      <t>This document describes the high level architecture for the registration and discovery of DRIP Entity Tags (DETs) using DNS. Clients in the architecture that can use a DET include Unmanned Aircraft (UA), Ground Control Station (GCS), Hierarchical HIT Domain Authority (HDA), Registered Assigning Authority (RAA) and USS.</t>
      <t>This document uses the Concise Data Definition Language (CDDL) <xref target="RFC8610" format="default"/> for describing the registration data and other structures.</t>
    </section>
    <section anchor="intro-concept" numbered="true" toc="default">
      <name>General Concept</name>
      <t>DETs MUST be registered within the hierarchy to perform lookups and also obtain the trust inherited from being a member of the hierarchy. DIME's are the points in the hierarchy that enforce requirements on registration and information access. This document standardizes the basic interactions and methods for registration and lookup to support interoperability of DETs. Other identifiers and their methods are out of scope for this document.</t>
      <t>Authoritative Name Servers of the Domain Name System (DNS) provide the Public Information resource for both storing and retrieving public information, such as the public key of DETs and pointers to Private Information resources. Personally Identifiable Information (PII) is stored in Private Information Registries and is protected through AAA mechanisms not described in this document.</t>
      <section anchor="use-of-existing-dns-models" numbered="true" toc="default">
        <name>Use of Existing DNS Models</name>
        <t>Registration of DETs SHOULD follow the registrant-registrar-registry model commonly used for registration of domain names. In DRIP, the registrant would be the end user who owns/controls the Unmanned Aircraft. They are ultimately responsible for the DET and any other information that gets published in the DNS. Registrants use agents known as registrars to manage their interactions with the registry. Registrars typically provide optional additional services such as DNS hosting, web/mail hosting, X.509 certificates and so on. The registry maintains a database of the registered domain names and their related metadata such as the contact details for domain name holder and the relevant registrar. The registry provides DNS service for the zone apex - <tt>3.0.0.1.0.0.2.ip6.arpa</tt> for DRIP - which contains delegation information for the domain names of the registered DETs Registries generally provide services such as WHOIS or RDAP to publish metadata about the registered domain names and their registrants and registrars.</t>
        <t>Registrants have contracts with registrars who in turn have contracts with registries. Payments follow this model too: the registrant buys services from a registrar who pays for services provided by the registry.</t>
        <t>By definition, there can only be one registry for a domain name. Since that registry is a de facto monopoly, the scope of its activities are usually kept to a minimum to reduce the potential for market distortions or anti-competitive practices. A registry can have an arbitrary number of registrars who compete with each other on price, service and customer support.</t>
        <t>It is not necessary, and in some case may not be desirable, for DRIP registrations to strictly follow this registrant-registrar-registry model. Prevailing circumstances and/or local policy may mean some combination of these roles could be combined. A DRIP registry might be operated by the CAA. Or it could be outsourced to a DNS registry provider. Registration policies - pricing, renewals, registrar and registrant agreements, etc. - will need to be developed. These considerations SHOULD be determined by the CAA, perhaps in consultation with local stakeholders. They are are out of scope for this document.</t>
        <t><xref target="dns-map" format="default"/> is intended to show this mapping of DRIP Information Registry functions and existing DNS concepts. This figure is not meant to be exhaustive or explain how the DNS functions. It only show where DRIP overlays with the DNS.</t>
        <figure anchor="dns-map">
          <name>DNS &amp; DRIP Terminology/Role Mapping</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+--------------------------+
| DNS: Registrant          |
+--------------------------+
| DRIP: UAS Operators & UA |
+-------o------------------+
        |
        | Domain/DET 
        | Registration Request
        |
+-------o-----------------------------+
| DNS: Registrar                      |
+-------------------------------------+
| DRIP: DIME Provisioning Agent (DPA) |
+-------o-----------------------------+
        |
        | Updates to 
        | Registry Database (e.g. EPP)
        |
+-------o----------------------------+
| DNS: Registry Operator             |
+------------------------------------+
| DRIP: DIME Information Agent (DIA) |
+-------o-------------------------o--+
        |                         |
        | Zone File               | Domain
        | Update(s)               | Metadata
        |                         |
+-------o---------------+    +----o------------------+ 
| DNS: Authoritative    |    | DNS/DRIP: Private     |
|      Name Server (NS) |    |           Information |
+-----------------------+    |           Registry    |
| DRIP: Public          |    +--o--------------------+
|       Information     |       |
|       Registry        |       | Registrant
+--------------------o--+       | Information Service 
                     |          | (e.g. WHOIS, RDAP, etc.)
                     | DNS      |
                     |          |
                  +--o----------o--+
                  | DNS: Resolver  |
                  +----------------+
                  | DRIP: Observer |
                  +----------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="uas-dime-services" numbered="true" toc="default">
        <name>UAS DIME Services</name>
        <t>For UAS, a DIME can provide the following registration and lookup services:</t>
        <ol spacing="normal" type="1"><li>personal information (e.g. for pilots and operators)</li>
          <li>UAS Serial Number and aircraft physical characteristics</li>
          <li>a Key ID for UAS RID Authentication (for example <xref target="RFC9575" format="default"/>)</li>
          <li>a pseudo-anonymous UAS Specific Session ID (for example <xref target="RFC9374" format="default"/>)</li>
          <li>binding of UAS ID to UTM Operational Intent</li>
        </ol>
        <t>A DIME's services are determined by their intended role (<xref target="dime-roles" format="default"/>) and policies (both internally and from appropriate authorities). For example, services 1 and 2 can be restricted to non-public access controlled lookups with mandatory registration and 5 to publicly available but access controlled lookups.</t>
        <t>For this document only services 3 and 4, when their identifier is selected as the DET, are detailed. Services 1 and 5 will be talked about conceptually while service 2 is out of scope.</t>
        <t>Requirements on the elements of information in registration and lookup (beyond the scope of basic interoperability) is out of scope for this document. It is left to appropriate authorities to determine these details along with policy for access. For the UAS use-case this would be the national Civil Aviation Authorities (CAAs).</t>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions" numbered="true" toc="default">
        <name>Additional Definitions</name>
        <t>This document makes use of the terms (PII, USS, etc.) defined in <xref target="RFC9153" format="default"/>. Other terms (DIME, Endorsement, etc.) are from <xref target="RFC9434" format="default"/>, while others (RAA, HDA, etc.) are from <xref target="RFC9374" format="default"/>.</t>
      </section>
      <section anchor="text-conventions" numbered="true" toc="default">
        <name>Text Conventions</name>
        <t>When talking about a DIME in documents it should be referred to as the role it is serving. For example a CAA level DIME running services both as an RAA (its primary role in the hierarchy) and as an HDA (optionally) would be be referred to "RAA" when performing its RAA duties and "HDA" when performing its HDA duties. The rest of the document will follow this convention unless verbosity or clarity is needed.</t>
        <ul empty="true" spacing="normal">
          <li>Review(MGLT): do we need this section above?</li>
        </ul>
      </section>
    </section>
    <section anchor="dime-roles" numbered="true" toc="default">
      <name>DIME Roles</name>
      <t><xref target="RFC9374" format="default"/> defines the Hierarchical Host Identity Tag (HHIT) and further specifies an instance of them used for UAS RID called DETs. The HHIT is a 128-bit value that is as an IPv6 address intended primarily as an identifier rather than locator.</t>
      <t>As a review, HHITs are comprised of four major components: a Prefix, a Hierarchy ID (HID), a HHIT Suite ID (fixed 8-bits) and an ORCHID Hash. DETs use a 28-bit prefix (<tt>2001:30::/28</tt> assigned by <xref target="RFC9374" format="default"/>) and 64-bit hash leaving 28-bits for the HID. For UAS RID this HID is further divided into two fields: RAA and HDA, each 14-bits in length. <xref target="hhit-fig" format="default"/> shows this breakdown.</t>
      <figure anchor="hhit-fig">
        <name>DRIP Entity Tag Breakdown</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+-------------+--------------+---------------+-------------+
| IPv6 Prefix | Hierarchy ID | HHIT Suite ID | ORCHID Hash |
| (28-bits)   | (28-bits)    | (8-bits)      | (64-bits)   |
+-------------+--------------+---------------+-------------+
             /                \
            /                  \
           /                    \-----------------------------\
          /                                                    \
         /                                                      \
        +--------------------------------+-----------------------+
        | Registered Assigning Authority | HHIT Domain Authority |
        | (14-bits)                      | (14-bits)             |
        +--------------------------------+-----------------------+
]]></artwork>
      </figure>
      <t><xref target="RFC9434" format="default"/> defines the DRIP Identity Management Entity (DIME) as an entity that vets Claims and/or Evidence from a registrant and delivers, to successful registrations, Endorsements and/or Certificates in response. The DIME encompasses various logical components (<xref target="dime-arch" format="default"/>) and can be classified to serve a number of different roles, mapped to levels in the hierarchy, which are detailed in the following subsections.</t>
      <section anchor="apex" numbered="true" toc="default">
        <name>Apex</name>
        <t>The Apex is the IPv6 prefix portion of the DET associated with it which is assigned by IANA from the special IPv6 address space for ORCHIDs. It serves as the branch point from the larger DNS system in which DETs are defined. The Apex manages all delegations and allocations of RAAs to various parties. The Apex MUST reserve an allocation for itself that it MAY use.</t>
        <section anchor="drip-apex" numbered="true" toc="default">
          <name>DRIP Apex for UAS RID</name>
          <t>For UAS RID the Apex uses IPv6 prefix of <tt>2001:30::/28</tt> per <xref target="RFC9374" format="default"/>. This corresponds to the domain name <tt>3.0.0.1.0.0.2.ip6.arpa</tt> in the DNS and is the Apex for DRIP delegations. Allocations of RAAs in this prefix SHOULD be done in contiguous groups of 4. This is to support the nibble reversing of the DET to be placed in DNS (<xref target="det-dns" format="default"/>). See <xref target="iana-apex" format="default"/> for the RAA allocations.</t>
          <t>RAA values 0 (0x0000) through 3 (0x0003) MUST be reserved for the UAS RID Apex and SHOULD be used to endorse RAA delegations in Endorsements (<xref target="endorsements" format="default"/>). While the individual Apexes can be designated for different purposes they share the same pool of RAAs to be allocated. Such operation would require policy by the administrator of the Apex to avoid simultaneous conflicting allocation and is out of scope for this document.</t>
        </section>
      </section>
      <section anchor="raa" numbered="true" toc="default">
        <name>Registered Assigning Authority (RAA)</name>
        <t>An RAA is a government agency, business or other organization that runs a DIME to register HDAs (<xref target="hda" format="default"/>).For UAS RID and related aviation uses most are expected to be CAAs (using <xref target="iso3166" format="default"/>), such as the Federal Aviation Authority (FAA), that then delegate HDAs for use in their National Air Space (NAS).</t>
        <t>An RAA:</t>
        <ul spacing="normal">
          <li>MUST provide a set of services to allocate HDAs to organizations</li>
          <li>MUST have a public policy on what is necessary to obtain an HDA</li>
          <li>SHOULD provide service level guarantees for DNS operation and registry service</li>
          <li>SHOULD maintain a DNS zone minimally for discovering HIP Rendezvous (RVS) servers</li>
        </ul>
        <ul empty="true" spacing="normal">
          <li>Review(MGTL): The normative language should not be about what function the RAA MUST accomplish. Instead we should mention what architecture mechanisms/protocols must be implemented so the RAA can perform the action it requires. The only item that fits this requirement is the HIP RVS.</li>
        </ul>
        <t>Each RAA MUST use the single reserved HDA value 0 (0x0000) for itself to support various functions or services. Other HDA values SHOULD be allocated or reserved per RAA policy.</t>
        <section anchor="iso3166" numbered="true" toc="default">
          <name>ISO 3166-1 Numeric Nations (INN)</name>
          <t>The RAA range of 4 (0x0004) to 3999 (0x0F9F) are reserved for CAAs using the ISO 3166-1 Numeric Nation Code. The RAA can be derived from the ISO 3166-1 numeric code by multiplying the value by 4 (i.e. <tt>raa_code = iso_code * 4</tt>). Four contiguous values (<tt>raa_code + 0</tt>, <tt>raa_code + 1</tt>, <tt>raa_code + 2</tt> and <tt>raa_code + 3</tt>) are used in a single allocation. The inverse (RAA to ISO) works out as: <tt>iso_code = floor(raa_code / 4)</tt>.</t>
          <t>As an example the United States has an ISO 3166-1 Numeric Code of 840. This derives the following RAAs: 3360, 3361, 3362 and 3363.</t>
          <t>It should be noted that the range of codes from 900 to 999 are defined (by ISO 3166-1) as "user assigned code elements" and do not have specific claimants predefined in the RAA space. Withdrawn and other special codes also do not have predetermined claimants. These values MUST NOT be used for an RAA. RAAs MUST NOT use transitionally reserved, indeterminately reserved or formerly assigned ISO 3166-1 code elements.</t>
          <t>How a CAA handles their allocated values is out of scope of this document. Control of these values are expected to be claimed by their respective owner. How they are vetted and validated is out of scope of this document. Protection against fraudulent claims of one of these values is out of scope for this document.</t>
          <t>Control of a country's RAAs is a National Matter and is expected to be overseen by the CAA. Management issues include delegation of these RAAs in the <tt>3.0.0.1.0.0.2.ip6.arpa</tt> Apex, Secure DNS policy, validation and delegation of DET registrations. These are out of scope for this document.</t>
          <t>IANA is prepared to operate an interim registry for <tt>3.0.0.1.0.0.2.ip6.arpa</tt> until ICAO is ready to assume administrative control of this Apex. Requests for delegations of RAAs MUST be validated, either by ICAO or the appropriate CAA. This SHOULD follow a process analogous to the procedures used in ENUM <xref target="RFC3761" format="default"/> for the delegation of country codes for E.164 telephone numbers. Delegation of RAAs is a National Matter and MUST NOT be made without the consent of the relevant CAA.</t>
          <ul empty="true" spacing="normal">
            <li>Author: above text is duplicate text in IANA considerations, should it stay here or be removed?</li>
          </ul>
        </section>
      </section>
      <section anchor="hda" numbered="true" toc="default">
        <name>Hierarchial HIT Domain Authority (HDA)</name>
        <t>An HDA may be an USS, ISP, or any third party that takes on the business to register client entities that need DETs. Client entities include, but is not limited to UA, GCS, UAS Operators and UAS/UTM infrastructure (such as Supplemental Data Service Providers). An HDA SHOULD also provide needed UAS services including those required for HIP-enabled devices (e.g. RVS).</t>
        <t>For UAS RID, HDAs can provide any of the following services:</t>
        <ul spacing="normal">
          <li>registration and public lookup of DETs as a Key ID for Authentication as defined in <xref target="RFC9575" format="default"/></li>
          <li>registration and access controlled lookup of DETs as a pseudonymous UAS Session ID</li>
          <li>registration of UAS ID and UTM Operational Intent to bind them together (if allowed by cognizant authority)</li>
        </ul>
        <t>An HDA SHOULD maintain a set of RVS servers for UAS clients that may use HIP. This service MUST be discoverable through the DNS zone maintained by the HDA's RAA.</t>
        <t>An RAA may assign a block of values to an individual organization. This is completely up to the individual RAA's published policy for delegation. Such policy is out of scope for this document.</t>
      </section>
    </section>
    <section anchor="dime-arch" numbered="true" toc="default">
      <name>DIME Architecture</name>
      <t>The DIME, in any of its roles (<xref target="dime-roles" format="default"/>), is comprised of a number of logical components that are depicted in <xref target="dime-arch-fig" format="default"/>. Any of these components could be merged or delegated to other entities as a service.</t>
      <t>Interfaces with a specific transport requirement (such as HTTPS) are labeled accordingly. Interfaces not labeled can be implementation specific or proprietary due to co-location of components. For example the interface between the DPA and a Registrar, when delegated, might be Extensible Provisioning Protocol (EPP) <xref target="RFC5730" format="default"/> while implementations combining these components might use an internal and possibly proprietary code library. These non-labeled interfaces are out of scope for this document.</t>
      <ul empty="true" spacing="normal">
        <li>Author: ensure the diagram below aligns with General Concept diagram and text below.
Review(MGLT): subsections do not provide any useful information, I tend to think these should be used to illustrate the figure.</li>
      </ul>
      <figure anchor="dime-arch-fig">
        <name>DIME Logical Components</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+--------------------+
| Registering Client |
+---------o----------+
          |
          | HTTPS
          |
**********|*********************************************************
*         |                                                        *
*         |      DRIP Identity Management Entity (DIME)            *
*         |                                                        *
*   ######|#####################################################   *
*   #     |                                                    #   *
*   #  +--o-----------------+                                  #   *
*   #  | DIME               |                                  #   *
*   #  | Provisioning Agent |         Registrar Functions      #   *
*   #  | (DPA)              |                                  #   *
*   #  +--------------------+                                  #   *
*   #                                                          #   *
*   ##############################o#############################   *
*                                 |                                *
*                                 | EPP                            *
*                                 |                                *
*   ##############################o#############################   *
*   #                                                          #   *
*   #  +--------------------+                                  #   *
*   #  | DIME               |                                  #   *
*   #  | Information Agent  |         Registry Functions       #   *
*   #  | (DIA)              |                                  #   *
*   #  +--------------------+                                  #   *
*   #                                                          #   *
*   ######o#########################################o###########   *
*         |                                         |              *
*         |                                         |              *
**********|*****************************************|***************
          |                                         |
          | Registrant Information Service          | DNS
          | (e.g. WHOIS, RDAP, etc.)                | 
          |                                         |
          |              +---------------+          |
          '--------------o Lookup Client o----------'
                         +---------------+
]]></artwork>
      </figure>
      <section anchor="dpa" numbered="true" toc="default">
        <name>DIME Provisioning Agent (DPA)</name>
        <t>The DPA performs the task of vetting information coming from clients wishing to register. It then delegates (internally or externally) various items to other components in the DIME. This is the primary component that handles all DRIP related cryptographic operations for incoming registrations to the DIME. The role of the DPA is similar to that of a registrar in the conventional model of domain name management in the DNS.</t>
        <t>The DPA:</t>
        <ul spacing="normal">
          <li>SHOULD have a publicly accessible and discoverable interface for clients to register</li>
          <li>SHOULD provide DNS service for the DET's registered domain name</li>
        </ul>
        <t>Specific details of the above interfaces (such as advertisement) are out of scope for this document.</t>
      </section>
      <section anchor="nameserver" numbered="true" toc="default">
        <name>Registrar &amp; Registry</name>
        <t>The Registrar and Registry are commonly used concepts in the DNS. These components interface the DIME into the DNS hierarchy and thus operation SHOULD follow best common practices, specifically in security (such as running DNSSEC) as appropriate. The following RFC provide suitable guidance: <xref target="RFC7720" format="default"/>, <xref target="RFC4033" format="default"/>, <xref target="RFC4034" format="default"/>, <xref target="RFC4035" format="default"/>, <xref target="RFC5155" format="default"/>, <xref target="RFC8945" format="default"/>, <xref target="RFC2182" format="default"/>, <xref target="RFC4786" format="default"/>, <xref target="RFC3007" format="default"/>.</t>
        <t>If DNSSEC is used, a DNSSEC Practice Statement (DPS) SHOULD be developed and published. It SHOULD explain how DNSSEC has been deployed and what security measures are in place. <xref target="RFC6841" format="default"/> documents a Framework for DNSSEC Policies and DNSSEC Practice Statements.</t>
        <t>The interfaces and protocol specifications for registry-registrar interactions are intentionally not specified in this document. These will depend on nationally defined policy and prevailing local circumstances. It is expected registry-registrar activity will use the Extensible Provisioning Protocol (EPP) <xref target="RFC5730" format="default"/>. The registry SHOULD provide a lookup service such as WHOIS <xref target="RFC3912" format="default"/> or RDAP <xref target="RFC9082" format="default"/> to provide public information about registered domain names.</t>
        <t>Decisions about DNS or registry best practices and other operational matters SHOULD be made by the CAA, ideally in consultation with local stakeholders.</t>
      </section>
      <section anchor="dia" numbered="true" toc="default">
        <name>DIME Information Agent (DIA)</name>
        <t>The DIA is the main component handling information egress (via lookup) of the DIME. Public information SHOULD be in Authoritative Name Servers and MAY be mirrored into the Private Information Registry. Related PII MUST be stored in a Private Information Registry and MAY be available via RDAP or equivalent.</t>
        <t>The DIA:</t>
        <ul spacing="normal">
          <li>
            <t>MUST have an access controlled interface for add/delete/update of information; this interface MAY be publicly available
            </t>
            <ul spacing="normal">
              <li>this interface definition, for example an EPP schema, is out of scope for this document</li>
            </ul>
          </li>
          <li>
            <t>SHOULD have an access controlled interface to query for private information; this interface MAY be publicly available
            </t>
            <ul spacing="normal">
              <li>if this interface is publicly available it MAY use RDAP or equivalent protocols</li>
              <li>if this interface is not publicly available its specification is out of scope for this document</li>
            </ul>
          </li>
        </ul>
        <t>Certain information may be considered PII. This is a National Matter, subject to prevailing national laws and regulations. Such data MUST be protected from access using AAA (for example using XACML). These decisions should be determined by the CAA. See <xref target="dap" format="default"/> for more information.</t>
        <t>A DIA can be considered an additional function to an existing DNS Registry Operator for DRIP. It MAY be a separate service or entity that interfaces with a DNS provider.</t>
      </section>
    </section>
    <section anchor="service-registration-process" numbered="true" toc="default">
      <name>Service Registration Process</name>
      <t>This document details the registration process for the following services exclusively using DETs:</t>
      <ul spacing="normal">
        <li>UAS RID Authentication</li>
        <li>UAS Specific Session ID</li>
      </ul>
      <t>Specification beyond these services is out of scope for this document.</t>
      <t>The Constrained Application Protocol (CoAP) <xref target="RFC7252" format="default"/> is the RECOMMENDED interface method for machine to machine communication. This is due to the inherent support of HTTPS and UDP variants, thus giving great flexibility for UAS products that share properties of IoT devices. The specifics of a CoAP implementation for DIME services is out of scope for this document.</t>
      <t>This section fulfills REG-3 of <xref target="RFC9153" format="default"/>.</t>
      <section anchor="generic-det-registration" numbered="true" toc="default">
        <name>Generic DET Registration</name>
        <t>Generically a DET can be used as an identifier for any node in UTM and SHOULD be registered to a DIME. For example a CAA may choose to use DETs as an identifier for its Operators. A data model would be required to define all the information for registration for a given type of client. Such data models are out of scope for this document.</t>
        <t>The general process for a registering DET is shown in <xref target="registration-timeline" format="default"/> and the accompanying text.</t>
        <figure anchor="registration-timeline">
          <name>DET Registration Timeline</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
            registrant             dime
                |                   |
(1) GEN_DET/HI  |                   |
                |----(2) INPUT----->|
                |                   | (3) VALID_INPUT?
                |<-------FAIL-------|
                |                   | (4) DUPE_HI?
                |<-------FAIL-------|
                |                   | (5) DUPE_DET?
                |<-------FAIL-------|
                |                   | (6) GEN_BE
                |                   | (7) UPDATE_DATABASE
                |                   | (8) UPDATE_NS
                |<----(9) OUTPUT----|
]]></artwork>
        </figure>
        <dl newline="false" spacing="normal">
          <dt>(1) GEN_DET/HI:</dt>
          <dd>
  The registrant that plans to use the identity and its cryptographic properties MUST generate the asymmetric key-pair of their choosing and protect the private key with best common practices. The registrant SHOULD derive the corresponding DET. How the registrant obtains the desired HID for DET generation is out of scope for this document.</dd>
          <dt>(2) INPUT:</dt>
          <dd>
  The registrant MUST format and send the required information for a given service registration as specified by the DIME. Specific service data models and methods, other than those proposed by this document (see <xref target="service3-4" format="default"/>), are out of scope.</dd>
          <dt>(3) VALID_INPUT?:</dt>
          <dd>
  The DIME, upon receipt of service registration inputs, MUST validate the input data. This may be simply performing syntax checks to ensure the data is properly formatted all the way to full semantic validation. Signed data, such as Endorsements, MUST have their signatures verified before further processing. Failure of input validation SHOULD return errors to the registrant.</dd>
          <dt>(4) DUPE_HI?:</dt>
          <dd>
  The DIME MUST check that the proposed HI is not a duplicate already in use. The registrant SHOULD be notified with an error if duplication is detected.</dd>
          <dt>(5) DUPE_DET?:</dt>
          <dd>
  The DIME MUST check that the proposed DET, derived from the HI, is not a duplicate already in use. If the registrant proposed a DET with HID outside that of the DIME, it MUST be rejected. If the registrant only provided the HI, the DIME MUST generate the DET using its HID. The registrant SHOULD be notified with an error if duplication is detected.</dd>
          <dt>(6) GEN_BE:</dt>
          <dd>
  The DIME, after all the above validation, MUST generate a Broadcast Endorsement using the provided HI and DET from the registrant as the evidence. This Endorsement signifies the DIME accepts the DET/HI pairing from the registrant.</dd>
          <dt>(7) UPDATE_DATABASE:</dt>
          <dd>
  The DIME MUST update the Private Information Registry with any PII that was part of the registration. It MAY include additional metadata or public information. How the Private Information Registry is updated is out of scope for this document.
example a CAA may choose to use DETs as an identifier for its Operators. A data model would be required to define all the information
(8) UPDATE_NS:</dd>
          <dt/>
          <dd>The DIME MUST update the Authoritative Name Server with any public information that was part of the registration. This information MUST be stored as described in <xref target="dns" format="default"/>.</dd>
          <dt>(9) OUTPUT:</dt>
          <dd>
  The DIME, upon successful updates of the Private Information Registry and Name Server, transmits to the registrant the list of Broadcast Endorsements that make up the trust chain for use in <xref target="RFC9575" format="default"/>.</dd>
        </dl>
      </section>
      <section anchor="service3-4" numbered="true" toc="default">
        <name>Session ID &amp; Authentication Services</name>
        <t>Both UAS RID Authentication and UAS Specific Session ID services when using DETs share a common data model for registration. Endorsements (<xref target="endorsements" format="default"/>) are the RECOMMENDED way to securely transfer information for registration.</t>
        <t><xref target="service-models" format="default"/> contains the general data model as well as the specific variants for Session ID &amp; Authentication services.</t>
      </section>
    </section>
    <section anchor="dap" numbered="true" toc="default">
      <name>Differentiated Access Process</name>
      <t>Per <xref target="RFC9434" format="default"/> all information classified as private is stored in a datastore protected using some form of differentiated access (i.e. AAA) to satisfy REG-2 from <xref target="RFC9153" format="default"/>. Differentiated access is a requirement for DIMEs as defined in <xref target="RFC9153" format="default"/> by the combination of PRIV-1, PRIV-3, PRIV-4, REG-2 and REG-4. <xref target="RFC9434" format="default"/> further elaborates on the concept by citing RDAP (from <xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) as a potential means of fulfilling this requirement.</t>
      <ul empty="true" spacing="normal">
        <li>Author: is this section pertaining to the lookup mechanisms enough for this document?</li>
      </ul>
    </section>
    <section anchor="dns" numbered="true" toc="default">
      <name>DRIP in the Domain Name System</name>
      <t>Per <xref target="RFC9434" format="default"/> all information classified as public is stored in the DNS to satisfy REG-1 from <xref target="RFC9153" format="default"/>. This is primarily done use Resource Records (RRs). This document defines two new DNS RRs, one for HHIT metadata (<xref target="hhit-rr" format="default"/>) and another for UAS RID information (<xref target="bcast-rr" format="default"/>).</t>
      <t>DIMEs MUST be responsible for the operation of the DNS-related infrastructure for domain names under DRIP. It MAY chose to run that infrastructure directly or outsource it to competent third parties or some combination of the two.</t>
      <t>DIMEs SHOULD specify the technical and administrative criteria for the provision of these services: contractual terms (if any), reporting, uptime, SLAs (if any), DNS query handling capacity, response times, incident handling, complaints, law enforcement interaction and so on. National policy and regulations will define how long DNS data are stored or archived. These are all National Matters where national law/regulation prevail ensuring DRIP complies with national law and regulation since these are matters of national sovereignty.</t>
      <t>DNSSEC is strongly RECOMMENDED (especially for RAA-level and higher zones). When a DIME decides to use DNSSEC they SHOULD define a framework for cryptographic algorithms and key management <xref target="RFC6841" format="default"/>. This may be influenced by frequency of updates, size of the zone, and policies.</t>
      <t>UAS specific information that is publicly available MAY also be stored in DNS but is out of scope for this document. This specification information is drafted in <xref target="uas-sn-dns" format="default"/>. An optional record to store static information for UAS RID is defined in <xref target="bcast-rr" format="default"/>.</t>
      <t>For DRIP, IANA has agreed to act as the Apex at least initially (see <xref target="iana-apex" format="default"/> for more details). The assignment of RAAs to civil aviation authorities is already done per <xref target="iso3166" format="default"/> using their ISO 3166-1 Numeric Codes. The Apex SHOULD be the trust anchor in a Endorsement or certificate chain that provides validation of any of these specific RAAs to minimize the risk of fraudulent RRAs.</t>
      <section anchor="det-dns" numbered="true" toc="default">
        <name>DRIP Entity Tags</name>
        <t>The REQUIRED mechanism is to place any information into <tt>ip6.arpa</tt> when using a DET. Since the DET is an IPv6 address it can be nibble-reversed and used in the zone, per standard conventions.</t>
        <t>The prefix <tt>2001:30::/28</tt> is registered with IANA <xref target="RFC9374" format="default"/> and <tt>3.0.0.1.0.0.2.ip6.arpa</tt> - the corresponding reverse domain - SHOULD be under the administrative control of the Apex. In addition to the DNS infrastructure for <tt>3.0.0.1.0.0.2.ip6.arpa</tt>, the Apex SHOULD be responsible for the allocation of IPv6 addresses in this prefix. The RAA, might need to develop an addressing plan for delegating HDA values.</t>
        <t>Distribution of HHIT (IPv6 address) blocks SHOULD be done using the 14-bit RAA space as a framework. The Apex SHOULD allocate blocks to each entity who can then assign them to HDAs in accordance with local law and policy. All HDAs MUST have an IPv6 address in <tt>2001:30::/28</tt>. A discrete zone SHOULD be delegated for each HDA. These MUST contain an HHIT resource record (<xref target="hhit-rr" format="default"/>) for itself.</t>
        <t>Reverse lookups of these IPv6 addresses MUST return HIP and HHIT RRTypes. Depending on local circumstances these lookups MAY return other RRTypes.</t>
      </section>
    </section>
    <section anchor="endorsements" numbered="true" toc="default">
      <name>Endorsements</name>
      <t>DRIP Endorsements are defined in a CDDL <xref target="RFC8610" format="default"/> structure (<xref target="endorsement-cddl" format="default"/>) that can be encoded to CBOR, JSON or as a binary blob by concatenating values. CBOR is the preferred encoding format.</t>
      <t>The CDDL was derived from the more specific structure developed for <xref target="RFC9575" format="default"/>. As such the structures found in <xref target="RFC9575" format="default"/>, such as the UA Signed Evidence and the contents of DRIP Link (known as a Broadcast Endorsement), are a subset of the below definition in a strict binary form.</t>
      <ul empty="true" spacing="normal">
        <li>Note: this section uses the term HHIT instead of DET as the Endorsements are designed to be generic and re-useable for other HHIT use-cases.</li>
      </ul>
      <figure anchor="endorsement-cddl">
        <name>Endorsement CDDL</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
endorsement = #6.TBD([
    e-type, 
    scope, 
    ? $$evidence, 
    $$endorser, 
    $$signature
])

e-type = uint .size(2)
scope = {
    vnb: time, 
    vna: time, 
    * tstr => any
}

$$endorser //= (hhit,)
$$endorser //= (hhit, eddsa25519-hi,)
$$endorser //= (eddsa25519-hi,)
$$signature //= (eddsa25519-sig,)

hhit = #6.54(bstr .size(16))
eddsa25519-hi = bstr .size(32)
eddsa25519-sig = bstr .size(64)
]]></artwork>
      </figure>
      <t>An Endorsement is made from a CBOR array with 4-5 elements in a specific order as defined below.</t>
      <dl newline="false" spacing="normal">
        <dt>Endorsement Type:</dt>
        <dd>
  a 16-bit value used to hint at the content of the various groups. Four special values (1 through 4) map to the SAM Type of the Authentication framing in <xref target="RFC9575" format="default"/>, allowing the 16-bit value to be excluded from the Endorsement structure. See <xref target="iana-e-types" format="default"/> for more details.</dd>
        <dt>Scope:</dt>
        <dd>
  This section is more formally known as "the scope of validity of the endorsement". The scope can come in various forms but MUST always contain a "valid not before" (<tt>vnb</tt>) and "valid not after" (<tt>vna</tt>) timestamps. Other forms of the scope could for example be a 4-dimensional volume definition. This could be in raw latitude, longitude, altitude tuples or may be a URI pointing to scope information. Additional scope fields are out of scope for this document and should be defined for specific Endorsement structures if they are desired and assigned an <tt>e-type</tt>.</dd>
        <dt>Evidence:</dt>
        <dd>
  socket group containing a set claims, usually CBOR encoded. The content and order of claims is specified explicitly for each <tt>e-type</tt>.</dd>
        <dt>Endorser:</dt>
        <dd>
  socket group where the main identity information of the signer of the Endorsement is found. The identity can take many forms such as a handle to the identity (e.g. an HHIT), or can include more explicit data such as the public key (e.g. an HI). The content and ordering is specified explicitly for each <tt>e-type</tt>. This document defines three different options for this group, using combinations of a DET and its HI.</dd>
        <dt>Signature:</dt>
        <dd>
  socket group containing the signature data for the Endorsement. The content and ordering is specified explicitly for each <tt>e-type</tt>. Signatures MUST be generated using the preceding sections (except for <tt>e-type</tt>) in their binary forms (i.e. as a concatenated octet-string of values) rather than their CBOR encoding. This document defines a single group option sized to an EdDSA25519 signature.</dd>
      </dl>
      <t><xref target="drip-endorsements" format="default"/> specifies Endorsement structures for the UAS RID use-case.</t>
    </section>
    <section anchor="x509" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <section anchor="certificate-policy-and-certificate-stores" numbered="true" toc="default">
        <name>Certificate Policy and Certificate Stores</name>
        <t>X.509 certificates are optional for the DRIP entities covered in this document. DRIP endpoint entities (EE) (i.e., UA, GCS, and Operators) may benefit from having X.509 certificates. Most of these certificates will be for their DET and some will be for other UAS identities. To provide for these certificates, some of the other entities (e.g. USS) covered in this document will also have certificates to create and manage the necessary PKI structure.</t>
        <t>Three certificate profiles are defined, with examples, and explained in <xref target="drip-dki" format="default"/>. Each has a specific role to play and an EE may have its DET enrolled in all of them. There is a 'Lite' profile that would work well enough on constrained communication links for those instances where various issues push the use of X.509. There is a 'Basic; profile that is more in line with <xref target="RFC5280" format="default"/> recommendations, but is still small enough for many constrained environments. Finally there is a profile to directly add DET support into the civil/general aviation certificates as discussed below.</t>
        <t>A Certificate Authority (CA) supporting DRIP entities MAY adhere to the ICAO's Aviation Common Certificate Policy (ACCP). The CA(s) supporting this CP MUST either be a part of the ACCP cross-certification or part of the ACCP CA Trust List. It is possible that future versions of the ACCP will directly support the DRIP Basic profile.</t>
        <ul empty="true" spacing="normal">
          <li>Authors Note: ACCP is ICAO Doc 10169 Aviation Common Certificate Policy (ACCP). I can't get a url for that, but so far these is no changes from v 0.93 of the old IATF CP; changes are in the works then will be posted, so continue to reference IATF CP</li>
        </ul>
        <t>EEs may use their X.509 certificates, rather than their rawPublicKey (i.e. HI) in authentication protocols (as not all may support rawPublicKey identities). Short lived DETs like those used for a single operation or even for a day's operations may not benefit from X.509. Creating then almost immediately revoking these certificates is a considerable burden on all parts of the system. Even using a short notAfter date will not completely mitigate the burden of managing these certificates. That said, many EEs will benefit to offset the effort. It may also be a regulator requirement to have these certificates. Finally, certificates can provide the context of use for a DET (via policy constraint OIDs).</t>
        <t>Typically an HDA either does or does not issue a certificate for all its DETs. An RAA may specifically have some HDAs for DETs that do not want/need certificates and other HDAs for DETs that do need them. These types of HDAs could be managed by a single entity thus providing both environments for its customers.</t>
        <t>It is recommended that DRIP X.509 certificates be stored as DNS TLSA Resource Records, using the DET as the lookup key. This not only generally improves certificate lookups, but also enables use of DANE <xref target="RFC6698" format="default"/> for the various servers in the UTM and particularly DIME environment and DANCE <xref target="dane-clients" format="default"/> for EEs (e.g. <xref target="drip-secure-nrid-c2" format="default"/>). All DRIP certificates MAY alternatively be available via RDAP. LDAP/OCSP access for other UTM and ICAO uses SHOULD also be provided.</t>
      </section>
      <section anchor="certificate-management" numbered="true" toc="default">
        <name>Certificate Management</name>
        <t>PKIX standard X.509 issuance practices should be used. The certificate request SHOULD be included in the DET registration request. A successful DET registration then MUST include certificate creation, store, and return to the DET registrant. It is possible that the DET registration is actually an X.509 registration. For example, PKIX CSR may be directly used and the DET registration and Endorsement creation are a addition to this process. Further ACME may be directly extendable to provide the DET registration.</t>
        <t>Note that CSRs do not include the certificate <tt>validityDate</tt>; adding that is done by the CA.  If in the registration process, the EE is the source of <tt>notBefore</tt> and <tt>notAfter</tt> dates, they need to be sent along with the CSR.</t>
        <t>Certificate revocation will parallel DET revocation. TLSA RR MUST be deleted from DNS and RDAP, LDAP, and OCSP return revoked responses. CRLs SHOULD be maintained per the CP.</t>
      </section>
      <section anchor="examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>For full examples of X.509 Certificates and the process to use them see <xref target="drip-dki" format="default"/>.</t>
      </section>
      <section anchor="alternative-certificate-encoding" numbered="true" toc="default">
        <name>Alternative Certificate Encoding</name>
        <t>The CBOR Encoded X.509 Certificates (C509 Certificates) <xref target="cbor-cert" format="default"/> provides a standards-based approach to reduce the size of X.509 certificates both on-the-wire and in storage. The PKI-Lite RAA certificate example in Appendix B.2 is 331 bytes. The matching C509 certificate is 183 bytes. This sort of difference may have significant impact both on UAS storage requirements and over-the-air transmission impact.</t>
        <ul empty="true" spacing="normal">
          <li>Author: where is the B.2 example from?</li>
        </ul>
        <t>C509 provides two approaches for encoding X.509:</t>
        <ol spacing="normal" type="1"><li>An invertible CBOR re-encoding of DER encoded X.509 certificates <xref target="RFC5280" format="default"/>, which can be reversed to obtain the original DER encoded X.509 certificate.</li>
          <li>Natively signed C509 certificates, where the signature is calculated over the CBOR encoding instead of over the DER encoding as in 1. This removes the need for ASN.1 and DER parsing and the associated complexity but they are not backwards compatible with implementations requiring DER encoded X.509.</li>
        </ol>
        <t>The invertible CBOR encoding may be sufficient for most needs. The CBOR objects clearly indicate which approach was used, so that the receiver can properly process the C509 object. For interoperability in DRIP, it is recommended that invertible CBOR encoding be used.</t>
        <t>Using the invertible CBOR encoding is achieved through in-line libraries that convert in the desired direction. Since it is not expected that DNS protocols to implement this conversion, the HHIT RR SHOULD contain the normal X.509 DER encoding. The CBOR encoding MAY be used, but operational experience will be needed to see if there are measurable gains in doing so.</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <section anchor="iana-apex" numbered="true" toc="default">
        <name>Management of DRIP Apex</name>
        <t>IANA is asked to maintain the DNS registry for <tt>3.0.0.1.0.0.2.ip6.arpa</tt> and oversee the delegation of RAA allocations until administrative control can be transitioned to ICAO. Requests for delegation of RAAs MUST be approved by the appropriate CAA. Control of a country's RAAs is a National Matter and is expected to be overseen by the CAA. Management issues include delegation of these RAAs in the <tt>3.0.0.1.0.0.2.ip6.arpa</tt> Apex, Secure DNS policy, validation and delegation of DET registrations. These are out of scope for this document.</t>
        <t>Requests for delegations of RAAs MUST be validated, either by ICAO or the appropriate CAA. This SHOULD follow a process analogous to the procedures used in ENUM <xref target="RFC3761" format="default"/> for the delegation of country codes for E.164 telephone numbers. Delegation of RAAs is a National Matter and MUST NOT be made without the consent of the relevant CAA.</t>
      </section>
      <section anchor="iana-drip-registry" numbered="true" toc="default">
        <name>IANA DRIP Registry</name>
        <section anchor="iana-raa" numbered="true" toc="default">
          <name>DRIP RAA Allocations</name>
          <t>This document requests a new registry for RAA Allocations under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref> to be managed by IANA.</t>
          <dl newline="false" spacing="normal">
            <dt>RAA Allocations:</dt>
            <dd>
  a 14-bit value that is allocated in groups of 4. Future additions to this registry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values/ranges are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">RAA Value(s)</th>
                <th align="left">Status</th>
                <th align="left">Allocation</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0 - 3</td>
                <td align="left">Allocated</td>
                <td align="left">UAS RID (DRIP) Apex</td>
                <td align="left">This RFC (<xref target="drip-apex" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">4 - 3999</td>
                <td align="left">Allocated</td>
                <td align="left">ISO 3166-1 Countries</td>
                <td align="left">This RFC (<xref target="iso3166" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">4000 - 16375</td>
                <td align="left">Reserved</td>
                <td align="left">N/A</td>
                <td align="left">N/A</td>
              </tr>
              <tr>
                <td align="left">16375 - 16383</td>
                <td align="left">Allocated</td>
                <td align="left">DRIP WG (Experimental Use)</td>
                <td align="left">This RFC</td>
              </tr>
            </tbody>
          </table>
          <ul empty="true" spacing="normal">
            <li>Author: do we set an RAA/HDA for "unregistered" users? A UA could generate a DET/HI and create a "self-signed" BE for Broadcast RID.</li>
          </ul>
          <t>The mapping between ISO 3166-1 Numeric Numbers and RAAs can be found as a CSV file on <eref target="https://github.com/ietf-wg-drip/draft-ietf-drip-registries/blob/main/iso3166-raa.csv">GitHub</eref>.</t>
        </section>
        <section anchor="iana-e-types" numbered="true" toc="default">
          <name>Endorsement Types</name>
          <t>This document requests a new registry for Endorsement Type under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>Endorsement Type:</dt>
            <dd>
  A 16-bit value to provide hinting of the contents of other sections of an Endorsement. Future additions to this registry are to be made through Specification Required (Section 4.3 of <xref target="RFC8126" format="default"/>) for values 0x0000 to 0xEFFF and First Come First Served (Section 4.4 of <xref target="RFC8126" format="default"/>) for the values 0xF000 to 0xFFFF. The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Endorsement Type</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Self-Endorsement</td>
                <td align="left">This RFC (<xref target="se" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">Broadcast Endorsement</td>
                <td align="left">This RFC (<xref target="be" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">Wrapper</td>
                <td align="left">This RFC (<xref target="we" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">3</td>
                <td align="left">Manifest</td>
                <td align="left">This RFC (<xref target="me" format="default"/>)</td>
              </tr>
              <tr>
                <td align="left">4</td>
                <td align="left">Frame</td>
                <td align="left">This RFC (<xref target="fe" format="default"/>)</td>
              </tr>
            </tbody>
          </table>
          <t>To register an <tt>e-type</tt> the following MUST be provided in CDDL for review:</t>
          <ul spacing="normal">
            <li>Additions to <tt>scope</tt> map (optional)</li>
            <li>Specific group contents of <tt>$$evidence</tt></li>
            <li>Specific group contents of <tt>$$endorser</tt></li>
            <li>Specific group contents of <tt>$$signature</tt></li>
          </ul>
        </section>
        <section anchor="iana-hhit-type" numbered="true" toc="default">
          <name>HHIT Type</name>
          <t>This document requests a new registry for HHIT Type under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>HHIT Type:</dt>
            <dd>
  numeric, 16-bit, field of the HHIT RR to encode the HHIT Type. Future additions to this registry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Type</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Not Defined</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">DRIP Identity Management Entity (DIME)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">Apex</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">3</td>
                <td align="left">Registered Assigning Authority (RAA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">4</td>
                <td align="left">HHIT Domain Authority (HDA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">5</td>
                <td align="left">DIME Provisioning Agent (DPA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">6</td>
                <td align="left">DIME Information Agent (DIA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">7</td>
                <td align="left">ISO 3166-1 Numeric Nation (INN)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">8 - 15</td>
                <td align="left">Reserved</td>
                <td align="left">&nbsp;</td>
              </tr>
              <tr>
                <td align="left">16</td>
                <td align="left">Endpoint Entity (EE)</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">17</td>
                <td align="left">Issuer CA</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">18</td>
                <td align="left">Authentication CA</td>
                <td align="left">
                  <xref target="drip-dki" format="default"/></td>
              </tr>
              <tr>
                <td align="left">19</td>
                <td align="left">Uncrewed Aircraft (UA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">20</td>
                <td align="left">Ground Control Station (GCS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">21</td>
                <td align="left">Uncrewed Aerial System (UAS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">22</td>
                <td align="left">Remote Identification (RID) Module</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">23</td>
                <td align="left">Pilot</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">24</td>
                <td align="left">Operator</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">25</td>
                <td align="left">Discovery &amp; Synchronization Service (DSS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">26</td>
                <td align="left">UAS Service Supplier (USS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">27</td>
                <td align="left">Network RID Service Provider (SP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">28</td>
                <td align="left">Network RID Display Provider (DP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">29</td>
                <td align="left">Supplemental Data Service Provider (SDSP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">30 - 65535</td>
                <td align="left">Reserved</td>
                <td align="left">&nbsp;</td>
              </tr>
            </tbody>
          </table>
          <ul empty="true" spacing="normal">
            <li>Author: text on DRIP Expert Review process</li>
          </ul>
        </section>
        <section anchor="iana-hhit-status" numbered="true" toc="default">
          <name>HHIT Status</name>
          <t>This document requests a new registry for HHIT Status under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl newline="false" spacing="normal">
            <dt>HHIT Status:</dt>
            <dd>
  numeric, 8 bit, field of the HHIT RR to encode the HHIT Status. Future additions to this registry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
          </dl>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Status</th>
                <th align="left">Description</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Inactive</td>
                <td align="left">Default when accepted by DIME</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">Active</td>
                <td align="left">Set when in use</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">Expired</td>
                <td align="left">Set when past VNA</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">3</td>
                <td align="left">Deprecated</td>
                <td align="left">Set when no longer in use (but not expired)</td>
                <td align="left">This RFC</td>
              </tr>
            </tbody>
          </table>
          <ul empty="true" spacing="normal">
            <li>Author: text on DRIP Expert Review process</li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="dns-operational-considerations" numbered="true" toc="default">
        <name>DNS Operational Considerations</name>
        <t>The contents of this section are duplicated in <xref target="nameserver" format="default"/></t>
        <t>The Registrar and Registry are commonly used concepts in the DNS. These components interface the DIME into the DNS hierarchy and thus operation SHOULD follow best common practices, specifically in security (such as running DNSSEC) as appropriate. The following RFC provide suitable guidance: <xref target="RFC7720" format="default"/>, <xref target="RFC4033" format="default"/>, <xref target="RFC4034" format="default"/>, <xref target="RFC4035" format="default"/>, <xref target="RFC5155" format="default"/>, <xref target="RFC8945" format="default"/>, <xref target="RFC2182" format="default"/>, <xref target="RFC4786" format="default"/>, <xref target="RFC3007" format="default"/>.</t>
        <t>If DNSSEC is used, a DNSSEC Practice Statement (DPS) SHOULD be developed and published. It SHOULD explain how DNSSEC has been deployed and what security measures are in place. <xref target="RFC6841" format="default"/> documents a Framework for DNSSEC Policies and DNSSEC Practice Statements.</t>
        <t>The interfaces and protocol specifications for registry-registrar interactions are intentionally not specified in this document. These will depend on nationally defined policy and prevailing local circumstances. It is expected registry-registrar activity will use the Extensible Provisioning Protocol (EPP) <xref target="RFC5730" format="default"/>. The registry SHOULD provide a lookup service such as WHOIS <xref target="RFC3912" format="default"/> or RDAP <xref target="RFC9082" format="default"/> to provide public information about registered domain names.</t>
        <t>Decisions about DNS or registry best practices and other operational matters SHOULD be made by the CAA, ideally in consultation with local stakeholders.</t>
      </section>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During DET key rollover the DIME MUST inform all children and parents of the change - using best standard practices of a key rollover.</t>
        <t>A DET has a natural ability for a single DIME to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute could also allow for a single DIME to be "federated" across multiple DETs sharing the same HID value. This method of deployment has not been thoroughly studied at this time.</t>
      </section>
      <section anchor="det-gen-concern" numbered="true" toc="default">
        <name>DET Generation</name>
        <ul empty="true" spacing="normal">
          <li>Author: is this section valid anymore? Perhaps we hard specify that devices ONLY generate on their own hardware instead of "out-sourcing" as this section implies.</li>
        </ul>
        <t>Under the FAA <xref target="FAA-RID-NPRM" format="default"/>, it is expecting that Session IDs for UAS are assigned by the UTM and are one-time use. The methods for this however are unspecified leaving two options.</t>
        <t>Option 1:</t>
        <ul empty="true" spacing="normal">
          <li>The entity generates its own DET, discovering and using the RAA and HDA for the target DIME. The method for discovering a DIME's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the DIME to be accepted (thus generating the required Self-Endorsement) or denied.</li>
        </ul>
        <t>Option 2:</t>
        <ul empty="true" spacing="normal">
          <li>The entity sends to the DIME its HI for it to be hashed and result in the DET. The DIME would then either accept (returning the DET to the device) or deny this pairing.</li>
        </ul>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations and connectivity it is acceptable, though not recommended, under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft. The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
      </section>
    </section>
    <section anchor="public-key-exposure" numbered="true" toc="default">
      <name>Public Key Exposure</name>
      <t>DETs are built upon asymmetric keypairs. As such the public key must be revealed to enable clients to perform signature verifications.</t>
      <t>While unlikely the forging of a corresponding private key is possible if given enough time (and computational power). As such it is RECOMMENDED that the public key for any DET not be exposed in DNS (using the HIP RR) until it is required.</t>
      <t>Optimally this requires the UAS somehow signal the DIME that a flight using a Specific Session ID will soon be underway or complete. It may also be facilitated under UTM if the USS (which may or may not be a DIME) signals when a given operation using a Session ID goes active.</t>
    </section>
    <section anchor="contributors" numbered="true" toc="default">
      <name>Contributors</name>
      <t>Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT Consulting, LLC) for their early work on the DRIP registries concept. Their early contributions laid the foundations for the content and processes of this architecture and document. Bob Moskowitz is also instrumental in the PKIX work defined in this document with his parallel work in ICAO.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9153" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9374" target="https://www.rfc-editor.org/info/rfc9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC9434" target="https://www.rfc-editor.org/info/rfc9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="drip-secure-nrid-c2" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-secure-nrid-c2-14">
          <front>
            <title>Secure UAS Network RID and C2 Transport</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>   This document defines a transport mechanism between an Uncrewed
   Aircraft System (UAS) and its UAS Service Supplier (USS) for Network
   Remote ID (Net-RID) messages.  Either the Broadcast Remote ID (B-RID)
   messages, or alternatively, appropriate MAVLink Messages can be sent
   directly over UDP or via a more functional protocol using CoAP/CBOR
   for the Net-RID messaging.  This is secured via either HIP/ESP or
   DTLS.  HIP/ESP or DTLS secure messaging Command-and-Control (C2) for
   is also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-secure-nrid-c2-14"/>
        </reference>
        <reference anchor="dane-clients" target="https://datatracker.ietf.org/doc/html/draft-ietf-dance-client-auth-05">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <date day="13" month="January" year="2024"/>
            <abstract>
              <t>   The DANE TLSA protocol [RFC6698] [RFC7671] describes how to publish
   Transport Layer Security (TLS) server certificates or public keys in
   the DNS.  This document updates RFC 6698 and RFC 7671.  It describes
   how to additionally use the TLSA record to publish client
   certificates or public keys, and also the rules and considerations
   for using them with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-05"/>
        </reference>
        <reference anchor="drip-dki" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-drip-dki-09">
          <front>
            <title>The DRIP DET public Key Infrastructure</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   The DRIP Entity Tag (DET) public Key Infrastructure (DKI) is a
   specific variant of classic Public Key Infrastructures (PKI) where
   the organization is around the DET, in place of X.520 Distinguished
   Names.  Further, the DKI uses DRIP Endorsements in place of X.509
   certificates for establishing trust within the DKI.

   There are two X.509 profiles for shadow PKI behind the DKI, with many
   of their X.509 fields mirroring content in the DRIP Endorsements.
   This PKI can at times be used where X.509 is expected and non-
   constrained communication links are available that can handle their
   larger size.

   C509 (CBOR) encoding of all X.509 certificates are also provided as
   an alternative for where there are gains in reduced object size.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-dki-09"/>
        </reference>
        <reference anchor="cbor-cert" target="https://datatracker.ietf.org/doc/html/draft-ietf-cose-cbor-encoded-cert-09">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50% while also significantly reducing memory and code size
   compared to ASN.1.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 Certificate Signing Requests, C509 COSE headers, a
   C509 TLS certificate type, and a C509 file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-09"/>
        </reference>
        <reference anchor="uas-sn-dns" target="https://datatracker.ietf.org/doc/html/draft-wiethuechter-drip-uas-sn-dns-02">
          <front>
            <title>UAS Serial Numbers in DNS</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="25" month="June" year="2024"/>
            <abstract>
              <t>   This document describes a way Uncrewed Aerial System (UAS) Serial
   Numbers are placed into and retrieved from the Domain Name System
   (DNS).  This is to directly support DRIP-based Serial Numbers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-uas-sn-dns-02"/>
        </reference>
        <reference anchor="RFC3761" target="https://www.rfc-editor.org/info/rfc3761">
          <front>
            <title>The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM)</title>
            <author fullname="P. Faltstrom" initials="P." surname="Faltstrom"/>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="April" year="2004"/>
            <abstract>
              <t>This document discusses the use of the Domain Name System (DNS) for storage of E.164 numbers. More specifically, how DNS can be used for identifying available services connected to one E.164 number. It specifically obsoletes RFC 2916 to bring it in line with the Dynamic Delegation Discovery System (DDDS) Application specification found in the document series specified in RFC 3401. It is very important to note that it is impossible to read and understand this document without reading the documents discussed in RFC 3401. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3761"/>
          <seriesInfo name="DOI" value="10.17487/RFC3761"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used. This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers. This requires matching improvements in TLS client software, but no change in TLS server software. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC6841" target="https://www.rfc-editor.org/info/rfc6841">
          <front>
            <title>A Framework for DNSSEC Policies and DNSSEC Practice Statements</title>
            <author fullname="F. Ljunggren" initials="F." surname="Ljunggren"/>
            <author fullname="AM. Eklund Lowinder" initials="AM." surname="Eklund Lowinder"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document presents a framework to assist writers of DNS Security Extensions (DNSSEC) Policies and DNSSEC Practice Statements, such as domain managers and zone operators on both the top level and secondary level, who are managing and operating a DNS zone with Security Extensions implemented.</t>
              <t>In particular, the framework provides a comprehensive list of topics that should be considered for inclusion into a DNSSEC Policy definition and Practice Statement. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6841"/>
          <seriesInfo name="DOI" value="10.17487/RFC6841"/>
        </reference>
        <reference anchor="RFC7252" target="https://www.rfc-editor.org/info/rfc7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
          <front>
            <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <author fullname="B. Ellacott" initials="B." surname="Ellacott"/>
            <author fullname="N. Kong" initials="N." surname="Kong"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP). It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP). RDAP is a successor protocol to the very old WHOIS protocol. The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="7480"/>
          <seriesInfo name="DOI" value="10.17487/RFC7480"/>
        </reference>
        <reference anchor="RFC7519" target="https://www.rfc-editor.org/info/rfc7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
          <front>
            <title>Registration Data Access Protocol (RDAP) Query Format</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9082"/>
          <seriesInfo name="DOI" value="10.17487/RFC9082"/>
        </reference>
        <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
          <front>
            <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs). These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9083"/>
          <seriesInfo name="DOI" value="10.17487/RFC9083"/>
        </reference>
        <reference anchor="RFC9334" target="https://www.rfc-editor.org/info/rfc9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9575" target="https://www.rfc-editor.org/info/rfc9575">
          <front>
            <title>DRIP Entity Tag (DET) Authentication Formats and Protocols for Broadcast Remote Identification (RID)</title>
            <author fullname="A. Wiethuechter" initials="A." role="editor" surname="Wiethuechter"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>The Drone Remote Identification Protocol (DRIP), plus trust policies and periodic access to registries, augments Unmanned Aircraft System (UAS) Remote Identification (RID), enabling local real-time assessment of trustworthiness of received RID messages and observed UAS, even by Observers lacking Internet access. This document defines DRIP message types and formats to be sent in Broadcast RID Authentication Messages to verify that attached and recently detached messages were signed by the registered owner of the DRIP Entity Tag (DET) claimed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9575"/>
          <seriesInfo name="DOI" value="10.17487/RFC9575"/>
        </reference>
        <reference anchor="RFC4033" target="https://www.rfc-editor.org/info/rfc4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC5155" target="https://www.rfc-editor.org/info/rfc5155">
          <front>
            <title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="G. Sisson" initials="G." surname="Sisson"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="D. Blacka" initials="D." surname="Blacka"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence. However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5155"/>
          <seriesInfo name="DOI" value="10.17487/RFC5155"/>
        </reference>
        <reference anchor="RFC8945" target="https://www.rfc-editor.org/info/rfc8945">
          <front>
            <title>Secret Key Transaction Authentication for DNS (TSIG)</title>
            <author fullname="F. Dupont" initials="F." surname="Dupont"/>
            <author fullname="S. Morris" initials="S." surname="Morris"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="B. Wellington" initials="B." surname="Wellington"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a protocol for transaction-level authentication using shared secrets and one-way hashing. It can be used to authenticate dynamic updates to a DNS zone as coming from an approved client or to authenticate responses as coming from an approved name server.</t>
              <t>No recommendation is made here for distributing the shared secrets; it is expected that a network administrator will statically configure name servers and clients using some out-of-band mechanism.</t>
              <t>This document obsoletes RFCs 2845 and 4635.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="93"/>
          <seriesInfo name="RFC" value="8945"/>
          <seriesInfo name="DOI" value="10.17487/RFC8945"/>
        </reference>
        <reference anchor="RFC4034" target="https://www.rfc-editor.org/info/rfc4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC4035" target="https://www.rfc-editor.org/info/rfc4035">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
        <reference anchor="RFC3007" target="https://www.rfc-editor.org/info/rfc3007">
          <front>
            <title>Secure Domain Name System (DNS) Dynamic Update</title>
            <author fullname="B. Wellington" initials="B." surname="Wellington"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This document proposes a method for performing secure Domain Name System (DNS) dynamic updates. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3007"/>
          <seriesInfo name="DOI" value="10.17487/RFC3007"/>
        </reference>
        <reference anchor="RFC2182" target="https://www.rfc-editor.org/info/rfc2182">
          <front>
            <title>Selection and Operation of Secondary DNS Servers</title>
            <author fullname="R. Elz" initials="R." surname="Elz"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <author fullname="M. Patton" initials="M." surname="Patton"/>
            <date month="July" year="1997"/>
            <abstract>
              <t>This document discusses the selection of secondary servers for DNS zones.The number of servers appropriate for a zone is also discussed, and some general secondary server maintenance issues considered. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="16"/>
          <seriesInfo name="RFC" value="2182"/>
          <seriesInfo name="DOI" value="10.17487/RFC2182"/>
        </reference>
        <reference anchor="RFC7720" target="https://www.rfc-editor.org/info/rfc7720">
          <front>
            <title>DNS Root Name Service Protocol and Deployment Requirements</title>
            <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
            <author fullname="L-J. Liman" surname="L-J. Liman"/>
            <date month="December" year="2015"/>
            <abstract>
              <t>The DNS root name service is a critical part of the Internet architecture. The protocol and deployment requirements for the DNS root name service are defined in this document. Operational requirements are out of scope.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="40"/>
          <seriesInfo name="RFC" value="7720"/>
          <seriesInfo name="DOI" value="10.17487/RFC7720"/>
        </reference>
        <reference anchor="RFC3912" target="https://www.rfc-editor.org/info/rfc3912">
          <front>
            <title>WHOIS Protocol Specification</title>
            <author fullname="L. Daigle" initials="L." surname="Daigle"/>
            <date month="September" year="2004"/>
            <abstract>
              <t>This document updates the specification of the WHOIS protocol, thereby obsoleting RFC 954. The update is intended to remove the material from RFC 954 that does not have to do with the on-the-wire protocol, and is no longer applicable in today's Internet. This document does not attempt to change or update the protocol per se, or document other uses of the protocol that have come into existence since the publication of RFC 954. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3912"/>
          <seriesInfo name="DOI" value="10.17487/RFC3912"/>
        </reference>
        <reference anchor="RFC4786" target="https://www.rfc-editor.org/info/rfc4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="CTA2063A" target="https://shop.cta.tech/products/small-unmanned-aerial-systems-serial-numbers">
          <front>
            <title>ANSI/CTA 2063-A Small Unmanned Aerial Systems Numbers</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="FAA-RID-NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="F3411" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3411-22A"/>
          <seriesInfo name="DOI" value="10.1520/F3411-22A"/>
        </reference>
      </references>
    </references>
    <section anchor="hhit-rr" numbered="true" toc="default">
      <name>HHIT Resource Record</name>
      <t>This appendix is normative.</t>
      <t>The HHIT Resource Record is a metadata record for various bits of HHIT specific information that isn't available in the pre-existing HIP RR Type. It is encoded as a CBOR array with a TBD CBOR Tag.</t>
      <section anchor="hhit-rr-wire" numbered="true" toc="default">
        <name>Wire Format</name>
        <figure anchor="hhit-wire-cddl">
          <name>HHIT Wire Format CDDL</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
hhit-rr = #6.TBD([
    hhit, type, status, abbreviation, endorsements, uris
])
hhit = #6.54(bstr .size(16))
type = uint .size(2)
status = uint .size(1)
abbreviation = tstr .size(15)
endorsements = [1* #6.TBD]  ; MUST be in e-type order
uris = [* #6.32]
]]></artwork>
        </figure>
      </section>
      <section anchor="hhit-rr-presentation" numbered="true" toc="default">
        <name>Presentation Format</name>
        <figure anchor="hhit-text">
          <name>HHIT Presentation Format</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
<domain> HHIT IN ( HHIT TYPE STATUS ABBREV [Endorsement(s)] [URI(s)])
]]></artwork>
        </figure>
      </section>
      <section anchor="hhit-rr-fields" numbered="true" toc="default">
        <name>Field Descriptions</name>
        <dl newline="false" spacing="normal">
          <dt>Type:</dt>
          <dd>
  This field is two octets with values defined in <xref target="iana-hhit-type" format="default"/>. It is envisioned that there may be many types of HHITs in use. In some cases it may be helpful to understand the HHITs role in the ecosystem like described in <xref target="drip-dki" format="default"/>.</dd>
          <dt>Status:</dt>
          <dd>
  This field is a single byte with values defined in <xref target="iana-hhit-status" format="default"/>. A HHIT can go through various states during its life-cycle in the ecosystem. For example: TODO(ATW).</dd>
          <dt>Abbreviation:</dt>
          <dd>
  This field is meant to provide an abbreviation to the HID structure for display devices. The specific contents of this field are not defined here, but a recommendation/example can be found in <xref target="hid-abbreviation" format="default"/>.</dd>
          <dt>Endorsements:</dt>
          <dd>
  This field is a list of CBOR encoded Endorsements in <tt>e-type</tt> order. It MUST included at least one Broadcast Endorsement (<xref target="be" format="default"/>). A special case for the Apex is that the Broadcast Endorsement is filled with its own DET and HI as evidence (i.e. a self-signed Broadcast Endorsement).</dd>
          <dt>URIs:</dt>
          <dd>
  This field is a list of URIs that can be used for the given HHIT to obtain information.</dd>
        </dl>
      </section>
      <section anchor="hhit-rr-example" numbered="true" toc="default">
        <name>Example</name>
        <t>The following example was generated using the CDDL presented in <xref target="hhit-wire-cddl" format="default"/> with the tool in Appendix F of <xref target="RFC8610" format="default"/>.</t>
        <t>CBOR Tag 55799 is used in this example.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
TODO
]]></artwork>
      </section>
    </section>
    <section anchor="bcast-rr" numbered="true" toc="default">
      <name>UAS Broadcast RID Resource Record</name>
      <t>This appendix is informative.</t>
      <t>The UAS Broadcast RID Resource Record type (UASRID) is a format to hold public information typically sent of the UAS Broadcast RID that is static. It can act as a data source if information is not recieved over Broascast RID or for cross validation.</t>
      <section anchor="bcast-rr-wire" numbered="true" toc="default">
        <name>Wire Format</name>
        <figure anchor="bcast-wire-cddl">
          <name>UASRID Wire Format CDDL</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
uasrid-rr = #6.55799({
    uas_type: nibble-field,
    uas_ids: {+ &uas-id-types => uas-id},
    ? auth-grp,
    ? self-grp,
    ? op_type: 0..3,
    ? area-grp,
    ? classification-grp,
    ? operator-grp
})
uas-id = bstr .size(20)
uas-id-types = (none: 0, serial: 1, caa: 2, utm: 3, session: 4)
auth-grp = (
    a_type: nibble-field,
    a_data: bstr .size(1..255),
    ? add_a_data: bstr .size(0..255)
)
area-grp = (
    area_count: 1..255,
    area_radius: float,
    area_floor: float,
    area_ceiling: float
)
classification-grp = (
    ua_class: 0..8,
    eu_class: nibble-field,
    eu_category: nibble-field
)
self-grp = (
    desc_type: nibble-field,
    description: tstr .size(23)
)
operator-grp = (
    operator_id_type: nibble-field,
    operator_id: bstr .size(20)
)
nibble-field = 0..15
]]></artwork>
        </figure>
      </section>
      <section anchor="bcast-rr-presentation" numbered="true" toc="default">
        <name>Presentation Format</name>
        <figure anchor="bcast-text">
          <name>UASRID Presentation Format</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
<domain> IN UASRID ( TODO ) 
]]></artwork>
        </figure>
      </section>
      <section anchor="bcast-rr-fields" numbered="true" toc="default">
        <name>Field Descriptions</name>
        <t>The field names and their general typing are borrowed from the ASTM <xref target="F3411" format="default"/> data dictionary. See that document for additional information on fields semantics and units.</t>
      </section>
      <section anchor="bcast-rr-example" numbered="true" toc="default">
        <name>Example</name>
        <t>The following example was generated using the CDDL presented in <xref target="bcast-wire-cddl" format="default"/> with the tool in Appendix F of <xref target="RFC8610" format="default"/>.</t>
        <t>CBOR Tag 55799 is used in this example.</t>
        <figure>
          <name>UASRID RR Wire Format Example (CBOR Encoded)</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
d9d9f7a5687561735f747970650c6775
61735f696473a100548c0ee64a4212ba
be59e8459b25e5e550b0b3ae85687561
5f636c617373076865755f636c617373
006b65755f63617465676f727905
]]></artwork>
        </figure>
        <figure>
          <name>UASRID RR Presentation Format Example (CBOR Decoded)</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
55799({
  "uas_type": 12,
  "uas_ids": {0: h'8C0EE64A4212BABE59E8459B25E5E550B0B3AE85'},
  "ua_class": 7,
  "eu_class": 0,
  "eu_category": 5
})
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="hid-abbreviation" numbered="true" toc="default">
      <name>HID Abbreviation Recommendation</name>
      <t>This appendix is informative.</t>
      <t>On receiver devices a DET can be translated to a more human readable form such as: <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 Characters of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>.</t>
      <t>To support this DIMEs are recommended to have an abbreviation that could be used for this form. These abbreviations should be a maximum of six characters (for each section) in length. Spaces should not be used and be replaced with either underscores (<tt>_</tt>) or dashes (<tt>-</tt>).</t>
      <t>The concatenation of <tt>{RAA Abbreviation}</tt> and <tt>{HDA Abbreviation}</tt> with a space between them can be what fills in the <tt>HID</tt> field of the HHIT RR in <xref target="hhit-rr" format="default"/>.</t>
      <t>For RAAs allocated in the ISO range <xref target="iso3166" format="default"/>, the RAA abbreviation should be set to the ISO 3166-1 country code (either Alpha-2 or Alpha-3). A common abbreviation for an RAAs four allocated RAA values are out of scope. Other documents such as <xref target="drip-dki" format="default"/> may have more specific recommendations or requirements.</t>
      <t>If a DIME does not have an abbreviation or it can not be looked up then the receiver must use the uppercase 4-character hexadecimal encoding of the field it is missing when using this form.</t>
    </section>
    <section anchor="service-models" numbered="true" toc="default">
      <name>DET Services Registration Models</name>
      <t>This appendix is normative.</t>
      <figure anchor="registration-evidence">
        <name>DET Registration Evidence Model</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
$$evidence //= ({
    serial_number: bstr .size(20),
    uas_id_type: 0..15,
    uas_id: bstr .size(20),
    dki: hi / [det, hi] / #6.TBD,
    ? utm: [utm-id, utm-uri],
    * tstr => any
},)

det = #6.48(bstr .size(16))
hi = bstr .size(32)
utm-id = bstr .size(16),  ; uuidv4
utm_uri = #6.32(tstr)     ; uri
]]></artwork>
      </figure>
      <dl newline="false" spacing="normal">
        <dt>UAS ID Type and UAS ID:</dt>
        <dd>
  defined per ASTM <xref target="F3411" format="default"/>. See <xref target="uas-id-handling" format="default"/> for handling specific instructions during registration.</dd>
        <dt>UAS Serial Number:</dt>
        <dd>
  defined per <xref target="CTA2063A" format="default"/>. Other UAS Serial Number formats (considered legacy) are out of scope for this document.</dd>
        <dt>UTM Assigned ID:</dt>
        <dd>
  also known as an Operational Intent, defined per TODO-UTM-REF and ASTM <xref target="F3411" format="default"/> as a UUIDv4. Part of the UTM Binding group which also includes the source URI of the Operational Intent.</dd>
      </dl>
      <t>It is RECOMMENDED that the information above is signed over in some way to ensure integrity of the registration data. The recommended way to do this is with a Endorsement (<xref target="endorsements" format="default"/>). Another way, the specification of which is out of scope, is with a JWT <xref target="RFC7519" format="default"/> or CWT <xref target="RFC8392" format="default"/>.</t>
      <t>Other data elements MAY be added to this model. A DIME MUST have a public API detailing additional elements expected for their implementations. These elements and reference is out of scope for this document.</t>
      <t>The following table highlights the specific fields to be set for each service, distinguished using <tt>e-type</tt>.</t>
      <table align="center">
        <thead>
          <tr>
            <th align="left">DET Service Type</th>
            <th align="left">e-type</th>
            <th align="left">uas_id_type == 4?</th>
            <th align="left">det present?</th>
            <th align="left">hi present?</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Session ID</td>
            <td align="left">TBD1</td>
            <td align="left">MUST</td>
            <td align="left">MUST NOT</td>
            <td align="left">MUST</td>
          </tr>
          <tr>
            <td align="left">Authentication</td>
            <td align="left">TBD2</td>
            <td align="left">MUST NOT</td>
            <td align="left">MAY</td>
            <td align="left">MUST</td>
          </tr>
          <tr>
            <td align="left">Session ID &amp; Authentication</td>
            <td align="left">TBD3</td>
            <td align="left">MAY</td>
            <td align="left">MUST</td>
            <td align="left">MUST</td>
          </tr>
        </tbody>
      </table>
      <section anchor="uas-id-handling" numbered="true" toc="default">
        <name>UAS ID Handling</name>
        <t>The <tt>uas_id_type</tt> field MUST be set to same UAS ID Type in the ASTM <xref target="F3411" format="default"/> Basic ID Message to ensure proper decoding of the <tt>uas_id</tt> field.</t>
        <t>The <tt>uas_id</tt> field MUST be set with the octets found in the ASTM <xref target="F3411" format="default"/> Basic ID Message UAS ID field. By using identical contents of the Basic ID Message the Specific Session ID Type octet (the first octet in the UAS ID when using UAS ID Type is <tt>0x4</tt>) is preserved. It is RECOMMENDED to preserve the null padding.</t>
      </section>
      <section anchor="registration-model-examples" numbered="true" toc="default">
        <name>Registration Model Examples</name>
        <t>The following are example CDDLs for registration models for the Session ID and Authentication &amp; Session ID services.</t>
        <figure anchor="sessionid-evidence">
          <name>DET Session ID Registration Evidence Model</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
$$evidence //= ({
    serial_number: bstr .size(20),
    uas_id_type: 0..15,
    uas_id: bstr .size(20),
    dki: dki-grp
},)
dki-grp = {
    hi: bstr .size(32)
}
]]></artwork>
        </figure>
        <figure anchor="sid-auth-evidence">
          <name>DET Authentication &amp; Session ID Registration Evidence Model</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
$$evidence //= ({
    serial_number: bstr .size(20),
    uas_id_type: 0..15,
    uas_id: bstr .size(20),
    dki: dki-grp
},)
dki-grp = {
    det: #6.48(bstr .size(16)),
    hi: bstr .size(32)
}
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="relationship-to-rats" numbered="true" toc="default">
      <name>Relationship to RATS</name>
      <t>Remote ATtestationS (RATS) <xref target="RFC9334" format="default"/> can play a functional role in the DRIP registration process. The act of registering in DRIP can be seen as a form of attestation to obtain an identity where a Registrant acts as the Attester and a DIME is both the Relying Party and Verifier.</t>
      <t>The specifics of using RATS models (such as Passport, Background-Check or some combintation) is out of scope for this document.</t>
    </section>
    <section anchor="drip-endorsements" numbered="true" toc="default">
      <name>DRIP Endorsements for UAS</name>
      <t>This appendix is normative. Each section contains the CDDL definition of the Endorsement along with examples in various formats.</t>
      <t>The CDDL representation and thus CBOR examples of <xref target="be" format="default"/>, <xref target="we" format="default"/>, <xref target="me" format="default"/>, and <xref target="fe" format="default"/> are back fitted from the binary form and MUST only be used for transport between entities. Their signature generation follows Section 4.1 of <xref target="RFC9575" format="default"/>.</t>
      <section anchor="se" numbered="true" toc="default">
        <name>Self Endorsement</name>
        <t>The Self Endorsement MAY be used during registration process as an input. <tt>$$evidence</tt> contains the HI of the endorser. <tt>$$endorser</tt> contains the HHIT of the endorser. <tt>$$signature</tt> contains the EdDSA25519 signature.</t>
        <figure>
          <name>Self Endorsement CDDL</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
e-type = 0  ; Self Endorsement
$$evidence //= (eddsa25519-hi,)
$$endorser //= (hhit,)
$$signature = (eddsa25519-sig,)
]]></artwork>
        </figure>
        <figure>
          <name>Self Endorsement CBOR (Encoded)</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
        <figure>
          <name>Self Endorsement CBOR (Decoded)</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="be" numbered="true" toc="default">
        <name>Broadcast Endorsement</name>
        <t>Defined by <xref target="RFC9575" format="default"/> in a binary format (see <xref target="be-binary" format="default"/>) to support Authentication over ASTM <xref target="F3411" format="default"/> constrained links and is the main content of the DRIP Link. This Endorsement is a required output of registration to a DIME at any level.</t>
        <figure anchor="be-binary">
          <name>Broadcast Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                              VNB                              |
+---------------+---------------+---------------+---------------+
|                              VNA                              |
+---------------+---------------+---------------+---------------+
|                                                               |
|                            HHIT of                            |
|                             Child                             |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                             HI of                             |
|                             Child                             |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                            HHIT of                            |
|                            Parent                             |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                           Signature                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure>
          <name>Broadcast Endorsement CDDL</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
e-type = 1  ; SAM Type=1, Broadcast Endorsement
$$evidence //= (hhit, eddsa25519-hi,)
$$endorser //= (hhit,)
$$signature = (eddsa25519-sig,)
]]></artwork>
        </figure>
        <t><tt>$$evidence</tt> are the child entities (e.g. a UA) DET/HHIT and its associated HI. <tt>$$endorser</tt> contains the HHIT of the parent entity (e.g. DIME) as the endorser. <tt>$$signature</tt> contains the EdDSA25519 signature.</t>
        <t>Note that the Endorsement Type (<tt>e-type</tt>) field is the same value as the SAM Type allocated to DRIP (i.e. the value 1). As such for DRIP Authentication the <tt>e-type</tt> field is not encoded into the binary form and is instead handled by the SAM Type of the Authentication framing.</t>
        <figure>
          <name>Broadcast Endorsement CBOR (Encoded)</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
        <figure>
          <name>Broadcast Endorsement CBOR (Decoded)</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="we" numbered="true" toc="default">
        <name>Wrapper Endorsement</name>
        <t>Defined by <xref target="RFC9575" format="default"/> in a binary format (see <xref target="we-binary" format="default"/>) to support Authentication over ASTM <xref target="F3411" format="default"/> constrained links and is the main content of the DRIP Wrapper.</t>
        <figure anchor="we-binary">
          <name>Wrapper Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
        <figure>
          <name>Wrapper Endorsement CDDL</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
e-type = 2 ; SAM Type=2, Wrapper Endorsement
$$evidence //= (*4 astm-message,)
$$endorser //= (hhit,)
$$signature = (eddsa25519-sig,)
astm-message = bstr .size(25)
]]></artwork>
        </figure>
        <figure>
          <name>Wrapper Endorsement CBOR (Encoded)</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
        <figure>
          <name>Wrapper Endorsement CBOR (Decoded)</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="me" numbered="true" toc="default">
        <name>Manifest Endorsement</name>
        <t>Defined by <xref target="RFC9575" format="default"/> in a binary format (see <xref target="me-binary" format="default"/>) to support Authentication over ASTM <xref target="F3411" format="default"/> constrained links and is the main content of the DRIP Manifest.</t>
        <figure anchor="me-binary">
          <name>Manifest Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
        <figure>
          <name>Manifest Endorsement CDDL</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
e-type = 3  ; SAM Type=3, Manifest Endorsement
$$evidence //= (3*11 manifest-hash,)
$$endorser //= (hhit,)
$$signature = (eddsa25519-sig,)
manifest-hash = bstr .size(8)
]]></artwork>
        </figure>
        <figure>
          <name>Manifest Endorsement CBOR (Encoded)</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
        <figure>
          <name>Manifest Endorsement CBOR (Decoded)</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
      <section anchor="fe" numbered="true" toc="default">
        <name>Frame Endorsement</name>
        <t>Defined by <xref target="RFC9575" format="default"/> in a binary format (see <xref target="fe-binary" format="default"/>) to support Authentication over ASTM <xref target="F3411" format="default"/> constrained links and is the main content of the DRIP Frame.</t>
        <figure anchor="fe-binary">
          <name>Frame Endorsement Binary</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
        <figure>
          <name>Frame Endorsement CDDL</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
e-type = 4  ; SAM Type=4, Frame Endorsement
$$evidence //= (frame-type, frame-data,)
$$endorser //= (hhit,)
$$signature = (eddsa25519-sig,)
frame-type = uint .size(1)
frame-data = bstr .size(1..111)
]]></artwork>
        </figure>
        <figure>
          <name>Frame Endorsement CBOR (Encoded)</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
        <figure>
          <name>Frame Endorsement CBOR (Decoded)</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
TODO
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="dns-examples" numbered="true" toc="default">
      <name>DNS Examples</name>
      <t>This appendix is informative.</t>
      <!-- TODO -->

</section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
