<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wiethuechter-drip-det-moc-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="det-moc">Means of Compliance for DRIP Entity Tags as UAS RID Identifiers</title>
    <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-det-moc-01"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="07"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 67?>

<t>This document is intended for Civil Aviation Authorities (CAAs) as a Means of Compliance (MOC) for using Drone Remote Identification Protocol (DRIP) Entity Tags (DETs) for Unmanned Aircraft System (UAS) Remote ID (RID) identifiers. This enables Session IDs, Authentication Key IDs for accountability, and encryption key IDs for confidentiality.</t>
    </abstract>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="purpose">
        <name>Purpose</name>
        <t>This document is written to reference other documents, thus acting as an introduction for Civil Aviation Authorities (CAAs) and their Operators attempting to comply within a given jurisdiction. A CAA MAY override any requirement in this document, but MUST provide the reason and an alternative for their operators to implement. This document offers technical options, with recommendations of defaults for international interoperability.</t>
      </section>
      <section anchor="background">
        <name>Background</name>
        <t>A registry function including Hierarchical Host Identity Tag (HHIT) Domain Authority (HDA) is required to support Session IDs that can be used by CAAs and other lawfully authorized parties to look up essential safety and security information associated with UAS and their Operators.</t>
        <t>In the Unmanned Aerial System (UAS) Traffic Management (UTM) context, it is expected that the HDA function will be provided by each UAS Service Supplier (USS). This can be in-house or out-sourced to a service bureau more specialized in cryptographically verifiable identifiers usable to access data and systems on networks. Outside the UTM context, each Operator must still obtain this function from some provider.</t>
        <t>The HDA function also can support other services related to Session IDs. The DRIP Entity Tag (DET) can act as a Session ID and/or Authentication Key ID, thus HDA functionality in this document assumes both are being provided to registrants (see <xref target="det-ptc"/> for more details). The use of Authentication is mandated in some (e.g. Japan) but not all regions.</t>
        <t>Each DET is tied to a longer term identifier by its HDA. Typically this identifier is expected to be the UAS Serial Number, however a CAA MAY choose another long term identifier of significance to them.</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>Any entity involved in UAS Broadcast RID as per this document:</t>
        <ul spacing="normal">
          <li>
            <t>if that entity uses a Session ID (some participating entities, e.g. HDAs, may not have Session IDs), MUST use a DET for that Session ID.</t>
          </li>
          <li>
            <t>if that entity participates in DRIP protocol interactions (even if not needing a Session ID), MUST use a DET for the DRIP public key ID.</t>
          </li>
          <li>
            <t>if that entity requires a strongly cryptographically verifiable IP compatible identifier, MAY use a DET for any other legal purpose.</t>
          </li>
          <li>
            <t>SHOULD NOT use DET as a locator in physical or logical space (e.g. as a globally routable IPv6 address outside of an overlay network). See <xref target="det-locator"/> for further details.</t>
          </li>
        </ul>
        <t>The archetypal case is a UAS for which the DET serves as both the UAS ID (e.g. in the ASTM <xref target="F3411"/> Basic ID Message as a Type 4, Subtype 1 Specific Session ID) and the Authentication Key ID.</t>
        <t>DRIP builds upon existing UAS RID standards (ASTM <xref target="F3411"/>) and baseline Means of Compliance (ASTM <xref target="F3586"/>). This document acts as a further Means of Compliance for DETs to be used as Session IDs and/or Authentication Key IDs. This document is intended to be internationally applicable but at the time of first writing the authors have only confirmed compatibility with ASTM <xref target="F3586"/> (and thus US FAA rules).</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <section anchor="additional-definitions">
        <name>Additional Definitions</name>
        <t>This document makes use of terms (PII, USS, etc.) defined in <xref target="RFC9153"/>, <xref target="RFC9434"/> and <xref target="RFC9374"/>. For convenience of the reader, some of the major definitions are restated here.</t>
        <t>TODO: find good accurate definitions of these terms &amp; order them</t>
        <dl>
          <dt>UAS RID identifier:</dt>
          <dd>
            <t>a term used in this document to encompass the use of a DET to be used as any combination of the following: UAS Specific Session ID, Authentication Key ID and Encryption Key ID.</t>
          </dd>
          <dt>DRIP Identity Management Entity (DIME):</dt>
          <dd>
            <t>Originally defined in <xref target="RFC9434"/> and expanded technically in <xref target="DET-DNS"/>. An entity providing registrar and registry services specifically for DETs.</t>
          </dd>
          <dt>Attestation:</dt>
          <dd>
            <t>i.e. secure boot of a device</t>
          </dd>
          <dt>Authentication:</dt>
          <dd>
            <t>of the individual (essential)</t>
          </dd>
          <dt>Authorization:</dt>
          <dd>
            <t>the admin action of defining roles and what access is permitted for them &amp; the subsequent reference to these roles in policy based determination to grant or deny specific access requests</t>
          </dd>
          <dt>Access Control:</dt>
          <dd>
            <t>i.e. zero trust. Fine grained near real time access control</t>
          </dd>
          <dt>Attribution:</dt>
          <dd>
            <t>every action needs to attributable to who took it</t>
          </dd>
          <dt>Accounting:</dt>
          <dd>
            <t>resource use MUST be tracked</t>
          </dd>
          <dt>Audit:</dt>
          <dd>
            <t>look back at any of the above after the fact</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="interactions-responsibilities">
      <name>Interactions &amp; Responsibilities</name>
      <t>This section outlines the various players in the ecosystem. For each, it outlines relevant motivations for using DRIP, as well as the interactions and responsibilities they have in doing so.</t>
      <section anchor="uas-observers">
        <name>UAS Observers</name>
        <t>An Observer has many motivations for detecting Broadcast RID. Regardless of their motivation the authenticity of the data presented is important for them to make decisions on their next actions. This is accomplished by the use of Authentication of the Broadcast RID, something DRIP provides. Observers also may need additional information, beyond what is sent over Broadcast RID. While the use of a Session ID provides a level of privacy, the use of DRIP allows this privacy while also enabling authorized queries for additional data.</t>
        <t>An Observer device is expected to be able to process messages compliant with <xref target="F3586"/> and <xref target="F3411"/> Broadcast RID including:</t>
        <ol spacing="normal" type="1"><li>
            <t>Basic ID Message (Message Type 0x0), UAS ID Type 0x4 (Specific Session ID), Specific Session ID Type 0x01 (DRIP Entity Tag). The UAS ID SHOULD be displayed either in the style of an IPv6 address per <xref target="RFC5952"/> or as described in <xref target="hid-abbrev"/>.</t>
          </li>
          <li>
            <t>Authentication Messages (Message Type 0x2), Authentication Type 0x5 (Specific Authentication Method (SAM)), SAM Types 0x01 (DRIP Link), 0x02 (DRIP Wrapper), 0x03 (DRIP Manifest) and optionally 0x04 (DRIP Frame). The details of these SAM Types are described in <xref target="RFC9575"/>. Observer devices MUST follow the requirements of Section 6.4.2 of <xref target="RFC9575"/>. Appendix A of <xref target="RFC9575"/> is RECOMMENDED for visualization of the trustworthiness assessment.</t>
          </li>
        </ol>
      </section>
      <section anchor="uas-operators">
        <name>UAS Operators</name>
        <t>UAS Operators may want to protect the privacy of their details (such as Operator Location) and their reputation. Reputation can be gained or lost with observation and reports of behavior backed by Authentication. They MAY decide for which UAS RID identifier purposes they will use DETs. This choice may be constrained by the jurisdiction's RID regulations.</t>
        <ul empty="true">
          <li>
            <t>Author: move to Definitions: whether to use DRIP for an Authentication Key ID only, Single Use Session ID only, or both. The last of these is the natural approach providing the greatest benefits and thus the primary focus of this document.</t>
          </li>
        </ul>
      </section>
      <section anchor="uas-manufacturers">
        <name>UAS Manufacturers</name>
        <t>Manufacturers typically wish to maintain good reputation of their brands and are often driven by market forces. Such forces include requirements and preferences of both UAS Observers and Operators.</t>
        <t>To satisfy CAA requirements, a UA MUST transmit whatever <xref target="F3411"/> messages are needed to carry at least the minimal elements of information required by the regulator. In the US, under the current FAA RID rule, these are Basic ID, Location/Vector, and System as specified in <xref target="F3586"/>. If the content of these messages is to be trusted, the UA MUST also sign those messages, using the DRIP Wrapper and/or DRIP Manifest methods, as described in <xref target="RFC9575"/>.</t>
        <ul empty="true">
          <li>
            <t>Author: add reference to US RID rule</t>
          </li>
        </ul>
        <t>The UAS MUST provide mechanisms and interfaces to enable DET support for UAS Operator selected purposes. For DRIP this requires at minimum the UAS Operator to be able to select DRIP options and start the process of generating and registering a DET with a selected HDA.</t>
      </section>
      <section anchor="hda-operators">
        <name>HDA Operators</name>
        <t>An HDA Operator must fullfil the requirements of their jurisdiction. They must also satisfy the desires of UAS Operators.</t>
        <t>The HDA MUST provide, upon successful registration of a DET, the four Broadcast Endorsement objects for use in <xref target="RFC9575"/>. These are:</t>
        <ul spacing="normal">
          <li>
            <t>Broadcast Endorsement: RAA:A on RAA:I</t>
          </li>
          <li>
            <t>Broadcast Endorsement: RAA:I on HDA:A</t>
          </li>
          <li>
            <t>Broadcast Endorsement: HDA:A on HDA:I</t>
          </li>
          <li>
            <t>Broadcast Endorsement: HDA:I on Registrant</t>
          </li>
        </ul>
        <t>The HDA must also place certain essential information into the Internet Domain Name System (DNS) and maintain that information as operations are activated, completed, etc. All the information to be placed into the DNS is public as it is either needed to make the DET based systems work or because it is a high-availability replica of information transmitted in clear-text via Broadcast RID. The DNS records also MUST point to the private registry in which additional information, required by the HDA/USS itself or the CAA, must be placed and maintained, for query by authorized parties only.</t>
      </section>
      <section anchor="raa-operators">
        <name>RAA Operators</name>
        <t>RAAs in this document are scoped to be operated by a State. Each State is allocated four RAAs, and may decide on their usage.</t>
        <t>Each RAA MUST register HDAs within its scope. Each RAA MUST provide both widely supported "long form" X.509 certificates and DRIP-specific "short form" endorsements of its HDAs.</t>
        <t>The RAA MAY provide services to HDAs for verification of data pertaining to UAS Operators. For example an HDA registering a UAS Session ID may query the RAA to verify a previously RAA-registered UAS Serial Number.</t>
        <t>The RAA Operator MUST obtain valid DNS delegation. See <xref target="ic"/> for more details.</t>
      </section>
    </section>
    <section anchor="requirements-for-dime-operation">
      <name>Requirements for DIME Operation</name>
      <t>The requirements below apply to both RAA and HDA operators with a focus on how HDA operators provide registration and related services for their clients (i.e. UAS Operators and their UAS).</t>
      <section anchor="query">
        <name>Query</name>
        <t>A DIME has two query interfaces it MUST support. One interface is used for public information query and another (identified and using data found via public queries) is for private information.</t>
        <section anchor="pub-info-reg">
          <name>Public Information Registries</name>
          <t>The information found in these registries has been designated as public (explicitly or implicitly) by cognizant authority and/or the information owner. Such information includes public cryptographic keys needed for authentication in <xref target="RFC9575"/>, static Broadcast RID data and trustworthy pointers to additional information.</t>
          <t>These registries are Authoritative Name Servers of DNS. See <xref target="DET-DNS"/> for operational requirements, query mechanism and response models.</t>
        </section>
        <section anchor="priv-info-reg">
          <name>Private Information Registries</name>
          <t>The information found in these registries is considered Personally Identifiable Information (PII) and/or is stored for potential future audit of registration.</t>
          <t>Private information queries MUST follow <xref target="DET-DIFF-ACCESS"/>. This specifies the use of Registration Data Access Protocol (RDAP) data models and query formats as the primary query mechanisms. The specific access control policies are to be defined by the CAA. A CAA MAY require additional query mechanisms for their jurisdiction.</t>
        </section>
      </section>
      <section anchor="registration">
        <name>Registration</name>
        <t>There are several registration functions essential to achieving the purposes to which this document is directed. Likewise there are several viable technical approaches to performing these functions. The only approaches fully specified in <xref target="DET-REGISTRATION"/> are the Constrained Application Protocol (CoAP) <xref target="RFC7252"/> and/or Concise Binary Object Representation (CBOR) Web Tokens (CWT) <xref target="RFC8392"/>.</t>
        <t>DRIP does NOT provide protection against incorrect (e.g. fraudulent) data entered during registration or asserted subsequently. DRIP does protect against alteration (intentional or unintentional) of data subsequent to its assertion by the cryptographic signer. The signer might be the proximate sender (e.g. UA transmitting Broadcast RID) or might be an attestor far away and long ago (e.g. root Certificate Authority). It is the duty of the operator of each DIME, or the party on whose behalf the DIME is being operated, to validate the registration data. The RAA (e.g. CAA) SHOULD provide services to obtain this goal. The APIs and access controls for such services are a matter of national policy and are out of scope for this document.</t>
      </section>
      <section anchor="cross-cutting">
        <name>Cross Cutting</name>
        <t>DIMEs use and provide various methods to protect data as described below under seven categories: Attestation, Authentication, Authorization, Access Control, Attribution, Accounting and Audit. DRIP refers to these categories collectively as AAA. The definitions of the seven categories are provided in <xref target="additional-definitions"/>.</t>
        <t>All data, handled under DRIP, MUST be protected by AAA. All private data MUST also be protected by strong encryption where permitted by law. These requirements apply to data at rest and in transit in all phases of the process, i.e. registration and query.</t>
        <dl>
          <dt>Attestation:</dt>
          <dd>
            <t>MAY be mandated by CAAs for devices (such as UA). Remote ATtestation ProcedureS (RATS) <xref target="RFC9334"/> is RECOMMENDED by DRIP. The specific attestation mechanisms in a given jurisdiction are out of scope for this document.</t>
          </dd>
          <dt>Authentication:</dt>
          <dd>
            <t>SHOULD be provided by DIMEs for entities participating in Broadcast RID and if provided MUST follow <xref target="RFC9575"/>.</t>
          </dd>
          <dt>Authorization:</dt>
          <dd>
            <t>TODO</t>
          </dd>
          <dt>Access Control:</dt>
          <dd>
            <t>MUST be enforced by the DIME to access data from <xref target="priv-info-reg"/>. The eXtensible Access Control Markup Language (XACML) MUST be used. The policies to be enforced by XACML MUST be provided by the CAA and are out of scope for this document.</t>
          </dd>
          <dt>Attribution:</dt>
          <dd>
            <t>TODO</t>
          </dd>
          <dt>Accounting:</dt>
          <dd>
            <t>TODO</t>
          </dd>
          <dt>Audit:</dt>
          <dd>
            <t>TODO</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="compliance-testing">
      <name>Compliance Testing</name>
      <ul empty="true">
        <li>
          <t>Author: This section is a work in progress.</t>
        </li>
      </ul>
      <t>All interfaces MUST be tested on valid and invalid data (such as being malformed). When policy is required on an interface all defined permutations of the policy MUST be tested. The policy engine MUST be evoked to validate proper decisions and actions are being made. All data returned from an interface MUST be tested to check that it conforms with specifications.</t>
      <t>There is a range in the RAA space allocated for experimentation and testing purposes. These can be delegated to parties, for a limited period of time at the behest of the RAA Designated Expert, to test DIME interoperability (e.g. HDA to RAA interactions) in any of the below subsections. The IANA Considerations section of <xref target="DET-DNS"/> contains more information on how these delegations are to be handled.</t>
      <t><xref target="compliance-form"/> provides a set of forms to be filled out and submitted as part of a CAA compliance process for using DRIP.</t>
      <figure>
        <name>System Interface Test Diagram</name>
        <artwork><![CDATA[
+-----+           +-----+
|     |           |     |
|     o----(1)--->o     |
|  A  |           |  B  |
|     o<---(2)----o     |
|     |           |     |
+-----+           +-----+
]]></artwork>
      </figure>
      <section anchor="registration-interface">
        <name>Registration Interface</name>
        <t>A, B pairs: (registrant, HDA), (HDA, RAA)</t>
        <t>1: Ensure that CoAP endpoints on B can be accessed according to B's policy by A. Ensure that the endpoints conform to the normative requirements of <xref target="DET-REGISTRATION"/> Test that B interface properly handles valid and malformed data. Test that B securely generates proper artifacts and stores them.</t>
        <t>2: Ensure that the CoAP interactions for (1) properly returns data to A from B. This data MUST include the Broadcast Endorsements, X.509s and any other data elements required.</t>
      </section>
      <section anchor="public-query-interface">
        <name>Public Query Interface</name>
        <t>A, B pairs: (UAS Observer, HDA), (UAS Observer, RAA), (HDA, RAA), (RAA, HDA), (HDA, HDA'), (RAA, RAA')</t>
        <t>1: Ensure that B has a properly configured and publicly accessible Authoritative Name Server for its delegated <tt>ip6.arpa</tt> domain.</t>
        <t>2: Ensure that B returns the valid RRTypes defined in <xref target="DET-DNS"/> to A based on an <tt>ip6.arpa</tt> query via standard DNS methods (i.e. using UDP on port 53). Ensure that the HHIT RRType contains the correct Certificate with an URI.</t>
      </section>
      <section anchor="private-query-interface">
        <name>Private Query Interface</name>
        <t>A, B pairs: (UAS Observer, HDA), (UAS Observer, RAA), (HDA, RAA), (RAA, HDA), (HDA, HDA'), (RAA, RAA')</t>
        <t>1: Ensure that the provide URI from the public query interface points to a valid URI. Ensure that the endpoint on B has proper AAA mechanisms as defined in this document and enforces the proper policy options.</t>
        <t>2: Ensure that the B endpoint securely returns the data expected according to policy (matrix of authorized, valid request, unauthorized and invalid request) to A.</t>
      </section>
    </section>
    <section anchor="ic">
      <name>IANA Considerations</name>
      <t>This document requires no new or modified actions by IANA. It does depend on actions IANA has already undertaken to perform in support of DRIP <xref target="DET-DNS"/>. It also informs other parties of interactions they must have with IANA to achieve the intended purposes of this document; e.g. Nation states MUST request IANA delegation of the DNS zone under <tt>ip6.arpa.</tt> corresponding to their allocated RAA values.</t>
    </section>
    <section anchor="sc">
      <name>Security Considerations</name>
      <t>The considerations discussed in <xref target="RFC9153"/>, <xref target="RFC9434"/>, <xref target="RFC9374"/>, <xref target="RFC9575"/> and <xref target="DET-DNS"/> apply.</t>
      <section anchor="det-locator">
        <name>DETs as a Locator</name>
        <t>TODO</t>
      </section>
    </section>
    <section anchor="ptc">
      <name>Privacy &amp; Transparency Considerations</name>
      <t>The considerations discussed in <xref target="RFC9153"/> apply.</t>
      <section anchor="det-ptc">
        <name>DETs as Session ID and Authentication Key ID</name>
        <t>The properties of a DET allow it to be used as a Session ID and/or an Authentication Key ID. There may be scenarios in which Session IDs are desired for privacy but Authentication is not; although this may reduce transparency and security, a DET MAY be used exclusively as a Session ID in such. There are scenarios in which Authentication is desired but Session IDs are not (e.g. where a CAA does not allow Session IDs); a DET MAY be used exclusively as an Authentication Key ID in such. In the scenario expected to be most common, both Session IDs and Authentication are desired; the same DET SHOULD be used as both the Session ID and Authentication Key ID in such.</t>
      </section>
      <section anchor="selective-encryption">
        <name>Selective Encryption</name>
        <t>The DET, in its capacity as a Session ID, already acts as a query key for various data elements (both public and private).  Selective encryption MAY be allowed when using a Session ID to allow authorized parties to obtain decryption as a service (under UTM, from the USS under which the observed UA is flying) or access decryption key material (under UTM or not, from the HDA) via a private lookup.  This enables the encryption of selected data elements in Broadcast RID to provide a layer of privacy for operators (e.g. their position) without compromising transparency to entities (e.g.public safety / law enforcement personnel) that need to know.</t>
        <t>Selective encryption typically requires network connectivity of the Observer to perform the private query to obtain the decryption service or key material.  CAAs should consider the expected Observer environment and prohibit encryption wherever and whenever Observers cannot reasonably be expected to have connectivity.  For example selective encryption, per CAA regulations, MAY be allowed in dense urban areas but prohibited in rural areas.</t>
        <t>The issue of Observer network connectivity MAY be mitigated with the use of a shared key, for encryption/decryption, used by multiple Session IDs in a given HDA over a period of time, that is preloaded onto the Observer before connectivity is lost.  For example Observers MAY query HDAs for flight volumes in which they are interested to preload their decryption key(s) for the registrations that day.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="DET-DNS">
          <front>
            <title>DRIP Entity Tags (DET) in the Domain Name System (DNS)</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Jim Reid" initials="J." surname="Reid">
              <organization>RTFM llp</organization>
            </author>
            <date day="18" month="April" year="2025"/>
            <abstract>
              <t>   This document describes the discovery and management of DRIP Entity
   Tags (DETs) in DNS.  Authoritative Name Servers, with DRIP specific
   DNS structures and standard DNS methods, are the Public Information
   Registries for DETs and their related metadata.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-26"/>
        </reference>
        <reference anchor="DET-REGISTRATION">
          <front>
            <title>DRIP Entity Tag (DET) Registration using CoAP &amp; CWTs</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="27" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies a registration interaction model and
   interfaces for DRIP Entity Tags to a DRIP Identity Management Entity
   using the Constrained Application Protocol and CBOR Web Tokens.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-det-registration-coap-cwt-00"/>
        </reference>
        <reference anchor="DET-DIFF-ACCESS">
          <front>
            <title>DRIP Entity Tag (DET) Differentiated Access using RDAP</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="27" month="September" year="2024"/>
            <abstract>
              <t>   This document defines an RDAP profile and extension data model for
   UAS registration.  It also gives recommendations for AAA mechanisms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-det-diff-access-rdap-00"/>
        </reference>
        <reference anchor="RFC9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC9575">
          <front>
            <title>DRIP Entity Tag (DET) Authentication Formats and Protocols for Broadcast Remote Identification (RID)</title>
            <author fullname="A. Wiethuechter" initials="A." role="editor" surname="Wiethuechter"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>The Drone Remote Identification Protocol (DRIP), plus trust policies and periodic access to registries, augments Unmanned Aircraft System (UAS) Remote Identification (RID), enabling local real-time assessment of trustworthiness of received RID messages and observed UAS, even by Observers lacking Internet access. This document defines DRIP message types and formats to be sent in Broadcast RID Authentication Messages to verify that attached and recently detached messages were signed by the registered owner of the DRIP Entity Tag (DET) claimed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9575"/>
          <seriesInfo name="DOI" value="10.17487/RFC9575"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="F3411" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3411-22A"/>
          <seriesInfo name="DOI" value="10.1520/F3411-22A"/>
        </reference>
        <reference anchor="F3586" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Practice for Remote ID Means of Compliance to Federal Aviation Administration Regulation 14 CFR Part 89</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3586-22"/>
          <seriesInfo name="DOI" value="10.1520/F3586-22"/>
        </reference>
      </references>
    </references>
    <?line 339?>

<section anchor="hid-abbrev">
      <name>HID Abbreviation</name>
      <t>The DET MAY be abbreviated. This is useful for display application with limited screen real-estate as the display of the entire 128-bit (32-character in hexadecimal) IPv6 address can be costly. Abbreviations SHOULD follow the following format rules.</t>
      <dl>
        <dt>Hierarchy Level:</dt>
        <dd>
          <t>Each hierarchy level (RAA/HDA) is represented by a maximum of four alphanumeric characters. This abbreviation SHOULD NOT be a single character in length, for obvious reasons of not being very useful. The decimal representation does fit into the 4 character restriction but is NOT RECOMMENDED. The RECOMMENDED abbreviation for the RAA level is to use the ISO3166-1 Alpha 2 code for nations. This abbreviation MAY be found in DNS under a HHIT RRType of the entity or its parents. If there is no abbreviation hint display devices SHOULD use a fixed size four character hexadecimal representation of the value. It is RECOMMENDED that display applications specify a default RAA value, and only display the RAA abbreviation explicitly when it does not match the default.</t>
        </dd>
        <dt>Entity Hash:</dt>
        <dd>
          <t>The entity is represented by a fixed size four character hexadecimal string using the last four characters of the DET. If a collision (within the same HID space) on display occurs, the four characters SHOULD shift to the left by one hexadecimal character until the collision is resolved. This window MUST stay within the last sixteen hexadecimal characters of the DET. The <tt>:</tt> character found in an IPv6 address string is ignored.</t>
        </dd>
        <dt>Delimiter:</dt>
        <dd>
          <t>Each section is delimited by a single character. This can be any whitespace character (except newline and tab) or any non-alphanumeric character (period, comma, semicolon, etc.). It is RECOMMENDED that the delimiter is consistent between components. The RECOMMENDED delimiter is the space character.</t>
        </dd>
      </dl>
      <t>For example a DET with the values of RAA 16383 and HDA 1 without any abbreviation hint from DNS is represented by the string <tt>3FFF 0001 xxxx</tt> with <tt>xxxx</tt> representing a entity hash. If an abbreviation for the RAA (such as <tt>DRIP01</tt>) and HDA (such as <tt>TEST</tt>) are found in DNS then the DET can be represented with the string of <tt>DRIP01 TEST xxxx</tt>.</t>
      <t>For an example of the entity hash, let's assume there are two DETs with the following hashes in the same HID: <tt>0000:1111:2222:3333</tt> and <tt>0000:2222:1111:3333</tt>. At first both DETs are represented with the same abbreviation: <tt>RAA HDA 3333</tt>. One of these DETs is selected by the display application to shift the display hash one character to avoid the collision resulting in the following two abbreviations: <tt>RAA HDA 3333</tt> and <tt>RAA HDA 1333</tt>.</t>
    </section>
    <section anchor="compliance-form">
      <name>Compliance Submission Forms</name>
      <t>TODO</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9Vc63LbSHb+z6fo2FU7YoWkLcn2jLnJJrRk7yixbEeUM7uV
SsUg0CSxBgEGDUjmKpNnybPkyfKdSzcaJDWZ5FfiHzMULt2nT5/Ldy6N8Xg8
SKssL1dT0zbL8Q+DQZM3hZ2aa5uUzlRLc1FttkWelKk1y6o2lzdXn8zbEk/t
zG2yciZx5vNsbm6uLs1VZnFjmdvaDZLForZ3U5PZZryp0kFWpWWywcBZnSyb
8X1um3Vr03Vj63FW59uxPjh+fjpIk8auqno3Na7JBoN8W09NU7euOXv+/PXz
s0FS22Rqrkq8W9pmcL+iUfOt+amqv2Ip5vd11W4HX++7Z8aXNCsNrGO6Jimz
f0mKqgRJO+sG23xq/qmp0pFxVd3Udunwa7eRH2m12WBp7p8Hg6Rt1lU9HYyN
MXnppmY2MT9FixngupGVzrJkc3ivqkHu7A/EQ1tv6/zPdmTev7/gew4TW5D4
4vWL74nxG1uneVKYyzq/s/xECr5PzR+x0Lu8KORabVd5VU7Nhz/KI1WGyU/P
X7x+qX+3ZUPM/Dyf8QW7SfJiahKQN4n34W+TbzYQNcGaB4OyqjdJg8mn/Obl
29vx5Yc5+Dq+nODNpWwdEQDSc7DRP3Xz9vdX89ub2e3Vxw/y+C/tuw6Amapy
nFbJdpzeN92MV+/ejWcXF2/n8/9+qCxfLsdJmlrnxnWWbAc8zM27i9enL8+n
5qlRiv+1zWvLmxoeOP/+RXgAQ4XrL86760mdrsONl9+/7G5ALiCq5bLPMTz2
8vXLM3os39698te+P5NrtFZ/7Yfz13Ltvpv6XKYGZ5ws5N35i9NTGdoYVdU5
yXJSZ2a+tSnUL2U+srbe2E3VWAPdxCPmtk5SUhB93Yuy0X/j8MtL6fz2WlWI
h0wKP3FSr0hO102zddNnz+7v7yeJazYTvPZsSSSOz86SybrZ+DcyqPTU/F1b
7MzZ87MzveosCQ0xraOCJp3KOjHILFy//HgFqX4+OX159vxZd1u58vKHV49x
5RNW3eRqvjqGHDNwTWXe2czWULnZXS5snGWbvAzSiQFWbSE/T1+Yi3c35lNS
N+aH1/8vmAo2jcODBzzVu4PxeGySBS05bQaD23XuDMx3S9pi8DsH8WVmM2bo
RQ5DFHGLl583oMCcXMxmbkgOIjnK7ZPrjxdDHqR1ZLYva1jjsEPqS1SYP9UV
jHNVmBNyQMOeBzqBkXAy0Odyk5QlSJvldUpWwsx3rrEbcwIfNYx2/wT+amjy
zmFNDK/TlsmiAO1z2A+a9+oS5p8WRQ8qLX9vd3SdJ4SlIfOaLPIC9IxYzWyZ
1rstP/o1ejStyqVMmNCzE+HzJs8y2PHBU5KJusralF7E30/Np7beVs4e2YF7
cBh7QPIKB2VrS+ysQGQdHgPZsI5gPcYDb2kTStq5MMWv3T0sCAPntfm4hWI0
VY2RMPlmy+OCgpR2dGfu82adl9jqFYxfaf7U1rnLcp5qYmYGo5nr2R9NdWfr
GmzAwDsTmWHQhnmidY7Mom3M9ef5rdnW1R29AjrwSuJAKZGFBSWF6tGdqLdQ
WgVKQV4O6ngG3eHAx2oJzuEReJASW1vgNSIWjKOlYCLx+hmzhmU3s8ukLRrZ
zjxWYfmL5xVJmPAOvoG9XQGMlEAcM6NebmeWbSlbkJdp0RL6Mj9CBsm3MCE/
Vq5RBRAZNyc//nh1OzSXFVx3t007XL+cDUkilJMZrdi12y0wTCzDYEzSmBQc
W1hoG55b7GhLHDNSJKdI7pdtgZ0UEwYMkJktbBsJA0YtquqrabcGg4oMG5cs
LWigEZxNWyYoOEDaI+cqwJcG4zBHCSYeESew6qrkve20FyYME/R0F85rCXNg
rpMyWYnInHy+vR6SXjX2G+QlZ92w3+AFaU5eMg0LHnUsvwdsIiaoTDEjbJIK
dXNb35GnmIODBXYEM8znQxUc5V5ejtcVWAhrbqq2GbuqrVNhfEK2lwdYtJDT
1myq2hpHXhkqT/zE5rFtqFZ1suXNBr+hEbBBZHdig4Rt4ks0LsMZMveJcJv5
ApEsDbDtPcAgzNfHtnFeScCXji28Os9tswGMBs4kLlSLJvFaF/izrKsNIPAm
cKiekAHa42JSuIoZ4mVNREiXT+JY8L6D+EgKiZF2P4Jg8z3kwWCrxFt079B6
n4HsoyZYTVxMGZvWA1tCoogfzixAp0H4gI0krQtCwIZUMChMpzlx1pqHB8KT
2yb9+WdWeN5MXAJ4dkNZCovBcp84TLwh7NHIhjMzT+xkNTF/l2yTcsiGraxA
FTZBwDspwVvaJ/CC3ofSqUQhQlmBs7Aum0g6SGrzhpcOSnZblSRedPRUTx0q
kl6WDpF00rAP7WZh65FZV/cWYoj5vJ1O1xV8D9ivxqEiY79HBJbu8lXJXlrh
Ex7eiO2bpzCHMHsw82rI8vKuKu6EKUTDm7pKshQQh4NHbPyWFhrv2xQ+0uRL
UWUdBTzfE5ETEVcyVWm+Tdgv8cOwXBB/Yjz4hJ+bZMd8XydwF5FcDkfiZ2g7
E94C8SVJbEMnh6R0U1pCRSLZW49U2CUkqXiPE0tOEe/T/KW1bPTjVTxGg+rL
tl0UMH6CJ46QovafOAMhxmZBGn7R0mBMctzgVt/ujHj3+1SQq1YxsCtIzVaA
CZEx//Hj5/eX5sNHoZzeYA0uqpTNDbiyXe+c+FcSoxX/dNsk9UrBz6+KasEk
wls2SuDdK8SoWU2mr1LjBomDnSAMUdBeivGDMs6DvurEqrPLthZUJGqrpowc
LTzXFoRA/CypScISSa/cg1lrYTwWQxbNcpKDTYdXH5I6Jj4Xz8Wg/uGBwxJM
/SbBiiXIcA7eStYIPbXmxQjeZdHQz9MQsMVy4F3kcZOHFbA8LNq8yOAjtrhj
v8FwkTz5PIzT0Adi1ydMBl9gzUUOqH0UlIc3EA3gjX3UBIF2shzP20czRUDl
anUYcSQ9VP2Lht3tzxpHHTJkD34RaCGPnbLkkHlV19/kGxaaZV7DzBBsZtBK
MsAgx4ktqEpSF8Ln9QYzeMVgJCfYpc8VcyKbBOfzeW7ewWTWLaKGIVk+cwsr
mZcVRH0n4kZKCznFdjwhFX8ykv+T0tDvm7f/8Pnq5u0l/Z7/OHv/PvwY6BOi
ZN2v7s2Lj9fXbz9cysukhL1LgyfQ5ScSlDz5+IlyMbP3T454x9rGXN3WtuH9
GmTWpXW+EJP95uLTf/4HYt6Hh7+4eXdxdnr6GoyQP344/f4F/rjHTspszFD5
E8zeDbA7NmFrQD4vTbZ5AwgxIplw8D2lgSDBnvzV37Bcjl/9ze8G7ERmWZYr
wr60S8ThbE33I6JN8tU674zJSUHwP11djbA5cziAJp0MCbvnpSzk4UHTQT//
PNI/XpwT/US5/H1O65mYdxK2wXTnEmItfQySkaVkv6PXNsmfqlpmESKZqzBe
DeMAWd/g9uPlxymkEROtqiojZNcCl9neizIiViNL+Q0MZ8ae0W4GA6/jncWG
k5xCHdk5s6Id7C/2FuSTUDvHxCqrxML3VZRsPR5d5KJbfnnLqiiqe84TM3w4
NFyPhMnM1LddRNw3YyHIiVC9QsOTy6vrt0Ne3Mc6X+Wi5gfb2O0ckE4iBsJH
dMVOntO0Je3orAzOm7EfmQOP/GoeJkRpAcw6n1ajAb1lwwpmCINpeyn5SmTm
EzuRSAg2qKoaYXFmaRQ83eMOv6C8hTQgDM9aCPlJiK6G8gbFYd0LbLgoH2UE
V2hQCsmhZVSUuKAl3BMw0KAhZ1i1oXxB5iHFBjJFQ7l24YAbiOldGkFAHARE
xiMHXsGy7thtZORJ2b7JHuPhFUFmw7IP0fG88tMTLgGToLIzuXBRUQ6i6Bj2
Z8TNkt2HvpH2Y0De4pIsBlStECuuA6byPnMfpqkNvCH8uvN8IYTFzifRp3wo
db/GZBTJ5g2TRMkbkmoaAcrKsRyrB1toAsyUM7UUvyNQb/g5joQXuExehrGR
7GOyADAxybIRZTVLTp89lWSfB4K/MTfWwWs7cS+UMxdrBsGRLW0bMoKiqHdJ
nSPYNFvAHYoJFW7YtJIYUEwURXgc/oZ3EX/ZO9qXTdXkd5rBiDJt0D02vvcW
5jhxKoYRmaIJfULZlIvDBB1ZRSO5StA+GYWPC0ZLNW12Gf7CCxwP7Q5oIVGS
7FQvEphQjhXopWDgt9R0QfdycN+sTaTKyn+Oj+G8SIPIRDjK/SA4JT4EyYcM
kLvA5GnuxNyWOkWJcFkFyAMQQoYpJ7hyt5ZkQfNo3Kdk9BYjToIyY6sQHlDI
SQG7Z5dE0xycWDLCnc+LsikjCOOu8srN8kJqRwze495P67ywfTMfBUt+fsLo
UJmCHtjWYG26G8UvMbEJGX0n3kQfInyM4ZlkTpZyINNljKDulH6WuKFbCe3N
pC8XYhiPxKheV0Eqq/xGQLSTTGNO28mYrINj4rgD+u7FlSHHBt09nRxC8xP/
g+H582/PEYkpxNcrL8zJMaA+OuYFwyinkqmOEh2aM9CxFclhuVnuWL3hwXIG
1KrkrtkVPuLpBUMUJrPzo8oS1kuchrePsdrDwzrPxlKDhdsbnE32hfXaM3V/
/WfDA0+ud15GfDgYDQKQ4f7sekiMmV3zSy7mxPu8/Ip7uHKmV36qCRfWcvFc
LwIJ5Eu4DIlVJCfLnhfPvNBn3tXJxio/NbTrUFM3ecIJmx5btGxHUGBPEJ2Y
fAE6CvO6IiENP1cL/WryYnJGF3rDzbAUOPJvZrZ3iyQ8guWsGXe5aykl2DMc
7AQRKJC1oH0GWsP/OHXd2VifNRUk2OXkyXzcJwL2KAUBWnlQr7bBkHp+nbgW
cS4EJ6QG31eym3HSv7bbViAOmWX/2+dCV+KpObB3qpUVs1UzwOxFyAYzAxcW
ziPH0wv2qWRN+3LEO7rjDATZ58xGEfkh8PV5CHVMnNnVJIS33+m6IhtDzAG5
wA6E85hmteRxmeI7xxPUocJHIO93mm2fwgPdsVmKApEpxTiss7jOU5N0Ssrk
EThMkREUBPYIyv3ZxXkovUf8qZq1SHdBZiyIdi6eGuCrpRoltAemDrzpsCzd
XgE0ETLFkkvQ2jgTolWViE1CVQiEB6o2UbDQiRoUsSUIAzhL4tb70zQh53gP
zyheFQCC8skc2HRy00neAkgxE2JIM6sllbCymstF2A4Q9dWyp07JPc5JPOUP
teF7GknjbANuFQGrtMwQ+VY8FZcabivjQJdbcv2jN+KIs0BiBigR7ICa2d1y
arTzL8Ef0SrIZYvnSpOaAGgDv0qbxkEhBGWDjbJFZ0XiCkmo2qg0quhV9cT4
kggC2LbU8M8gtKjJ7VPGgUW1LexIZYOI8c5tFHT52T/CEFS1ROVaT0lCSOOt
ovpRzCqWiGsHZSR4Ycm5T+mwsbLZSFNiwjVGBZQSxtUqem2kuDOkM9Xy+yRQ
z/CbDTsTyQ48ar5jzYRj7Acwn+eBPZKCYXmOS4kbxIiYz21EQhj7Qrql1CVF
YMn/aX2Di8uRwQX8KgSzeCMkUJxXwgrVZWQbkYN2E9KHYZQ+4JExZQwtRkq9
p6EWA9FdgUTYmBWUu5Zkdxe2AntxXplIZ2ucdIRSrYCVm+olkR8BJouvSIWI
KoHLvDjqB0Wb+wVettv8psiAqhjDcuuYD3iz57KiulK8NSNJasI70UpBh4m7
g0LaYqRpiTbGv2/LDANLGqFa/MmmjY967IH7v/Vaw0WGo2NMzc1sNp1RhEA/
rn75uSt6DquZzh5/jm/7535hPL5tpN1Eq1Idtzo2AzdC4FNbs+HtKrOxjYFo
c0QfeuF8FfkDMFQosV5+mIvbD2acqwv9cq4W1kN2i2Klu4StAENzyz8p32Zm
RaFBZTeACDvTnHVkYWZOUkiBA5NoGVewcGdeOWrzaXnJRfg6KBUB2G3aNOGt
biSlv85X63FyB7ijVXlyS5Ql3rfD3tprxS6FBa/HVD0FUEv246tbJZoaBCip
yzshEoyQuNEEigCvxnb5JAwsSOaxAG/fG2Cvn32ez6nQZ4ul0XIQvNZIRKBj
ZrxxtAUk8xSI7WioI+V8AhpiCyC4sS24oZaAo/lhR+U8H6GJHAilCXVaNXZi
uH7Jv5n7BVdiOOkEHaWBR0rnzoO7EHm35CV8CZRIYnZ6k8bVO99fQnCGadEJ
w9PesjMGuMcvYBO13iDiCRcwidlPzB8mL5+/Zq2R/iLNmpHZHYf81RO3VruP
N2ynm+LDpfTqTdiN1kw9CSFzCG4x7Qz5ufbWpQokWyGqq500ffMoqZ1vCSkW
4UlS/b6Vl0JugI/EWdn1RonCmDwt7RKg0h3lksAW3Br7kcCbg3pwtKzgFZjH
2jFwh9AlYx0Al+1KobvU4PJj5XKui9zEboTTqFfXb3UCbnm63fc1C0uhGFV2
dix4tLNEFO0WcaPr81Ffp5C2pHr23hN+b3rORByntCqETev6iNIiZzpOOFHZ
j7e6EIm6U0SZ/oGYT50+vDLKeyGc0y2JEEaubU0qnYhES9vdJ+XhZDzRoVYx
tlUynPQ/SVH2JIREYgkEa7F8Lan3iI2YjqTpGe4Z4gnUSkUz8Fqo+4xfuIqm
vgl9vubhKQYc01skST/L5sVkysySynCB7fQq8WVhCfpbgoqJ1Jo8gSf2G5no
vMGeU/144/8akrFJq1WJqJlsUuiBUgy5722qe+AjDSP6/pBjiTBhr0pOtTrn
nQ7HcXutHT0QMTKc/k/3Mk6hT6cL6HfiG6y0pB13AKJ1fV6R5fXdXtLlJl5b
gxvK032Ye9ULZQ6mPPjqpNiLckSCAgKOc70AxhV02nkZUOl4XAjwwP9OCnJO
5VNRn0zQJ6xG0zy+8VOaAKKxqKQ39LtNCVDooVeTqlHks2wpQMW2ZTmHL7G6
Y1GfDsU9ZCzj9I8ys2s8F8SYd5FTr5B2ExuVS9p+rXZ0bas3l7NPQxENYTGz
XbZCaHE+Ee8D9L190vap/QqLFkSkSuNlRty0L5YpngByiDsxVShiadyfMbKF
Pbgv0CFaNO98LUGoo3A52YPtvj/LRSiVO9vWOdyShoZdPqcKbRh7XQAZKKZo
ZmLe51/tfe4YE+7NfCfC03V2+kSJDA3FII7rrBghECcc5uJ19Ip0Re6FzPuH
HCgLXQtAvYjSTDNpS9jrYb6oSBjYktBJAMlgk1jj1ZTW9CYvSQI+cgxDiTep
aqgiXLz5eDM0P9mFua2+WuouuvjpVsejUwQcHnMUmVWgn/oCvPvT1CA7P8re
OcL4wLHEVW1pWdbQHkTOZaPyyodCqPTX1nG5VKxszWlKxlhdORHo0nTz+3Sk
n5CbdnUp3NWh0keBWhldGAaYFBUqqaO3cTopDaHC3Tfj5FjI+rPC8G/E4Kt1
41vgQNI3KFlDMsPZFVn651kXChzUpYZEYBiF2hW5/ktdRlQ6vk/EKzPQTFaV
DllTIfiiw5pd8+5wYq4an9LL2q6O5UEL/c3NmwQnRh7/E4bfEca55xQL5VQL
eY9RR+60t9Fj9BGjQEJsNLtmmboN5MKM8XBPaIaFGPoCxTFMGzeOrqqkkPdn
n640udczTGJEONkcxuDgEXi1aaSLMLRRa6k5pAhbNuKM99UWHaQqL+qKysot
7xjEHkyQXhDJDwr1vo6qqaU4SS7eOs40CeyUrJvjvj09kAbrOjVR1X+/UDIy
vZL9yPRr3iMT1az5plafmVSuL6vacDLLdaX4bn5wtaB8DqAAGSlnZmTUpQ6y
30FyQDzzNPS8shnrjP84GoANCIXwxJwREFuZFXhDWCLFY18fVzZqNp89DN7z
sJKZ26UG95+XVsX4wMQ9G/OuYwEPFcm9z9b0878+LpAdbLjZRrN5osZ54zuO
tgCdNvBFs2gjaUA4iAjYCx7p7yCnubBdb69voZdatkh2qKp8ng0n/rzJ7DYM
RE4AETswyhyYYHY7H/qOI+5j2SsVYQbi9r7j7+iKffUjhy9+nSId6U7pKpRx
r7zoFw3hW2z3Om+pU6zf2Es7suwG6eOsOKN72PBC/VJHW0e8+NmSSwQB47AN
3GuZ55b2h4c+VpUMoLF/gLtx3APbn8VcJ/XXdmveJ+Wq5TrxH2YX1++HYWaK
0WSMgLwEdcUk8TuxrgQ+KiD79aZuv98lsCZuYdGLoVVF/n4at2beWieWssuf
9/pPOHPGGTVq/anhUsEVNQdREBv6YyyVAcgfSVZA9E9+M/eDRohb2sBbVdRl
OaROBRu6i+IzLKyHUURMGuyxLJkGrSx1+ixD9EmK9oY60Ffc8Oql5q76Ksms
4Bi3fHonagsRT9YlOz35mRUTx4urLcINIotlrEf0HoOoQLS26VfNqzbcblpR
fx/nLlx8dFPzSrV2JsOUrazvCiAvLd3TcYat5h4KxA0BJHL8KVsdlShu1Z2U
Eh5w8kaI09Sg5A4TU+QwwMLuvMqY0dyEJWUIgA4b6pJM0mUXy78lShqGHVyF
FFiydz5KkQblaPAcjRC3Hw3ZmHWdVeKRGQXGQP1q9mHGaJuiSBWJ0Ea17EXE
BEYIfUpaqpcnkGyRONounxXHUer/sCsPD2nQpDGNgaGjjhpnmSmyr/Luko5p
Z6zeXMppF+rZEjGcUtAgS9CNHMo8/Y4tzP/v+Df4yzH9+8vuXKnRK4N/47/+
LbqjV/RORY+dnA7x399V3Z3ZwTtvonf+it45o3fGVW+0Y/M8ThuT/jCV47l/
/UQLD1dBX25ZVvIEEH7z5OeDCLN7EqZoBAK3SV4Djp1053ZGJE7DER+KG5FM
DQeD06l5W7qWIzMILwVelM3lbAxnCt94bRCPYRm+VnWmKdk337nQ/7ijs/7x
aNyKFwZThfb5/3B0/qB+djR45OXzqG8iIyJWqdipCLrIyAZD6iF8NIA0oeI1
LRJKEMYFVwpEpIefC4tVLZkMOrRzNj1YHfOr1xhIIgkJ6igTE6iuFmufiS18
41v4AwL0Rfx+j1xU9oLx4dS82t5w6ESCUF9C915iomdkOYnHmddHRSTuCAhC
0r9I0hJLzojQ2awvUfjPd+EG/vPdoXy94exm0nGHDxWs2lpTs5JzJOTO0ia4
47H8nhwzbVxkqL/k21eTpN4mXwANqOJzuG1vwo403EBK8nJzIw1Rve7pzjjy
rklJTVxvNI2khCiD7E+VcOLfB1KSGhcb9fnyE73P9fKX58NDXaFDrEpLZ5Cl
30ASEHGcLCn90ny+udKt1pji/8peayTB8SWIFLGXNFZIte9iXRYzwaf6ZFto
aY8aFDFOJE6qugiuem0Lve3cK9jxKXRtnlE6aQi1ZNpbcFzl33QUBDMSS5Ro
o+/Y7BlLHf4Edq/Ov7FnC7XHka5ZG8KpqyUqTMaoUZ8Yslhy5eiYn394mqc/
7x8ECT0XZWVKe88JmyrTyogaMJhxGo+TL5yeyiw17rHk6yM8HytyQUc9dhL4
NslXOXKv+UM+2+mPv2rDbO+swZVW6XMFemLNQg122TesTeig4A5rFn8mJKRJ
bWjT5mMOIVu638L1Wznz+EH8Jh9Acb6iyqyVcTus42EWKfaf6RsMEugHKzD5
IhpKJQK/15IV7jAoQTjsH4bnLZv7A+EH2+ZSrROk/TtZ7tLWuV8+ojOKz+eM
el2W0gPcGTVOD4jl4JNobJff67HEh6fxWUE5l0Nkf9Juyd/QcfMSOJtaio4s
gk4F/49WcYyc/innR/oFhdJuPtFkL0HS6cNt2hRT7B3lOXKO+rG+RAbUdeiU
dKktKWXmuq6F3tm92rf1ZF0VkSASUO7hYeiygkgmBZS9XWlKn6bBy21qJVPj
GR1/S2Ckq9O0C6/KfgOGcCH51Vshq2O69iuRpoWDZRyS5xdCxO8vkk7rSqQi
iSlB6mw29AA3GB+fJP7tryD6sdbQsADt/fPU7/fHb6jXlj5OwacCqCi+d65y
f/xou34rIxPIIDK7HI8XmnDM9VdJpydZTnxbzUxG571EaLlfS5s30gTRK9dt
+/s3Cta2O2IqLpTOT3IHhSZx+3jwhCn27UOc82WcAPwRURSlGHVreO/o0xSU
hBAA0xMnMru8vcc/h6E58MyGcRMXfQDiREzo59vrUQcMqJlHrneHjKVdmrsw
uCZf7EAJlxp8Csv2viZDRQtu1ehmoIchjdFE/FUQwmxJyMTSoaV2C570PnMj
gCNMQAko3y7Y5/JBVk8y6Ax+EsOnk6KTJFEBmnolRIPEY8Bl5dJkTh6OwmKK
e0F4Lh2isTXgVkxNMvIYusv64ZFnlBr2OIf9/5bLyKUthoJn+DwNRvlaVveQ
0aPi0HUyd+hBzpWTbS/5heiQUTg1EAGBuN1LG3CiIomNt9DLB/gT7yb2hVPJ
DhwpsuBUZH+89oepbXmX11UZoB7Yt84XeXOQSL+TFluWcf6j64tG1EsWTD6n
A2Fgsx8bGkYhMQdAY9yR5I4wc8RnU6SvOjTRj/Y1jtWGeg3aepGwdSK7A0nw
65Bnaulxp7vakJQ713K9PXDi6E75PD0EZ9V9fSYq10NN1wmZfGzBSHPZfgnP
us0ahS/lbNqiyWnRsaGN8u3caiTfz+gnzEaa7iMQbwvoD4dYmiEIq1jYJWWl
eovAK3SmYo/p3f7RIkXWQofZsuDi5F1V8LdOgstjZJnU2mMU0pFKUTgWEpuZ
E/2e1n65UD8klCX+81V0koOA048wCTM+bqSfknp4Gp1ACl4giIJ/VPK0ctIO
3KZ2Xy6nyJkof6pfJJp20eclXVpTCxEdDx3LGWvfPeFfVX0lA4Kln579MCYN
OTk/GyOEItQtJ63WYC0lfTdUb+4ds9K8UIpdoHp2vDrnHWd0WiickNZ2Dvkk
ANjkP+20M+/pwB3n5bl1cR1uyEk8CjafdR906k4ycpflJvnGPeScX2wJem8R
CmKna2pi8kvyB1+SeC+ij3QQ742T0yc9PhS2XDVr0YZqwZ2CahwYaJKtkAw4
H7OVrfKFR+ZeR7EWlgkkLbkEp/L+IpqRxLDWAhWpfi5tClHxS4vSUTWstyYv
nRR3CPvkaEIrHSHmav7x/PTVq/GpmRGjzBl/F5NfK5OQQ97nlIpnaFuiiEj8
bNLLXkTC1UifWsPpXPKV/hSFpO8RifZmWFNg7WXUVw11g+SrK8v8Gwk4AIds
dMe0SFb3ua0EcQTm+wpi3onaHmqVb2ja8Ul1/rxZF8pF33Lwr3qW99YUtewx
msqbDiJDExTp6PDU5its+zFxa6lSdaw8Jvm/jiEkTxDP7qAJH53qvxAqRjBF
vE0J19O54mNOtMM4AGSyaVxqGVJyINgV+mSDi44fRKPrPrp1vgx94IXF7wV1
bNgevd0qqH5XaB7ME8N8cPy5JJVTmJYMpkY6R5skfHAvLNXl3xqyiUcn6a+c
GP5l+iWiIUj8/mFTZStZ6FVZSd710ooZrjtbFlUPM+uNNO/evrHpf02Nsrzw
Uo2VmlZH0AmiJrslCHfP3wThelayEGRc0necyvFxE2hOxAfLZ3uTEWjb5OAs
OXT+Fsij+iFSqmsLHYqOj0ItgDSIu4RWsZWs5/sGqvcui1F/UWBdr6e7O6YT
dJf3iRTs9NX5D+eh0/k0oGVa+6FBYeSvJyn29IfpkE38cv7u3Tvz/PnzU/MN
/77I3F/kd3hNIiHVxzV0VDSlfNz+hhLvF0qCPT/9MgyEd7du385v6Ua9Z14p
rAznOlQq4iUE/ugiwB+dxtCQshLlbFIG5vYtNC1jBFVsvnP6LbiobZCatDkn
E6bqfDm9aMN3F7xZmJov4OLz6Sn+Tc/wb3qOf1941XKHL/JtvgP40OhHiDhc
lRRQ/dhKaZqY25iP+EwM1eGoZTyczuPRuIRfhNaaGArFKIqOmYl5ih6gVbKB
6pSIwt+7Ks/27BKIJSwsfR59VhEbY6LdPtXCHn/plBey15wwp/KoQOx3nDN9
eLpfcNVk3X8BWj9PUrpcAAA=

-->

</rfc>
