<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wiethuechter-drip-det-moc-02" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="det-moc">Registration &amp; Usage of DRIP Entity Tags for Trustworthy Air Domain Awareness</title>
    <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-det-moc-02"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 86?>

<t>This document standardizes usage of Drone Remote Identification Protocol (DRIP) Entity Tags (DETs) as identifiers to enable trustworthy Air Domain Awareness (ADA) for Unmanned Aircraft Systems (UAS) in Remote Identification (RID), UAS Traffic Management (UTM) and Advanced Air Mobility (AAM). DETs can serve as Session IDs for privacy, Authentication Key IDs for accountability, and encryption key IDs for confidentiality.</t>
    </abstract>
  </front>
  <middle>
    <?line 90?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="purpose">
        <name>Purpose</name>
        <t>This document provides to stakeholders in a National Airspace System (NAS), such as a Civil Aviation Authority (CAA) and its consituients, a point of entry into a set of relevant standards. These standards provide guidance to enable trustworthy Air Domain Awareness (ADA) primarily via cooperative techologies. Such technologies can include, but are not limited to, Unmanned Aircraft Systems (UAS) Remote Identification (RID), UAS Traffic Management (UTM) and Advanced Air Mobility (AAM). This document specifies an interopable manner of achieving the stated objectives in an international context.</t>
        <t>A CAA MAY override any technical specification in this document but MUST, if claiming compliance with this document, provide the reason and an alternative specification satisfying the same objective.</t>
      </section>
      <section anchor="background">
        <name>Background</name>
        <t><xref target="RFC9153"/> provides comprehensive background on the UAS RID use-case and the UTM/AAM context.</t>
        <t>Trustworthiness revolves around identification and authentication. <xref target="RFC9374"/> defines the Drone Remote Identification Protocol (DRIP) Entity Tag (DET), a trustable identifier backed by asymmetic cryptography. <xref target="RFC9575"/> standardizes authentication of DETs and associated information using strong cryptography suited for constrained mobile wireless links (typical of Broadcast RID). Broadcast and Network RID are defined by ASTM <xref target="F3411"/> which designates the  International Civil Aviation Organization (ICAO) to maintain codepoints for Specific Session ID Types and Specific Authentication Methods (SAMs) <xref target="RID-NUMBER-REGISTRATION"/>. ICAO includes DETs as a Specific Session ID Type and lists the four DRIP SAMs.</t>
        <t><xref target="DET-REGISTRATION"/> defines a method for a registrant (typically a UAS Operator or UAS) to propose their inclusion into the identifier heirarchy. The registry system, made up of DRIP Identity Management Entities (DIMEs), ensures uniqueness within the heirarchy, endorses inclusion through X.509 certificates, and provides access to public and private information associated with a DET registration. Public information is served using the Domain Name System (DNS) and is specified in <xref target="DET-DNS"/>. Private information is served using the Registration Data Access Protocol (RDAP, TODO: ref) and protected through policy based differentiated access <xref target="DET-DIFF-ACCESS"/>.</t>
        <t>This document specifies the fundamental registration processes and interactions surrounding the Private Information Registry function defined in the DRIP Architecture (<xref target="RFC9434"/>).</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>This document assumes that participanting entities are in compliance with relevant existing UAS standards such as ASTM <xref target="F3411"/>, <xref target="F3548"/> and TODO-REF: ICAO-TFP.</t>
        <t>This document governs use of a DET in the following cases:</t>
        <ul spacing="normal">
          <li>
            <t>An entity that uses a Session ID (some participating entities, e.g. HDAs, may not need Session IDs), MUST use a DET for that Session ID.</t>
          </li>
          <li>
            <t>An entity that participates in DRIP protocol interactions (even if not needing a Session ID), MUST use a DET for the DRIP public key ID in those interactions.</t>
          </li>
          <li>
            <t>An entity that requires a strongly cryptographically verifiable IP compatible identifier, MAY use a DET for any other legal purpose.</t>
          </li>
          <li>
            <t>An entity SHOULD NOT use a DET as a locator in physical or logical space (e.g. as a globally routable IPv6 address outside of an overlay network), as deconflation is intended, see <xref target="RFC9063"/>.</t>
          </li>
        </ul>
        <t>The archetypal case is a UAS for which the DET serves as both the UAS ID (first case above) and the Authentication Key ID (second case).</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <section anchor="additional-definitions">
        <name>Additional Definitions</name>
        <t>This document makes use of terms (PII, USS, etc.) defined in <xref target="RFC9153"/>, <xref target="RFC9434"/> and <xref target="RFC9374"/>. For convenience of the reader, some of the major definitions are restated here.</t>
        <dl>
          <dt>DRIP Identity Management Entity (DIME):</dt>
          <dd>
            <t>Originally defined in <xref target="RFC9434"/> and expanded technically in <xref target="DET-DNS"/>. An entity providing registrar and registry services specifically for DETs.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="interactions-responsibilities">
      <name>Interactions &amp; Responsibilities</name>
      <t>This section outlines the various players in the ecosystem. For each, it outlines relevant motivations for using DRIP, as well as the interactions and responsibilities they have in doing so.</t>
      <section anchor="uas-observers">
        <name>UAS Observers</name>
        <t>An Observer has many motivations for detecting Broadcast RID. Regardless of their motivation the authenticity of the data presented is important for them to make decisions on their next actions. This is accomplished by the use of Authentication of the Broadcast RID, something DRIP provides. Observers also may need additional information, beyond what is sent over Broadcast RID. While the use of a Session ID provides a level of privacy, the use of DRIP allows this privacy while also enabling authorized queries for additional data.</t>
        <t>An Observer device is expected to be able to process Broadcast RID messages per <xref target="F3411"/> in accordance with CAA regulations (such as <xref target="F3586"/>) as follows:</t>
        <t>In order to satisfy CAA regulatory requirements as per corresponding Means of Compliance (e.g. <xref target="F3586"/> for the US) something something MUST comply with applicable portions of <xref target="F3411"/> and process as per <xref target="RFC9575"/> the following messages:</t>
        <ol spacing="normal" type="1"><li>
            <t>The UAS ID SHOULD be displayed either in the style of an IPv6 address per <xref target="RFC5952"/> or as described in <xref target="hid-abbrev"/> for the following ASTM <xref target="F3411"/> Message Types:
            </t>
            <ul spacing="normal">
              <li>
                <t>Basic ID Message (Message Type 0x0), UAS ID Type 0x4 (Specific Session ID), Specific Session ID Type 0x01 (DRIP Entity Tag).</t>
              </li>
            </ul>
          </li>
          <li>
            <t><xref section="A" sectionFormat="of" target="RFC9575"/> is RECOMMENDED for visualization of the trustworthiness assessment. Observer devices MUST follow the requirements of <xref section="6.4.2" sectionFormat="of" target="RFC9575"/> for the following ASTM <xref target="F3411"/> Message Types:
            </t>
            <ul spacing="normal">
              <li>
                <t>Authentication Messages (Message Type 0x2), Authentication Type 0x5 (Specific Authentication Method (SAM)), SAM Types 0x01 (DRIP Link), 0x02 (DRIP Wrapper), 0x03 (DRIP Manifest) and optionally 0x04 (DRIP Frame).</t>
              </li>
            </ul>
          </li>
        </ol>
      </section>
      <section anchor="registrants">
        <name>Registrants</name>
        <t>Typically UAS Operators.</t>
        <t>UAS Operators may want to protect the privacy of their details (such as Operator Location) and their reputation. Reputation can be gained or lost with observation and reports of behavior backed by Authentication. They MAY decide for which identification purposes they will use DETs. This choice may be constrained by the jurisdiction's RID regulations.</t>
        <ul empty="true">
          <li>
            <t>Author: move to Definitions: whether to use DRIP for an Authentication Key ID only, Single Use Session ID only, or both. The last of these is the natural approach providing the greatest benefits and thus the primary focus of this document.</t>
          </li>
        </ul>
      </section>
      <section anchor="uas-manufacturers">
        <name>UAS Manufacturers</name>
        <t>Manufacturers typically wish to maintain good reputation of their brands and are often driven by market forces. Such forces include requirements and preferences of both UAS Observers and Operators.</t>
        <t>To satisfy CAA requirements, a UA MUST transmit whatever <xref target="F3411"/> messages are needed to carry at least the minimal elements of information required by the regulator. In the US, under the current FAA RID rule, these are Basic ID, Location/Vector, and System as specified in <xref target="F3586"/>. If the content of these messages is to be trusted, the UA MUST also sign those messages, using the DRIP Wrapper and/or DRIP Manifest methods, as described in <xref target="RFC9575"/>.</t>
        <ul empty="true">
          <li>
            <t>Author: add reference to US RID rule</t>
          </li>
        </ul>
        <t>The UAS MUST provide mechanisms and interfaces to enable DET support for UAS Operator selected purposes. For DRIP this requires at minimum the UAS Operator to be able to select DRIP options and start the process of generating and registering a DET with a selected HDA.</t>
      </section>
      <section anchor="hda-operators">
        <name>HDA Operators</name>
        <t>A registry function including Hierarchical Host Identity Tag (HHIT) Domain Authority (HDA) is required to support Session IDs that can be used by CAAs and other lawfully authorized parties to look up essential safety and security information associated with UAS and their Operators.</t>
        <t>In the UTM context, it is expected that the HDA function will be provided by each UAS Service Supplier (USS). This can be in-house or out-sourced to a service bureau more specialized in cryptographically verifiable identifiers usable to access data and systems on networks. Outside the UTM context, each Operator must still obtain this function from some provider.</t>
        <t>The HDA function also can support other services related to Session IDs. The DRIP Entity Tag (DET) can act as a Session ID and/or Authentication Key ID, thus HDA functionality in this document assumes both are being provided to registrants (see <xref target="det-ptc"/> for more details). The use of Authentication is mandated in some (e.g. Japan) but not all regions.</t>
        <t>Each DET is tied to a longer term identifier by its HDA. Typically this identifier is expected to be the UAS Serial Number, however a CAA MAY choose another long term identifier of significance to them. The binding between these two identifiers is typically considered private.</t>
        <t>An HDA Operator must fullfil the requirements of their jurisdiction. They must also satisfy the desires of UAS Operators.</t>
        <t>The HDA MUST provide, upon successful registration of a DET, the four Broadcast Endorsement objects for use in <xref target="RFC9575"/> as defined by <xref target="DKI"/>. These are:</t>
        <ul spacing="normal">
          <li>
            <t>Broadcast Endorsement: RAA:A on RAA:A</t>
          </li>
          <li>
            <t>Broadcast Endorsement: RAA:A on HDA:A</t>
          </li>
          <li>
            <t>Broadcast Endorsement: HDA:A on HDA:I</t>
          </li>
          <li>
            <t>Broadcast Endorsement: HDA:I on Registrant</t>
          </li>
        </ul>
        <t>The HDA must also place certain essential information into the Internet Domain Name System (DNS) and maintain that information as operations are activated, completed, etc. All the information to be placed into the DNS is public as it is either needed to make the DET based systems work or because it is a high-availability replica of information transmitted in clear-text via Broadcast RID. The DNS records also MUST point to the private registry in which additional information, required by the HDA/USS itself or the CAA, must be placed and maintained, for query by authorized parties only.</t>
      </section>
      <section anchor="raa-operators">
        <name>RAA Operators</name>
        <t>RAAs in this document are scoped to be operated by a State. Each State is allocated four RAAs, and may decide on their usage.</t>
        <t>Each RAA MUST register HDAs within its scope. Each RAA MUST provide both widely supported "long form" X.509 certificates and DRIP-specific "short form" endorsements of its HDAs.</t>
        <t>The RAA MAY provide services to HDAs for verification of data pertaining to UAS Operators. For example an HDA registering a UAS Session ID may query the RAA to verify a previously RAA-registered UAS Serial Number.</t>
        <t>The RAA Operator MUST obtain valid DNS delegation. See <xref target="ic"/> for more details.</t>
      </section>
    </section>
    <section anchor="requirements-for-dime-operation">
      <name>Requirements for DIME Operation</name>
      <t>The requirements below apply to both RAA and HDA Operators with a focus on how HDA Operators provide registration and related services for their clients (i.e. UAS Operators and their UAS).</t>
      <section anchor="query">
        <name>Query</name>
        <t>A DIME has two query interfaces it MUST support. One interface is used for public information query and another (identified and using data found via public queries) is for private information.</t>
        <section anchor="pub-info-reg">
          <name>Public Information Registries</name>
          <t>The information found in these registries has been designated as (explicitly or implicitly) public by cognizant authority and/or the information owner. Such information includes public cryptographic keys needed for authentication in <xref target="RFC9575"/>, static Broadcast RID data and trustworthy pointers to additional information.</t>
          <t>These registries are Authoritative Name Servers of DNS. See <xref target="DET-DNS"/> for operational requirements, query mechanism and response models.</t>
        </section>
        <section anchor="priv-info-reg">
          <name>Private Information Registries</name>
          <t>The information found in these registries is considered Personally Identifiable Information (PII) and/or is stored for potential future audit of registration.</t>
          <t>Private information queries MUST follow <xref target="DET-DIFF-ACCESS"/>. This specifies the use of Registration Data Access Protocol (RDAP) data models and query formats as the primary query mechanisms. The specific access control policies are to be defined by the CAA. A CAA MAY require additional query mechanisms for their jurisdiction.</t>
          <t>The eXtensible Access Control Markup Language (XACML) MUST be used. The policies to be enforced by XACML MUST be provided by the CAA and are out of scope for this document.</t>
        </section>
      </section>
      <section anchor="registration">
        <name>Registration</name>
        <t>There are several registration functions essential to achieving the purposes to which this document is directed. Likewise there are several viable technical approaches to performing these functions. The only approaches fully specified in <xref target="DET-REGISTRATION"/> are the Constrained Application Protocol (CoAP) <xref target="RFC7252"/> and/or Concise Binary Object Representation (CBOR) Web Tokens (CWT) <xref target="RFC8392"/>.</t>
        <t>DRIP does NOT provide protection against incorrect (e.g. fraudulent) data entered during registration or asserted subsequently. DRIP does protect against alteration (intentional or unintentional) of data subsequent to its assertion by the cryptographic signer. The signer might be the proximate sender (e.g. UA transmitting Broadcast RID) or might be an attestor far away and long ago (e.g. root Certificate Authority). It is the duty of the operator of each DIME, or the party on whose behalf the DIME is being operated, to validate the registration data. The RAA (e.g. CAA) SHOULD provide services to obtain this goal. The APIs and access controls for such services are a matter of national policy and are out of scope for this document.</t>
      </section>
    </section>
    <section anchor="compliance-testing">
      <name>Compliance Testing</name>
      <t>It is the responsability of each node in the tree that a child node passes functional interop testing prior to issuing a certificate for the child node.</t>
      <ul empty="true">
        <li>
          <t>Author: This section is a work in progress.</t>
        </li>
      </ul>
      <t>All interfaces MUST be tested on valid and invalid data (such as being malformed). When policy is required on an interface all defined permutations of the policy MUST be tested. The policy engine MUST be evoked to validate proper decisions and actions are being made. All data returned from an interface MUST be tested to check that it conforms with specifications.</t>
      <t>There is a range in the RAA space allocated for experimentation and testing purposes. These can be delegated to parties, for a limited period of time at the behest of the RAA Designated Expert, to test DIME interoperability (e.g. HDA to RAA interactions) in any of the below subsections. The IANA Considerations section of <xref target="DET-DNS"/> contains more information on how these delegations are to be handled.</t>
      <t><xref target="compliance-form"/> provides a set of forms to be filled out and submitted as part of a CAA compliance process for using DRIP.</t>
      <figure>
        <name>System Interface Test Diagram</name>
        <artwork><![CDATA[
+-----+           +-----+
|     |           |     |
|     o----(1)--->o     |
|  A  |           |  B  |
|     o<---(2)----o     |
|     |           |     |
+-----+           +-----+
]]></artwork>
      </figure>
      <section anchor="registration-interface">
        <name>Registration Interface</name>
        <t>A, B pairs: (registrant, HDA), (HDA, RAA)</t>
        <t>1: Ensure that CoAP endpoints on B can be accessed according to B's policy by A. Ensure that the endpoints conform to the normative requirements of <xref target="DET-REGISTRATION"/> Test that B interface properly handles valid and malformed data. Test that B securely generates proper artifacts and stores them.</t>
        <t>2: Ensure that the CoAP interactions for (1) properly returns data to A from B. This data MUST include the Broadcast Endorsements, X.509s and any other data elements required.</t>
      </section>
      <section anchor="public-query-interface">
        <name>Public Query Interface</name>
        <t>A, B pairs: (UAS Observer, HDA), (UAS Observer, RAA), (HDA, RAA), (RAA, HDA), (HDA, HDA'), (RAA, RAA')</t>
        <t>1: Ensure that B has a properly configured and publicly accessible Authoritative Name Server for its delegated <tt>ip6.arpa</tt> domain.</t>
        <t>2: Ensure that B returns the valid RRTypes defined in <xref target="DET-DNS"/> to A based on an <tt>ip6.arpa</tt> query via standard DNS methods (i.e. using UDP on port 53). Ensure that the HHIT RRType contains the correct Certificate with an URI.</t>
      </section>
      <section anchor="private-query-interface">
        <name>Private Query Interface</name>
        <t>A, B pairs: (UAS Observer, HDA), (UAS Observer, RAA), (HDA, RAA), (RAA, HDA), (HDA, HDA'), (RAA, RAA')</t>
        <t>1: Ensure that the provide URI from the public query interface points to a valid URI. Ensure that the endpoint on B has proper AAA mechanisms as defined in this document and enforces the proper policy options.</t>
        <t>2: Ensure that the B endpoint securely returns the data expected according to policy (matrix of authorized, valid request, unauthorized and invalid request) to A.</t>
      </section>
    </section>
    <section anchor="ic">
      <name>IANA Considerations</name>
      <t>This document requires no new or modified actions by IANA. It does depend on actions IANA has already undertaken to perform in support of DRIP <xref target="DET-DNS"/>. It also informs other parties of interactions they must have with IANA to achieve the intended purposes of this document; e.g. Nation states MUST request IANA delegation of the DNS zone under <tt>ip6.arpa.</tt> corresponding to their allocated RAA values.</t>
    </section>
    <section anchor="sc">
      <name>Security Considerations</name>
      <t>The considerations discussed in <xref target="RFC9153"/>, <xref target="RFC9434"/>, <xref target="RFC9374"/>, <xref target="RFC9575"/> and <xref target="DET-DNS"/> apply.</t>
      <t>DIMEs use and provide various methods to protect data as described below under seven categories: Attestation, Authentication, Authorization, Access Control, Attribution, Accounting and Audit. DRIP refers to these categories collectively as AAA. All data, handled under DRIP, MUST be protected by AAA. All private data MUST also be protected by strong encryption where permitted by law. These requirements apply to data at rest and in transit in all phases of the process, i.e. registration and query.</t>
      <t>Attestation may be mandated by CAAs for devices (such as UA). Remote ATtestation ProcedureS (RATS) <xref target="RFC9334"/> is recommended for DRIP. The specific attestation mechanisms in a given jurisdiction are out of scope for this document.</t>
    </section>
    <section anchor="ptc">
      <name>Privacy &amp; Transparency Considerations</name>
      <t>The considerations discussed in <xref target="RFC9153"/> apply.</t>
      <section anchor="det-ptc">
        <name>DETs as Session ID and Authentication Key ID</name>
        <t>The properties of a DET allow it to be used as a Session ID and/or an Authentication Key ID. There may be scenarios in which Session IDs are desired for privacy but Authentication is not; although this may reduce transparency and security, a DET MAY be used exclusively as a Session ID in such. There are scenarios in which Authentication is desired but Session IDs are not (e.g. where a CAA does not allow Session IDs); a DET MAY be used exclusively as an Authentication Key ID in such. In the scenario expected to be most common, both Session IDs and Authentication are desired; the same DET SHOULD be used as both the Session ID and Authentication Key ID in such. Consequences and operational impact of using different DETs for the Session ID and Authentication Key ID are unknown and not covered in this document.</t>
      </section>
      <section anchor="selective-encryption">
        <name>Selective Encryption</name>
        <t>Selective encryption may be allowed in some circumstances. An HHIT may be used in a private lookup to access decryption key material or obtain decryption as a service.</t>
        <t>Selective encryption of UAS RID using DRIP is only allowed when the DET to be used as the Session ID is issued by an HDA associated with a USS and that DET is associated with the corresponding Operational Intent in UTM. This enables the encryption of selected data elements in Broadcast RID to provide a layer of privacy for operators (e.g. their position) without compromising transparency to entities (e.g. public safety / law enforcement personnel) that need to know.</t>
        <t>Selective encryption typically requires network connectivity of the Observer to perform the private query to obtain the decryption service or key material. CAAs should consider the expected Observer environment and prohibit encryption wherever and whenever Observers cannot reasonably be expected to have connectivity. For example selective encryption, per CAA regulations, MAY be allowed in dense wireless IP connectivity areas (e.g. urban) but prohibited in poor wirelessly covered areas (e.g. rural).</t>
        <t>The issue of Observer network connectivity MAY be mitigated with the use of a shared decryption key used by multiple Session IDs under a given USS/HDA over a period of time, that is preloaded onto the Observer device before connectivity is lost. For example Observers MAY query USS/HDAs for flight volumes in which they are interested to preload their decryption key(s) for the Operational Intents/Session IDs that day.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="DET-DNS">
          <front>
            <title>DRIP Entity Tags in the Domain Name System</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Jim Reid" initials="J." surname="Reid">
              <organization>RTFM llp</organization>
            </author>
            <date day="27" month="June" year="2025"/>
            <abstract>
              <t>   This document defines the Domain Name System (DNS) functionality of a
   Drone Remote Identification Protocol (DRIP) Identity Management
   Entity (DIME).  It is built around DRIP Entity Tags (DETs) to
   standardize a hierarchical registry structure and associated
   processes to facilitate trustable and scalable registration and
   lookup of information related to Unmanned Aircraft Systems (UAS).
   The registry system supports issuance, discovery, and verification of
   DETs, enabling secure identification and association of UAS and their
   operators.  It also defines the interactions between different
   classes of registries (root, organizational, and individual) and
   their respective roles in maintaining the integrity of the
   registration data.  This architecture enables decentralized,
   federated operation while supporting privacy, traceability, and
   regulatory compliance requirements in the context of UAS Remote ID
   and other services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-31"/>
        </reference>
        <reference anchor="DET-REGISTRATION">
          <front>
            <title>DRIP Entity Tag (DET) Registration using CoAP &amp; CWTs</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="27" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies a registration interaction model and
   interfaces for DRIP Entity Tags to a DRIP Identity Management Entity
   using the Constrained Application Protocol and CBOR Web Tokens.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-det-registration-coap-cwt-00"/>
        </reference>
        <reference anchor="DET-DIFF-ACCESS">
          <front>
            <title>DRIP Entity Tag (DET) Differentiated Access using RDAP</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="27" month="September" year="2024"/>
            <abstract>
              <t>   This document defines an RDAP profile and extension data model for
   UAS registration.  It also gives recommendations for AAA mechanisms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-det-diff-access-rdap-00"/>
        </reference>
        <reference anchor="DKI">
          <front>
            <title>The DRIP DET public Key Infrastructure</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="22" month="April" year="2025"/>
            <abstract>
              <t>   The DRIP Entity Tag (DET) public Key Infrastructure (DKI) is a
   specific variant of classic Public Key Infrastructures (PKI) where
   the organization is around the DET, in place of X.520 Distinguished
   Names.  Further, the DKI uses DRIP Endorsements in place of X.509
   certificates for establishing trust within the DKI.

   There are two X.509 profiles for shadow PKI behind the DKI, with many
   of their X.509 fields mirroring content in the DRIP Endorsements.
   These PKIs can at times be used where X.509 is expected and non-
   constrained communication links are available that can handle their
   larger size.  It is recommended that a DRIP deployment implement both
   of these along side the Endorsement trees.

   C509 (CBOR) encoding of all X.509 certificates are also provided as
   an alternative for where there are gains in reduced object size.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-dki-08"/>
        </reference>
        <reference anchor="RFC9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC9575">
          <front>
            <title>DRIP Entity Tag (DET) Authentication Formats and Protocols for Broadcast Remote Identification (RID)</title>
            <author fullname="A. Wiethuechter" initials="A." role="editor" surname="Wiethuechter"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>The Drone Remote Identification Protocol (DRIP), plus trust policies and periodic access to registries, augments Unmanned Aircraft System (UAS) Remote Identification (RID), enabling local real-time assessment of trustworthiness of received RID messages and observed UAS, even by Observers lacking Internet access. This document defines DRIP message types and formats to be sent in Broadcast RID Authentication Messages to verify that attached and recently detached messages were signed by the registered owner of the DRIP Entity Tag (DET) claimed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9575"/>
          <seriesInfo name="DOI" value="10.17487/RFC9575"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC9063">
          <front>
            <title>Host Identity Protocol Architecture</title>
            <author fullname="R. Moskowitz" initials="R." role="editor" surname="Moskowitz"/>
            <author fullname="M. Komu" initials="M." surname="Komu"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This memo describes the Host Identity (HI) namespace, which provides a cryptographic namespace to applications, and the associated protocol layer, the Host Identity Protocol, located between the internetworking and transport layers, that supports end-host mobility, multihoming, and NAT traversal. Herein are presented the basics of the current namespaces, their strengths and weaknesses, and how a HI namespace will add completeness to them. The roles of the HI namespace in the protocols are defined.</t>
              <t>This document obsoletes RFC 4423 and addresses the concerns raised by the IESG, particularly that of crypto agility. The Security Considerations section also describes measures against flooding attacks, usage of identities in access control lists, weaker types of identifiers, and trust on first use. This document incorporates lessons learned from the implementations of RFC 7401 and goes further to explain how HIP works as a secure signaling channel.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9063"/>
          <seriesInfo name="DOI" value="10.17487/RFC9063"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="F3411" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3411-22A"/>
          <seriesInfo name="DOI" value="10.1520/F3411-22A"/>
        </reference>
        <reference anchor="F3548" target="https://www.astm.org/f3548-21.html">
          <front>
            <title>Standard Specification for UAS Traffic Management (UTM) UAS Service Supplier (USS) Interoperability</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3548-21"/>
        </reference>
        <reference anchor="F3586" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Practice for Remote ID Means of Compliance to Federal Aviation Administration Regulation 14 CFR Part 89</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3586-22"/>
          <seriesInfo name="DOI" value="10.1520/F3586-22"/>
        </reference>
        <reference anchor="RID-NUMBER-REGISTRATION" target="https://www.icao.int/airnavigation/IATF/Pages/ASTM-Remote-ID.aspx">
          <front>
            <title>ICAO Remote ID Number Registry</title>
            <author>
              <organization>International Civil Aviation Organization</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 315?>

<section anchor="hid-abbrev">
      <name>HID Abbreviation</name>
      <t>The DET MAY be abbreviated. This is useful for display application with limited screen real-estate as the display of the entire 128-bit (32-character in hexadecimal) IPv6 address can be costly. Abbreviations SHOULD follow the following format rules.</t>
      <dl>
        <dt>Hierarchy Level:</dt>
        <dd>
          <t>Each hierarchy level (RAA/HDA) is represented by a maximum of four alphanumeric characters. This abbreviation SHOULD NOT be a single character in length, for obvious reasons of not being very useful. The decimal representation does fit into the 4 character restriction but is NOT RECOMMENDED. The RECOMMENDED abbreviation for the RAA level is to use the ISO3166-1 Alpha 2 code for nations. This abbreviation MAY be found in DNS under a HHIT RRType of the entity or its parents. If there is no abbreviation hint display devices SHOULD use a fixed size four character hexadecimal representation of the value. It is RECOMMENDED that display applications specify a default RAA value, and only display the RAA abbreviation explicitly when it does not match the default.</t>
        </dd>
        <dt>Entity Hash:</dt>
        <dd>
          <t>The entity is represented by a fixed size four character hexadecimal string using the last four characters of the DET. If a collision (within the same HID space) on display occurs, the four characters SHOULD shift to the left by one hexadecimal character until the collision is resolved. This window MUST stay within the last sixteen hexadecimal characters of the DET. The <tt>:</tt> character found in an IPv6 address string is ignored.</t>
        </dd>
        <dt>Delimiter:</dt>
        <dd>
          <t>Each section is delimited by a single character. This can be any whitespace character (except newline and tab) or any non-alphanumeric character (period, comma, semicolon, etc.). It is RECOMMENDED that the delimiter is consistent between components. The RECOMMENDED delimiter is the space character.</t>
        </dd>
      </dl>
      <t>For example a DET with the values of RAA 16383 and HDA 1 without any abbreviation hint from DNS is represented by the string <tt>3FFF 0001 xxxx</tt> with <tt>xxxx</tt> representing a entity hash. If an abbreviation for the RAA (such as <tt>DRIP01</tt>) and HDA (such as <tt>TEST</tt>) are found in DNS then the DET can be represented with the string of <tt>DRIP01 TEST xxxx</tt>.</t>
      <t>For an example of the entity hash, let's assume there are two DETs with the following hashes in the same HID: <tt>0000:1111:2222:3333</tt> and <tt>0000:2222:1111:3333</tt>. At first both DETs are represented with the same abbreviation: <tt>RAA HDA 3333</tt>. One of these DETs is selected by the display application to shift the display hash one character to avoid the collision resulting in the following two abbreviations: <tt>RAA HDA 3333</tt> and <tt>RAA HDA 1333</tt>.</t>
    </section>
    <section anchor="compliance-form">
      <name>Compliance Submission Forms</name>
      <t>TODO</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
