<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wiethuechter-drip-det-moc-00" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="det-moc">Means of Compliance for DRIP Entity Tags as UAS RID Identifiers</title>
    <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-det-moc-00"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="04"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document is intended for Civil Aviation Authorities (CAAs) as a Means of Compliance (MOC) for using Drone Remote Identification Protocol (DRIP) Entity Tags (DETs) for Unmanned Aircraft System (UAS) Remote ID (RID) identifiers. This enables Session IDs, Authentication Key IDs for accountability, and encryption key IDs for confidentiality.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <section anchor="purpose" numbered="true" toc="default">
        <name>Purpose</name>
        <t>This document is written to reference other documents, thus acting as an introduction for Civil Aviation Authorities (CAAs) and their Operators attempting to comply within a given jurisdiction. A CAA MAY override any requirement in this document, but MUST provide the reason and an alternative for their operators to implement. This document offers technical options, with recommendations of defaults for international interoperability.</t>
      </section>
      <section anchor="background" numbered="true" toc="default">
        <name>Background</name>
        <t>A registry function including Hierarchical Host Identity Tag (HHIT) Domain Authority (HDA) is required to support Session IDs that can be used by CAAs and other lawfully authorized parties to look up essential safety and security information associated with UAS and their Operators.</t>
        <t>In the Unmanned Aerial System (UAS) Traffic Management (UTM) context, it is expected that the HDA function will be provided by each UAS Service Supplier (USS). This can be in-house or out-sourced to a service bureau more specialized in cryptographically verifiable identifiers usable to access data and systems on networks. Outside the UTM context, each Operator must still obtain this function from some provider.</t>
        <t>The HDA function also can support other services related to Session IDs. The DRIP Entity Tag (DET) can act as a Session ID and/or Authentication Key ID, thus HDA functionality in this document assumes both are being provided to registrants (see <xref target="det-ptc" format="default"/> for more details). The use of Authentication is mandated in some (e.g. Japan) but not all regions.</t>
        <t>Each DET is tied to a longer term identifier by its HDA. Typically this identifier is expected to be the UAS Serial Number, however a CAA MAY choose another long term identifier of significance to them.</t>
      </section>
      <section anchor="scope" numbered="true" toc="default">
        <name>Scope</name>
        <t>Any entity involved in UAS Broadcast RID as per this document:</t>
        <ul spacing="normal">
          <li>if that entity uses a Session ID (some participating entities, e.g. HDAs, may not have Session IDs), MUST use a DET for that Session ID.</li>
          <li>if that entity participates in DRIP protocol interactions (even if not needing a Session ID), MUST use a DET for the DRIP public key ID.</li>
          <li>if that entity requires a strongly cryptographically verifiable IP compatible identifier, MAY use a DET for any other legal purpose.</li>
          <li>SHOULD NOT use DET as a locator in physical or logical space (e.g. as a globally routable IPv6 address outside of an overlay network). See <xref target="det-locator" format="default"/> for further details.</li>
        </ul>
        <t>The archetypal case is a UAS for which the DET serves as both the UAS ID (e.g. in the ASTM <xref target="F3411" format="default"/> Basic ID Message as a Type 4, Subtype 1 Specific Session ID) and the Authentication Key ID.</t>
        <t>DRIP builds upon existing UAS RID standards (ASTM <xref target="F3411" format="default"/>) and baseline Means of Compliance (ASTM <xref target="F3586" format="default"/>). This document acts as a further Means of Compliance for DETs to be used as Session IDs and/or Authentication Key IDs. This document is intended to be internationally applicable but at the time of first writing the authors have only confirmed compatibility with ASTM <xref target="F3586" format="default"/> (and thus US FAA rules).</t>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <section anchor="additional-definitions" numbered="true" toc="default">
        <name>Additional Definitions</name>
        <t>This document makes use of terms (PII, USS, etc.) defined in <xref target="RFC9153" format="default"/>, <xref target="RFC9434" format="default"/> and <xref target="RFC9374" format="default"/>. For convenience of the reader, some of the major definitions are restated here.</t>
        <t>TODO: find good accurate definitions of these terms &amp; order them</t>
        <dl newline="false" spacing="normal">
          <dt>UAS RID identifier:</dt>
          <dd>
  a term used in this document to encompass the use of a DET to be used as any combination of the following: UAS Specific Session ID, Authentication Key ID and Encryption Key ID.</dd>
          <dt>DRIP Identity Management Entity (DIME):</dt>
          <dd>
  Originally defined in <xref target="RFC9434" format="default"/> and expanded technically in <xref target="DET-DNS" format="default"/>. An entity providing registrar and registry services specifically for DETs.</dd>
          <dt>Attestation:</dt>
          <dd>
  i.e. secure boot of a device</dd>
          <dt>Authentication:</dt>
          <dd>
  of the individual (essential)</dd>
          <dt>Authorization:</dt>
          <dd>
  the admin action of defining roles and what access is permitted for them &amp; the subsequent reference to these roles in policy based determination to grant or deny specific access requests</dd>
          <dt>Access Control:</dt>
          <dd>
  i.e. zero trust. Fine grained near real time access control</dd>
          <dt>Attribution:</dt>
          <dd>
  every action needs to attributable to who took it</dd>
          <dt>Accounting:</dt>
          <dd>
  resource use MUST be tracked</dd>
          <dt>Audit:</dt>
          <dd>
  look back at any of the above after the fact</dd>
        </dl>
      </section>
    </section>
    <section anchor="interactions-responsibilities" numbered="true" toc="default">
      <name>Interactions &amp; Responsibilities</name>
      <t>This section outlines the various players in the ecosystem. For each, it outlines relevant motivations for using DRIP, as well as the interactions and responsibilities they have in doing so.</t>
      <section anchor="uas-observers" numbered="true" toc="default">
        <name>UAS Observers</name>
        <t>An Observer has many motivations for detecting Broadcast RID. Regardless of their motivation the authenticity of the data presented is important for them to make decisions on their next actions. This is accomplished by the use of Authentication of the Broadcast RID, something DRIP provides. Observers also may need additional information, beyond what is sent over Broadcast RID. While the use of a Session ID provides a level of privacy, the use of DRIP allows this privacy while also enabling authorized queries for additional data.</t>
        <t>An Observer device is expected to be able to process messages compliant with <xref target="F3586" format="default"/> and <xref target="F3411" format="default"/> Broadcast RID including:</t>
        <ol spacing="normal" type="1"><li>Basic ID Message (Message Type 0x0), UAS ID Type 0x4 (Specific Session ID), Specific Session ID Type 0x01 (DRIP Entity Tag). The UAS ID SHOULD be displayed either in the style of an IPv6 address per <xref target="RFC5952" format="default"/> or as described in <xref target="hid-abbrev" format="default"/>.</li>
          <li>Authentication Messages (Message Type 0x2), Authentication Type 0x5 (Specific Authentication Method (SAM)), SAM Types 0x01 (DRIP Link), 0x02 (DRIP Wrapper), 0x03 (DRIP Manifest) and optionally 0x04 (DRIP Frame). The details of these SAM Types are described in <xref target="RFC9575" format="default"/>. Observer devices MUST follow the requirements of Section 6.4.2 of <xref target="RFC9575" format="default"/>. Appendix A of <xref target="RFC9575" format="default"/> is RECOMMENDED for visualization of the trustworthiness assessment.</li>
        </ol>
      </section>
      <section anchor="uas-operators" numbered="true" toc="default">
        <name>UAS Operators</name>
        <t>UAS Operators may want to protect the privacy of their details (such as Operator Location) and their reputation. Reputation can be gained or lost with observation and reports of behavior backed by Authentication. They MAY decide for which UAS RID identifier purposes they will use DETs. This choice may be constrained by the jurisdiction's RID regulations.</t>
        <ul empty="true" spacing="normal">
          <li>Author: move to Definitions: whether to use DRIP for an Authentication Key ID only, Single Use Session ID only, or both. The last of these is the natural approach providing the greatest benefits and thus the primary focus of this document.</li>
        </ul>
      </section>
      <section anchor="uas-manufacturers" numbered="true" toc="default">
        <name>UAS Manufacturers</name>
        <t>Manufacturers typically wish to maintain good reputation of their brands and are often driven by market forces. Such forces include requirements and preferences of both UAS Observers and Operators.</t>
        <t>To satisfy CAA requirements, a UA MUST transmit whatever <xref target="F3411" format="default"/> messages are needed to carry at least the minimal elements of information required by the regulator. In the US, under the current FAA RID rule, these are Basic ID, Location/Vector, and System as specified in <xref target="F3586" format="default"/>. If the content of these messages is to be trusted, the UA MUST also sign those messages, using the DRIP Wrapper and/or DRIP Manifest methods, as described in <xref target="RFC9575" format="default"/>.</t>
        <ul empty="true" spacing="normal">
          <li>Author: add reference to US RID rule</li>
        </ul>
        <t>The UAS MUST provide mechanisms and interfaces to enable DET support for UAS Operator selected purposes. For DRIP this requires at minimum the UAS Operator to be able to select DRIP options and start the process of generating and registering a DET with a selected HDA.</t>
      </section>
      <section anchor="hda-operators" numbered="true" toc="default">
        <name>HDA Operators</name>
        <t>An HDA Operator must fullfil the requirements of their jurisdiction. They must also satisfy the desires of UAS Operators.</t>
        <t>The HDA MUST provide, upon successful registration of a DET, the four Broadcast Endorsement objects for use in <xref target="RFC9575" format="default"/>. These are:</t>
        <ul spacing="normal">
          <li>Broadcast Endorsement: RAA:A on RAA:I</li>
          <li>Broadcast Endorsement: RAA:I on HDA:A</li>
          <li>Broadcast Endorsement: HDA:A on HDA:I</li>
          <li>Broadcast Endorsement: HDA:I on Registrant</li>
        </ul>
        <t>The HDA must also place certain essential information into the Internet Domain Name System (DNS) and maintain that information as operations are activated, completed, etc. All the information to be placed into the DNS is public as it is either needed to make the DET based systems work or because it is a high-availability replica of information transmitted in clear-text via Broadcast RID. The DNS records also MUST point to the private registry in which additional information, required by the HDA/USS itself or the CAA, must be placed and maintained, for query by authorized parties only.</t>
      </section>
      <section anchor="raa-operators" numbered="true" toc="default">
        <name>RAA Operators</name>
        <t>RAAs in this document are scoped to be operated by a State. Each State is allocated four RAAs, and may decide on their usage.</t>
        <t>Each RAA MUST register HDAs within its scope. Each RAA MUST provide both widely supported "long form" X.509 certificates and DRIP-specific "short form" endorsements of its HDAs.</t>
        <t>The RAA MAY provide services to HDAs for verification of data pertaining to UAS Operators. For example an HDA registering a UAS Session ID may query the RAA to verify a previously RAA-registered UAS Serial Number.</t>
        <t>The RAA Operator MUST obtain valid DNS delegation. See <xref target="ic" format="default"/> for more details.</t>
      </section>
    </section>
    <section anchor="drip-service-options" numbered="true" toc="default">
      <name>DRIP Service Options</name>
      <t>TODO: selection options matrix</t>
    </section>
    <section anchor="requirements-for-dime-operation" numbered="true" toc="default">
      <name>Requirements for DIME Operation</name>
      <t>The requirements below apply to both RAA and HDA operators with a focus on how HDA operators provide registration and related services for their clients (i.e. UAS Operators and their UAS).</t>
      <section anchor="query" numbered="true" toc="default">
        <name>Query</name>
        <t>A DIME has two query interfaces it MUST support. One interface is used for public information query and another (identified and using data found via public queries) is for private information.</t>
        <section anchor="pub-info-reg" numbered="true" toc="default">
          <name>Public Information Registries</name>
          <t>The information found in these registries has been designated as public (explicitly or implicitly) by cognizant authority and/or the information owner. Such information includes public cryptographic keys needed for authentication in <xref target="RFC9575" format="default"/>, static Broadcast RID data and trustworthy pointers to additional information.</t>
          <t>These registries are Authoritative Name Servers of DNS. See <xref target="DET-DNS" format="default"/> for operational requirements, query mechanism and response models.</t>
        </section>
        <section anchor="priv-info-reg" numbered="true" toc="default">
          <name>Private Information Registries</name>
          <t>The information found in these registries is considered Personally Identifiable Information (PII) and/or is stored for potential future audit of registration.</t>
          <t>Private information queries MUST follow <xref target="DET-DIFF-ACCESS" format="default"/>. This specifies the use of Registration Data Access Protocol (RDAP) data models and query formats as the primary query mechanisms. The specific access control policies are to be defined by the CAA. A CAA MAY require additional query mechanisms for their jurisdiction.</t>
        </section>
      </section>
      <section anchor="registration" numbered="true" toc="default">
        <name>Registration</name>
        <t>There are several registration functions essential to achieving the purposes to which this document is directed. Likewise there are several viable technical approaches to performing these functions. The only approaches fully specified in <xref target="DET-REGISTRATION" format="default"/> are the Constrained Application Protocol (CoAP) <xref target="RFC7252" format="default"/> and/or Concise Binary Object Representation (CBOR) Web Tokens (CWT) <xref target="RFC8392" format="default"/>.</t>
        <t>DRIP does NOT provide protection against incorrect (e.g. fraudulent) data entered during registration or asserted subsequently. DRIP does protect against alteration (intentional or unintentional) of data subsequent to its assertion by the cryptographic signer. The signer might be the proximate sender (e.g. UA transmitting Broadcast RID) or might be an attestor far away and long ago (e.g. root Certificate Authority). It is the duty of the operator of each DIME, or the party on whose behalf the DIME is being operated, to validate the registration data.</t>
      </section>
      <section anchor="cross-cutting" numbered="true" toc="default">
        <name>Cross Cutting</name>
        <t>DIMEs use and provide various methods to protect data as described below under seven categories: Attestation, Authentication, Authorization, Access Control, Attribution, Accounting and Audit. DRIP refers to these categories collectively as AAA. The definitions of the seven categories are provided in <xref target="additional-definitions" format="default"/>.</t>
        <t>All data, handled under DRIP, MUST be protected by AAA. All private data MUST also be protected by strong encryption where permitted by law. These requirements apply to data at rest and in transit in all phases of the process, i.e. registration and query.</t>
        <dl newline="false" spacing="normal">
          <dt>Attestation:</dt>
          <dd>
  MAY be mandated by CAAs for devices (such as UA). Remote ATtestation ProcedureS (RATS) <xref target="RFC9334" format="default"/> is RECOMMENDED by DRIP. The specific attestation mechanisms in a given jurisdiction are out of scope for this document.</dd>
          <dt>Authentication:</dt>
          <dd>
  SHOULD be provided by DIMEs for entities participating in Broadcast RID and if provided MUST follow <xref target="RFC9575" format="default"/></dd>
          <dt>Authorization:</dt>
          <dd>
  TODO</dd>
          <dt>Access Control:</dt>
          <dd>
  MUST be enforced by the DIME to access data from <xref target="priv-info-reg" format="default"/>. The eXtensible Access Control Markup Language (XACML) MUST be used. The policies to be enforced by XACML MUST be provided by the CAA and are out of scope for this document.</dd>
          <dt>Attribution:</dt>
          <dd>
  TODO</dd>
          <dt>Accounting:</dt>
          <dd>
  TODO</dd>
          <dt>Audit:</dt>
          <dd>
  TODO</dd>
        </dl>
      </section>
    </section>
    <section anchor="compliance-testing" numbered="true" toc="default">
      <name>Compliance Testing</name>
      <ul empty="true" spacing="normal">
        <li>Author: This section is a work in progress.</li>
      </ul>
      <t>All interfaces MUST be tested on valid and invalid data (such as being malformed). When policy is required on an interface all defined permutations of the policy MUST be tested. The policy engine MUST be evoked to validate proper decisions and actions are being made. All data returned from an interface MUST be tested to check that it conforms with specifications.</t>
      <t>The DRIP WG is allocated eight RAA values for experimentation and testing purposes. These can be delegated to parties, for a limited period of time at the behest of the DRIP WG, to test DIME interoperability (e.g. HDA to RAA interactions) in any of the below subsections. The IANA Considerations section of <xref target="DET-DNS" format="default"/> contains more information on how these delegations are to be handled.</t>
      <t><xref target="compliance-form" format="default"/> provides a set of forms to be filled out and submitted as part of a CAA compliance process for using DRIP.</t>
      <figure>
        <name>System Interface Test Diagram</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
+-----+           +-----+
|     |           |     |
|     o----(1)--->o     |
|  A  |           |  B  |
|     o<---(2)----o     |
|     |           |     |
+-----+           +-----+
]]></artwork>
      </figure>
      <section anchor="registration-interface" numbered="true" toc="default">
        <name>Registration Interface</name>
        <t>A, B pairs: (registrant, HDA), (HDA, RAA)</t>
        <t>1: Ensure that CoAP endpoints on B can be accessed according to B's policy by A. Ensure that the endpoints conform to the normative requirements of <xref target="DET-REGISTRATION" format="default"/> Test that B interface properly handles valid and malformed data. Test that B securely generates proper artifacts and stores them.</t>
        <t>2: Ensure that the CoAP interactions for (1) properly returns data to A from B. This data MUST include the Broadcast Endorsements, X.509s and any other data elements required.</t>
      </section>
      <section anchor="public-query-interface" numbered="true" toc="default">
        <name>Public Query Interface</name>
        <t>A, B pairs: (UAS Observer, HDA), (UAS Observer, RAA), (HDA, RAA), (RAA, HDA), (HDA, HDA'), (RAA, RAA')</t>
        <t>1: Ensure that B has a properly configured and publicly accessible Authoritative Name Server for its delegated <tt>ip6.arpa</tt> domain.</t>
        <t>2: Ensure that B returns the valid RRTypes defined in <xref target="DET-DNS" format="default"/> to A based on an <tt>ip6.arpa</tt> query via standard DNS methods (i.e. using UDP on port 53). Ensure that the HHIT RRType contains the correct Certificate with an URI.</t>
      </section>
      <section anchor="private-query-interface" numbered="true" toc="default">
        <name>Private Query Interface</name>
        <t>A, B pairs: (UAS Observer, HDA), (UAS Observer, RAA), (HDA, RAA), (RAA, HDA), (HDA, HDA'), (RAA, RAA')</t>
        <t>1: Ensure that the provide URI from the public query interface points to a valid URI. Ensure that the endpoint on B has proper AAA mechanisms as defined in this document and enforces the proper policy options.</t>
        <t>2: Ensure that the B endpoint securely returns the data expected according to policy (matrix of authorized, valid request, unauthorized and invalid request) to A.</t>
      </section>
    </section>
    <section anchor="ic" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document requires no new or modified actions by IANA. It does depend on actions IANA has already undertaken to perform in support of DRIP <xref target="DET-DNS" format="default"/>. It also informs other parties of interactions they must have with IANA to achieve the intended purposes of this document; e.g. Nation states MUST request IANA delegation of the DNS zone under <tt>ip6.arpa</tt> corresponding to their allocated RAA values.</t>
    </section>
    <section anchor="sc" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>The considerations discussed in <xref target="RFC9153" format="default"/>, <xref target="RFC9434" format="default"/>, <xref target="RFC9374" format="default"/>, <xref target="RFC9575" format="default"/> and <xref target="DET-DNS" format="default"/> apply.</t>
      <section anchor="det-locator" numbered="true" toc="default">
        <name>DETs as a Locator</name>
        <t>TODO</t>
      </section>
    </section>
    <section anchor="ptc" numbered="true" toc="default">
      <name>Privacy &amp; Transparency Considerations</name>
      <t>The considerations discussed in <xref target="RFC9153" format="default"/> apply.</t>
      <section anchor="det-ptc" numbered="true" toc="default">
        <name>DETs as Session ID and Authentication Key ID</name>
        <t>The properties of a DET allow it to be used as a Session ID and/or an Authentication Key ID. There may be scenarios in which Session IDs are desired for privacy but Authentication is not; although this may reduce transparency and security, a DET MAY be used exclusively as a Session ID in such. There are scenarios in which Authentication is desired but Session IDs are not (e.g. where a CAA does not allow Session IDs); a DET MAY be used exclusively as an Authentication Key ID in such. In the scenario expected to be most common, both Session IDs and Authentication are desired; the same DET SHOULD be used as both the Session ID and Authentication Key ID in such.</t>
      </section>
      <section anchor="selective-encryption" numbered="true" toc="default">
        <name>Selective Encryption</name>
        <t>The DET, in its capacity as a Session ID, already acts as a query key for various data elements (both public and private).  Selective encryption MAY be allowed when using a Session ID to allow authorized parties to obtain decryption as a service (under UTM, from the USS under which the observed UA is flying) or access decryption key material (under UTM or not, from the HDA) via a private lookup.  This enables the encryption of selected data elements in Broadcast RID to provide a layer of privacy for operators (e.g. their position) without compromising transparency to entities (e.g.public safety / law enforcement personnel) that need to know.</t>
        <t>Selective encryption typically requires network connectivity of the Observer to perform the private query to obtain the decryption service or key material.  CAAs should consider the expected Observer environment and prohibit encryption wherever and whenever Observers cannot reasonably be expected to have connectivity.  For example selective encryption, per CAA regulations, MAY be allowed in dense urban areas but prohibited in rural areas.</t>
        <t>The issue of Observer network connectivity MAY be mitigated with the use of a shared key, for encryption/decryption, used by multiple Session IDs in a given HDA over a period of time, that is preloaded onto the Observer before connectivity is lost.  For example Observers MAY query HDAs for flight volumes in which they are interested to preload their decryption key(s) for the registrations that day.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="DET-DNS" target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-registries-19">
          <front>
            <title>DRIP Entity Tags (DET) in the Domain Name System (DNS)</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Jim Reid" initials="J." surname="Reid">
              <organization>RTFM llp</organization>
            </author>
            <date day="4" month="November" year="2024"/>
            <abstract>
              <t>   This document describes the discovery and management of DRIP Entity
   Tags (DETs) in DNS.  Authoritative Name Servers, with DRIP specific
   DNS structures and standard DNS methods, are the Public Information
   Registries for DETs and their related metadata.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-19"/>
        </reference>
        <reference anchor="DET-REGISTRATION" target="https://datatracker.ietf.org/doc/html/draft-wiethuechter-drip-det-registration-coap-cwt-00">
          <front>
            <title>DRIP Entity Tag (DET) Registration using CoAP &amp; CWTs</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="27" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies a registration interaction model and
   interfaces for DRIP Entity Tags to a DRIP Identity Management Entity
   using the Constrained Application Protocol and CBOR Web Tokens.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-det-registration-coap-cwt-00"/>
        </reference>
        <reference anchor="DET-DIFF-ACCESS" target="https://datatracker.ietf.org/doc/html/draft-wiethuechter-drip-det-diff-access-rdap-00">
          <front>
            <title>DRIP Entity Tag (DET) Differentiated Access using RDAP</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="27" month="September" year="2024"/>
            <abstract>
              <t>   This document defines an RDAP profile and extension data model for
   UAS registration.  It also gives recommendations for AAA mechanisms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-det-diff-access-rdap-00"/>
        </reference>
        <reference anchor="RFC9153" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9374" target="https://www.rfc-editor.org/info/rfc9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC9434" target="https://www.rfc-editor.org/info/rfc9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC9575" target="https://www.rfc-editor.org/info/rfc9575">
          <front>
            <title>DRIP Entity Tag (DET) Authentication Formats and Protocols for Broadcast Remote Identification (RID)</title>
            <author fullname="A. Wiethuechter" initials="A." role="editor" surname="Wiethuechter"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>The Drone Remote Identification Protocol (DRIP), plus trust policies and periodic access to registries, augments Unmanned Aircraft System (UAS) Remote Identification (RID), enabling local real-time assessment of trustworthiness of received RID messages and observed UAS, even by Observers lacking Internet access. This document defines DRIP message types and formats to be sent in Broadcast RID Authentication Messages to verify that attached and recently detached messages were signed by the registered owner of the DRIP Entity Tag (DET) claimed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9575"/>
          <seriesInfo name="DOI" value="10.17487/RFC9575"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5952" target="https://www.rfc-editor.org/info/rfc5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC7252" target="https://www.rfc-editor.org/info/rfc7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC9334" target="https://www.rfc-editor.org/info/rfc9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="F3411" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3411-22A"/>
          <seriesInfo name="DOI" value="10.1520/F3411-22A"/>
        </reference>
        <reference anchor="F3586" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Practice for Remote ID Means of Compliance to Federal Aviation Administration Regulation 14 CFR Part 89</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3586-22"/>
          <seriesInfo name="DOI" value="10.1520/F3586-22"/>
        </reference>
      </references>
    </references>
    <section anchor="hid-abbrev" numbered="true" toc="default">
      <name>HID Abbreviation</name>
      <t>The DET MAY be abbreviated. This is useful for display application with limited screen real-estate as the display of the entire 128-bit (32-character in hexadecimal) IPv6 address can be costly. Abbreviations SHOULD follow the following format rules.</t>
      <dl newline="false" spacing="normal">
        <dt>Hierarchy Level:</dt>
        <dd>
  Each hierarchy level (RAA/HDA) is represented by a maximum of four alphanumeric characters. This abbreviation SHOULD NOT be a single character in length, for obvious reasons of not being very useful. The decimal representation does fit into the 4 character restriction but is NOT RECOMMENDED. The RECOMMENDED abbreviation for the RAA level is to use the ISO3166-1 Alpha 2 code for nations. This abbreviation MAY be found in DNS under a HHIT RRType of the entity or its parents. If there is no abbreviation hint display devices SHOULD use a fixed size four character hexadecimal representation of the value. It is RECOMMENDED that display applications specify a default RAA value, and only display the RAA abbreviation explicitly when it does not match the default.</dd>
        <dt>Entity Hash:</dt>
        <dd>
  The entity is represented by a fixed size four character hexadecimal string using the last four characters of the DET. If a collision (within the same HID space) on display occurs, the four characters SHOULD shift to the left by one hexadecimal character until the collision is resolved. This window MUST stay within the last sixteen hexadecimal characters of the DET. The <tt>:</tt> character found in an IPv6 address string is ignored.</dd>
        <dt>Delimiter:</dt>
        <dd>
  Each section is delimited by a single character. This can be any whitespace character (except newline and tab) or any non-alphanumeric character (period, comma, semicolon, etc.). It is RECOMMENDED that the delimiter is consistent between components. The RECOMMENDED delimiter is the space character.</dd>
      </dl>
      <t>For example a DET with the values of RAA 16383 and HDA 1 without any abbreviation hint from DNS is represented by the string <tt>3FFF 0001 xxxx</tt> with <tt>xxxx</tt> representing a entity hash. If an abbreviation for the RAA (such as <tt>DRIP01</tt>) and HDA (such as <tt>TEST</tt>) are found in DNS then the DET can be represented with the string of <tt>DRIP01 TEST xxxx</tt>.</t>
      <t>For an example of the entity hash, let's assume there are two DETs with the following hashes in the same HID: <tt>0000:1111:2222:3333</tt> and <tt>0000:2222:1111:3333</tt>. At first both DETs are represented with the same abbreviation: <tt>RAA HDA 3333</tt>. One of these DETs is selected by the display application to shift the display hash one character to avoid the collision resulting in the following two abbreviations: <tt>RAA HDA 3333</tt> and <tt>RAA HDA 1333</tt>.</t>
    </section>
    <section anchor="compliance-form" numbered="true" toc="default">
      <name>Compliance Submission Forms</name>
      <t>TODO</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
