<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wiethuechter-drip-det-tada-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="det-tada">Registration &amp; Usage of DRIP Entity Tags for Trustworthy Air Domain Awareness</title>
    <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-det-tada-00"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="28"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 125?>

<t>This document standardizes usage of Drone Remote Identification Protocol (DRIP) Entity Tags (DETs) as identifiers to enable trustworthy Air Domain Awareness (ADA) for Unmanned Aircraft Systems (UAS) in Remote Identification (RID), UAS Traffic Management (UTM) and Advanced Air Mobility (AAM). DETs can serve as Session IDs for privacy, Authentication Key IDs for accountability, and encryption key IDs for confidentiality.</t>
    </abstract>
  </front>
  <middle>
    <?line 129?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="purpose">
        <name>Purpose</name>
        <t>This document provides to stakeholders in a National Airspace System (NAS), such as a Civil Aviation Authority (CAA) and its constituents, a point of entry into a set of relevant standards. These standards provide guidance to enable trustworthy Air Domain Awareness (ADA) primarily via cooperative technologies. Such technologies can include, but are not limited to, Unmanned Aircraft (UA) Systems (UAS) Remote Identification (RID), UAS Traffic Management (UTM) and Advanced Air Mobility (AAM).</t>
        <t>This document specifies an interoperable manner of achieving the stated objectives in an international context to be used by CAAs in a relevant Means of Compliance (MOC). One such MOC is ASTM <xref target="F3586"/> for UAS RID to comply with the United States (US) CAA regulations.</t>
        <t>A CAA MAY override any technical specification in this document but MUST, if claiming compliance with this document, provide the reason and an alternative specification satisfying the same objective.</t>
      </section>
      <section anchor="background">
        <name>Background</name>
        <t><xref target="RFC9153"/> provides comprehensive background on the UAS RID use-case and the UTM/AAM context.</t>
        <t>Trustworthiness revolves around identification and authentication. <xref target="RFC9374"/> defines the Drone Remote Identification Protocol (DRIP) Entity Tag (DET), a trustable identifier backed by asymmetric cryptography. <xref target="RFC9575"/> standardizes authentication of DETs and associated information using strong cryptography suited for constrained mobile wireless links (typical of Broadcast RID). Broadcast and Network RID are defined by ASTM <xref target="F3411"/> which designates the  International Civil Aviation Organization (ICAO) to maintain code-points for Specific Session ID Types and Specific Authentication Methods (SAMs) <xref target="ICAO-NUMBERS"/>. ICAO includes DETs as a Specific Session ID Type and lists the four DRIP SAMs.</t>
        <t>DETs generated by registrants (typically a UAS Operator or UAS) are merely proposed until they are registered within the hierarchy consisting of at least two levels above the leaf DET: Registered Assigning Authority (RAA) and Hierarchial Host Identity Tag (HHIT) Domain Authority (HDA). The registry system, made up of DRIP Identity Management Entities (DIMEs) acting as either RAAs or HDAs, ensures uniqueness within the hierarchy, endorses inclusion through X.509 certificates, and provides access to public and private information associated with a DET registration. Public information is served using the Domain Name System (DNS) and is specified in <xref target="DET-DNS"/>. Private information, such as Personally Identifiable Information (PII), is served using the Registration Data Access Protocol (RDAP, <xref target="STD95"/>) and protected through policy based differentiated access.</t>
        <t>This document specifies fundamental registration processes and interactions surrounding the Private Information Registry function defined in the DRIP Architecture (<xref target="RFC9434"/>).</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>Participating entities are assumed in this document to be in compliance with relevant existing UAS standards such as ASTM <xref target="F3411"/>, <xref target="F3548"/> and <xref target="ICAO-ACCP"/>.</t>
        <t>This document governs use of a DET in the following cases:</t>
        <ul spacing="normal">
          <li>
            <t>An entity that uses a Session ID (some participating entities, e.g. HDAs, may not need Session IDs), MUST use a DET for that Session ID.</t>
          </li>
          <li>
            <t>An entity that participates in DRIP interactions (even if not needing a Session ID), MUST use a DET for the DRIP public key ID in those interactions.</t>
          </li>
          <li>
            <t>An entity that requires a strongly cryptographically verifiable IP compatible identifier, MAY use a DET for any other legal purpose.</t>
          </li>
          <li>
            <t>An entity SHOULD NOT use a DET as a locator in physical or logical space (e.g. as a globally routable IPv6 address outside of an overlay network), as deconflation is intended, see <xref target="RFC9063"/>.</t>
          </li>
        </ul>
        <t>The archetypal case is a UAS for which the DET serves as both the UAS ID (first case above) and the Authentication Key ID (second case).</t>
        <ul empty="true">
          <li>
            <t>Author Note: narrow context for at least first bullet above.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <section anchor="additional-definitions">
        <name>Additional Definitions</name>
        <t>This document makes use of terms (PII, USS, etc.) defined in <xref target="RFC9153"/>, <xref target="RFC9434"/> and <xref target="RFC9374"/>. For convenience of the reader, some of the major definitions are restated here.</t>
        <dl>
          <dt>DRIP Identity Management Entity (DIME):</dt>
          <dd>
            <t>Originally defined in <xref target="RFC9434"/> and expanded technically in <xref target="DET-DNS"/>. An entity providing registrar and registry services specifically for DETs. They can act as either an Registered Assigning Authority (RAA) or Hierarchial Host Identity Tag (HHIT) Domain Authority (HDA).</t>
          </dd>
          <dt>Web Token:</dt>
          <dd>
            <t>In the context of this specification; a Web Token can be either a Concise Binary Object Representation (CBOR, <xref target="STD94"/>) Web Token (CWT, <xref target="RFC8392"/>) or JavaScript Object Notation (JSON, <xref target="STD90"/>) Web Token (JWT, <xref target="RFC7519"/>).</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="interactions-responsibilities">
      <name>Interactions &amp; Responsibilities</name>
      <t>This section outlines the various entity roles in the ecosystem. For each, it summarizes motivations for participating in that DRIP role, as well as the interactions and responsibilities they have in doing so. All entity roles, except as otherwise noted, each entity in a given role MUST register a DET with a parent entity in the corresponding parental role (e.g. an HDA must register with an RAA), as per <xref target="registration"/>, and MUST use it subsequently in all DRIP interactions requiring an entity ID.</t>
      <section anchor="uas-observers">
        <name>UAS Observers</name>
        <t>An Observer is typically an individual who has a device capable of wirelessly receiving Broadcast RID whether it be an opportunistic passerby with a local-only (i.e. non-Internet connected) smartphone application or a widely deployed sensing system with various IP-based back-hauls. Each has their own motivations for detecting a UAS in their area and querying for additional information. Typically in DRIP, Observers are expected to use DNS (when able) to obtain at least the public keys of unknown DETs and use it to validate signatures found in ASTM <xref target="F3411"/> Authentication Messages. Some Observers may be granted, by cognizant authorities, authorization to perform more detailed queries of further information, that is considered private (as not explicitly classified as public, placed in DNS, and/or transmitted in cleartext in Broadcast RID).</t>
        <ul empty="true">
          <li>
            <t>Author Note:  Broadcast RID here can be dropped or substituted for some phrase comparing Observers to a sensor head, but distinct from a Display-only Observer. If that makes sense and if it is a good distinction to have? One could say Display Applications are in a way Observers (albeit very far removed from the field in most cases where the term is used). Unless we make them their own class of users that could use DETs (and for what?)</t>
          </li>
        </ul>
        <t>All Observers supporting DRIP:</t>
        <ul spacing="normal">
          <li>
            <t>MUST adhere to relevant details of <xref section="6.4.2" sectionFormat="of" target="RFC9575"/> with regards to receive processing of DRIP SAMs.
            </t>
            <ul spacing="normal">
              <li>
                <t>Processing of SAMs MAY be deferred or outsourced to a dedicated system.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>RECOMMEND display all DETs following <xref target="RFC5952"/> or as described in <xref target="hid-abbrev"/>.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Author Note: as justification for "processing MAY be deferred": Intention here was to allow for Observers not needing to fully process data if desired and push said processing to SDSPs. An example is a slim Finder concept that does no parsing of RID data, just extraction out of transport framing.</t>
          </li>
        </ul>
        <t>Observers authorized by cognizant authorities to access any private (in addition to all public) information recorded as part of the registration process also:</t>
        <ul spacing="normal">
          <li>
            <t>MUST support RDAP authentication/authorization mechanisms allowed by the cognizant authority.
            </t>
            <ul spacing="normal">
              <li>
                <t>Those RECOMMENDED for global harmonization are identified in <xref target="diff-access"/>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>MUST register to authentication systems as required by the cognizant authority.
            </t>
            <ul spacing="normal">
              <li>
                <t>A DIME MAY be used as part of an authentication system.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="uas-operators">
        <name>UAS Operators</name>
        <t>UAS Operators is used herein as a catch-all term for several more specific UAS related roles: Remote Pilot, Pilot In Command (PIC), party (typically an organization) to whom or which the UAS is registered with the cognizant CAA, etc. DRIP does not attempt to clarify the definition of Operator to match any specific CAA, instead using the ambiguity to group these roles based on their similar DRIP interactions.</t>
        <t>A UAS Operator's desire to use DETs can be any number of the following operational factors:</t>
        <ul spacing="normal">
          <li>
            <t>Confidentiality of flights through Session IDs.</t>
          </li>
          <li>
            <t>Privacy of Remote Pilots by encrypting their Ground Control Station (GCS) position.
            </t>
            <ul spacing="normal">
              <li>
                <t>This option may be constrained by their jurisdiction's RID regulations.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Reputation of their UAS based on observation and reports of behavior supported by Authentication.</t>
          </li>
        </ul>
        <t>To participate a UAS Operator SHOULD use a DET, registered either with an RAA or HDA, as part of any interactions in DRIP, such as registering a UAS Session ID for their UA. A UAS Operator MAY use another cryptographic scheme for interactions but it MUST be asymmetric with their public key accessible to all domain participants via a standardized method for the cryptographic purpose of signature verification.</t>
      </section>
      <section anchor="uas-manufacturers">
        <name>UAS Manufacturers</name>
        <t>While UAS Manufactures do not have a direct requirement for DRIP, they typically wish to maintain good reputation of their brands and are often driven by market forces. Such forces include requirements and preferences of both UAS Observers and Operators.</t>
        <t>This document assumes a UAS Manufacturer is already in compliance with ASTM <xref target="F3411"/>. Thus those that wish to support DRIP also:</t>
        <ul spacing="normal">
          <li>
            <t>MUST provide a mechanism, typically through a GCS, to generate and register a DET for use as either a Session ID, Authentication Key ID or both.
            </t>
            <ul spacing="normal">
              <li>
                <t>MUST bind DET to both UAS Serial Number and Operator. Binding MAY be indirect if system can verify Serial Number already registered to Operator.</t>
              </li>
              <li>
                <t>SHOULD be issued in a manner that keeps private key ONLY ever on UA, does not expose it to GCS etc., but MAY be done in manner that exposes it to GCS or Operator if necessary.</t>
              </li>
              <li>
                <t>SHOULD allow user selection of a parent DIME (typically HDA) using a URI, Hierarchy ID (HID) value, or both</t>
              </li>
              <li>
                <t>MAY support registering multiple DETs in a batch transaction</t>
              </li>
            </ul>
          </li>
          <li>
            <t>SHOULD provide a mechanism to enable, during registration, subsequent encryption of selected fields (e.g. pilot/GCS location), only if the CAA allows it.</t>
          </li>
          <li>
            <t>MUST follow <xref section="6" sectionFormat="of" target="RFC9575"/> as it relates to transmission of SAMs, when using DET as an Authentication Key ID</t>
          </li>
          <li>
            <t>MUST, in the <xref target="F3411"/> Basic ID Message, set the UAS ID Type to 4, Specific Session ID Type to 1, and DET in network byte order, when using DET as a UAS Session ID</t>
          </li>
          <li>
            <t>MAY use a DET, following <xref section="4.2" sectionFormat="of" target="RFC9374"/>, as a UAS Serial Number
            </t>
            <ul spacing="normal">
              <li>
                <t>It is expected that the UAS Manufacturer runs their own HDA, under which these DETs are registered</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="hda-operators">
        <name>HDA Operators</name>
        <t>In the UTM context, it is expected that the HDA function will be provided by a UAS Service Supplier (USS) to its clients (e.g. UAS Operators). This can be in-house or out-sourced to a service bureau more specialized in cryptographically verifiable identifiers usable to access data and systems on networks. Outside the UTM context, an HDA can be a stand-alone provider to any registrant desiring a DET, or more generally HHIT.</t>
        <t>Being associated with a USS has some operational benefits:</t>
        <ul spacing="normal">
          <li>
            <t>Ease for UAS Operators to use both Session IDs and UTM together</t>
          </li>
          <li>
            <t>Binding between the DET and Operational Intent
            </t>
            <ul spacing="normal">
              <li>
                <t>Enables safer use of encryption</t>
              </li>
              <li>
                <t>Ability to keep DET private until just before an operation goes active</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>An HDA Operator:</t>
        <ul spacing="normal">
          <li>
            <t>MUST register, with its parent RAA, one or more DETs, and use it or them in DRIP interactions</t>
          </li>
          <li>
            <t>MUST implement interfaces and functions described in <xref target="dime-operation"/></t>
          </li>
          <li>
            <t>MUST maintain DET registrations with relevant PII as required by their jurisdiction</t>
          </li>
          <li>
            <t>MUST fulfill the requirements of their jurisdiction</t>
          </li>
          <li>
            <t>SHOULD NOT provide to clients the ability to enable encryption of data elements considered PII, especially in Broadcast RID</t>
          </li>
        </ul>
        <t>As part of a USS an HDA Operator also:</t>
        <ul spacing="normal">
          <li>
            <t>MAY provide encryption ID services, if allowed by jurisdiction</t>
          </li>
          <li>
            <t>MAY have its registration interfaces (<xref target="registration"/>) be integrated into relevant USS interfaces and functions</t>
          </li>
          <li>
            <t>SHOULD defer the publishing of a client DET in DNS when it is bound with an Operational Intent until it is "active"
            </t>
            <ul spacing="normal">
              <li>
                <t>Methods to sync an Operational Intent in a USS state and DET state in HDA are out of scope for this document</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="raa-operators">
        <name>RAA Operators</name>
        <t>In the context of this document, RAA Operators are typically CAAs or other cognizant authorities of a Nation State. Each Nation State is allocated four RAA values that are used at their discretion. To obtain these allocations, a Nation State contacts the Apex operator for the UAS or other applicable hierarchy, currently IANA on behalf of ICAO, requesting their provisioning providing any details required by the Apex Operator to configure domain delegations.</t>
        <t>Each RAA has the responsibility to delegate HDAs under them. Allocation methods of HDA values are at the discretion of the RAA Operator and their policies. Any requirements to operate under an RAA, beyond those as defined in this document to operate as an HDA, are out of scope for this document.</t>
        <t>An RAA Operator:</t>
        <ul spacing="normal">
          <li>
            <t>MUST obtain an RAA value(s) from the Apex Operator and provide content for NS RRType(s), see <xref target="ic"/></t>
          </li>
          <li>
            <t>MUST register, with its parent (if any), one or more DETs, and use it or them in DRIP interactions</t>
          </li>
          <li>
            <t>MUST implement interfaces and functions described in <xref target="dime-operation"/></t>
          </li>
          <li>
            <t>MUST maintain DET registrations with relevant PII as required by their jurisdiction</t>
          </li>
          <li>
            <t>MUST provide requirements for prospective HDA Operators, and SHOULD do so publicly via an easily located web site</t>
          </li>
          <li>
            <t>MUST ensure HDA Operator compliance with this specification</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Author Note: subsection or appendix on a potential RAA scheme for CAA? i.e. 1x MIL, 1x GOV, 1x COMMERCIAL, 1x SPARE with some example guidance on HDA allocation?</t>
          </li>
        </ul>
      </section>
      <section anchor="apex-operators">
        <name>Apex Operators</name>
        <t>TODO</t>
        <ul empty="true">
          <li>
            <t>Review(SWC): we need to introduce the concept of Apex early in the document and give it a section immediately after this one, as even though IANA won't get involved in DRIP certificates, and CAAs will mutually cross-certify through the ACCP/TFP for now (maybe forever), there is in fact an Apex already, as IANA has to delegate the DET zones -- it is just that IANA won't do <em>all</em> of the things ultimately expected of the Apex for a given [industry sector's] DET hierarchy</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="dime-operation">
      <name>Requirements for DIME Operation</name>
      <t>The requirements below apply to both RAA and HDA Operators with a focus on how HDA Operators provide registration and related services for their clients (i.e. UAS Operators and their UAS). All data models are represented in this document using the Concise Data Definition Language (CDDL, <xref target="RFC8610"/>) using the prelude defined in <xref section="E" sectionFormat="of" target="RFC8610"/>.</t>
      <section anchor="uas-model">
        <name>Common UAS RID Data Model</name>
        <t>A common data model is specified by DRIP for various UAS RID elements typically transmitted over ASTM <xref target="F3411"/>.</t>
        <t>The field names and their general typing of <xref target="rid-model"/> are borrowed from the ASTM <xref target="F3411"/> data dictionary (Table 1 and Table 2). See that document for additional context and background information on aviation application-specific interpretation of the field semantics. The contents of this model are considered opaque to DRIP.</t>
        <t>The model is an expansion upon the BRID RRType model defined in <xref section="5.2" sectionFormat="of" target="DET-DNS"/>.</t>
        <figure anchor="rid-model">
          <name>Common UAS RID CDDL</name>
          <artwork><![CDATA[
uas-datum = {
  ? timestamp => utc,
  ? uas_type => 0..15,
  ? uas_ids => [
    + [
      id_type: 0..15,
      uas_id: uas-id
    ]
  ],
  ? ua_status => 0..15,
  ? ua_position => [
    lla: position, 
    barometric_altitude: number / null
  ],
  ? ua_bearing => uint,
  ? ua_speed => [
    vertical: number / null,
    horizontal: number / null
  ],
  ? ua_height => [
    agl: bool, 
    height: number
  ],
  ? accuracy => [
    vertical: 0..15,
    horizontal: 0..15,
    altitude: 0..15,
    barometric: 0..15,
    timestamp: 0..15
  ],
  ? auth => [
    + [
      auth_type: 0..15,
      data: auth-data
    ]
  ],
  ? self_id => [
    desc_type: 0..255, 
    desc: tstr .size 23
  ],
  ? operator_position => position,
  ? classification => [
    region: 0..8,
    category: 0..15,
    class: 0..15
  ],
  ? area => [
    count: 1..255,
    radius: number,
    floor: number,
    ceiling: number
  ],
  ? operator_id => [
    operator_type: 0..255,
    operator_id: tstr .size 20
  ],
  ? compliance => [+ uint]
}
]]></artwork>
        </figure>
        <t>The mapping between JSON keys (as strings) and CBOR keys (as unsigned integers) for <xref target="rid-model"/> are defined in <xref target="drip-keys"/>.</t>
        <ul empty="true">
          <li>
            <t>Author Note: do we specify the enumeration for compliance in this document? Is it an IANA registry?</t>
          </li>
        </ul>
      </section>
      <section anchor="registration">
        <name>Registration</name>
        <t>This section defines the interaction model, data models and methods for registration of a DET into a DIME for global interoperability. Standardization of additional methods and data models to register to a DIME (DETs or otherwise) is out of scope for this document.</t>
        <section anchor="disclaimer">
          <name>Disclaimer</name>
          <t>DRIP does NOT provide protection against incorrect (e.g. fraudulent) data entered during registration or asserted subsequently. DRIP does protect against alteration (intentional or unintentional) of data subsequent to its assertion by the cryptographic signer. The signer might be the proximate sender (e.g. UA transmitting Broadcast RID) or might be an attestor far away and long ago (e.g. root Certificate Authority). It is the duty of the operator of each DIME, or the party on whose behalf the DIME is being operated, to validate the registration data. The RAA (e.g. CAA) SHOULD provide services to obtain this goal, see <xref target="raa-oracle"/>.</t>
        </section>
        <section anchor="interaction-model">
          <name>Interaction Model</name>
          <t>Registration of DETs uses the interaction model shown in <xref target="det-reg-z"/>.</t>
          <figure anchor="det-reg-z">
            <name>Simplified DET Registration Z-Diagram</name>
            <artwork align="center"><![CDATA[
            registrant             dime
                |                   |
(0) GEN_DET/HI  |                   |
(1) GEN_CSR     |                   |
                |----(2) INPUT----->|
                |                   | (3) VALID_INPUT?
                |<-------FAIL-------|
                |                   | (4) DUPE_HI?
                |<-------FAIL-------|
                |                   | (5) DUPE_DET?
                |<-------FAIL-------|
                |                   | (6) GEN_CERTS
                |                   | (7) UPDATE_DATABASE
                |                   | (8) UPDATE_NS
                |<----(9) OUTPUT----|
]]></artwork>
          </figure>
          <dl>
            <dt>(0) GEN_DET/HI:</dt>
            <dd>
              <t>The registrant that plans to use the identity and its cryptographic properties SHOULD generate the asymmetric key-pair of their choosing and MUST protect the private key with Best Current Practices. The registrant MAY derive the corresponding DET. How the registrant obtains the desired HID for DET generation is out of scope for this document.</t>
            </dd>
            <dt>(1) GEN_CSR:</dt>
            <dd>
              <t>The registrant MUST generate a Certificate Signing Request (CSR) for their HI/DET. See <xref target="registration-csr"/> for more details.</t>
            </dd>
            <dt>(2) INPUT:</dt>
            <dd>
              <t>The registrant MUST format and send the required information for a given service registration as specified by the DIME using <xref target="registration-methods"/>.</t>
            </dd>
            <dt>(3) VALID_INPUT?:</dt>
            <dd>
              <t>The DIME, upon receipt of service registration inputs, MUST validate the input data. This may be simply performing syntax checks to ensure the data is properly formatted all the way to full semantic validation (see <xref target="raa-oracle"/>). Signed data MUST have their signatures verified before further processing. Failure of input validation SHOULD returns errors to the registrant.</t>
            </dd>
            <dt>(4) DUPE_HI?:</dt>
            <dd>
              <t>The DIME MUST check that the proposed HI is not a already in use within the specified HID scope. The registrant SHOULD be notified with an error if duplication is detected.</t>
            </dd>
            <dt>(5) DUPE_DET?:</dt>
            <dd>
              <t>The DIME MUST check that the proposed DET, derived from the HI, is not a already in use within the specified HID scope. If the registrant proposed a DET with HID outside that of the DIME, it MUST be rejected. If the registrant only provided the HI, the DIME MUST generate the DET using the HID for which that DIME is authoritative. The registrant SHOULD be notified with an error if duplication is detected.</t>
            </dd>
            <dt>(6) GEN_CERTS:</dt>
            <dd>
              <t>The DIME, after all the above validation, MUST generate a Broadcast Endorsement using the provided HI and DET from the registrant as the evidence. This Endorsement is used in <xref target="RFC9575"/>. The DIME MUST also generate a corresponding X.509 certificate as per <xref target="canonical-cert"/>, confirming that the DIME has accepted the registrant's DET/HI pair for registration. Other Certificates MAY be generated during registration but are out of scope for this document.</t>
            </dd>
            <dt>(7) UPDATE_DATABASE:</dt>
            <dd>
              <t>The DIME MUST update the Private Information Registry with all registration data required by the jurisdiction or the DIME's own policy, typically including PII, all of which must be protected by AAA as per applicable regulation and policy. It MAY include additional metadata or public information. How the Private Information Registry is updated is out of scope for this document.</t>
            </dd>
            <dt>(8) UPDATE_NS:</dt>
            <dd>
              <t>The DIME MUST update the Authoritative Name Server with any public information that was part of the registration. This information MUST be stored as described in <xref target="DET-DNS"/>.</t>
            </dd>
            <dt>(9) OUTPUT:</dt>
            <dd>
              <t>The DIME, upon successful updates of the Private Information Registry and Authoritative Name Server, responds according to <xref target="registration-methods"/>.</t>
            </dd>
          </dl>
        </section>
        <section anchor="registration-methods">
          <name>Interface &amp; Encoding</name>
          <t>Registration request and response data MUST be encapsulated in a Web Token (either CWT <xref target="RFC8392"/> or JWT <xref target="RFC7519"/>). For Session IDs and Authentication Key IDs the registrant usually is the Operator (or a proxy for the Operator such as the GCS) but MAY be the UA directly if the UA has a long term cryptographic identity.</t>
          <t>The method for a registrant to find a DIME is out of scope for this document. DIMEs MUST use <xref target="RFC8615"/> to provide DRIP-related interfaces and perform redirects to the relevant URIs. DIME registration endpoints MUST use POST expecting a Web Token from registrants. During a request a registrant MUST encrypt the Web Token in accordance with PRIV-2 of <xref section="4.3.1" sectionFormat="of" target="RFC9153"/> as during a request it typically includes PII. An example is shown in <xref target="api-request"/>.</t>
          <ul empty="true">
            <li>
              <t>Author Note: <tt>/.well-known/</tt> could be a single URI like <tt>register-hhit</tt> or more specific ones like <tt>uas-operator</tt> and <tt>uas-session</tt>. Do we have a preference?</t>
            </li>
          </ul>
          <figure anchor="api-request">
            <name>Example REST Registration API (request)</name>
            <artwork><![CDATA[
POST /.well-known/register-hhit HTTP/1.1
Host: uss.example.com
Accept: application/drip+cwt, application/drip+jwt
Content-Type: application/drip+cwt
Content-Length: <CWT length>

[ CWT from registrant ]
]]></artwork>
          </figure>
          <figure anchor="api-redirect">
            <name>Example REST Registration API (redirect)</name>
            <artwork><![CDATA[
HTTP/1.1 308 Permanent Redirect
Accept: application/drip+cwt, application/drip+jwt
Location: hda.example.net/foo/bar
Allow: POST
]]></artwork>
          </figure>
          <ul empty="true">
            <li>
              <t>Author Note: per Section 15.4.2 of RFC9110, a 301 MAY change POST to GET on the re-request. We do not want this behavior so intend to use 308 instead (as it suggests). However, RFC9205 indicates that mapping application behavior to HTTP Status Codes is bad practice and does not say anything about specifying a specific redirect code for a request. There are some behaviors during registration where it would make sense for DRIP to explicitly specify the expected Status Code rather than leave it up to implementor (see <xref target="raa-oracle"/>). What should I do?</t>
            </li>
          </ul>
          <ul empty="true">
            <li>
              <t>Author Note: per RFC9205 it is recommended to use the Link header of HTTP (RFC8288) instead of redirects. So we would use <tt>./well-known/</tt> and then perform a Link to the specific server resource (either local or remote)? I think using a HTTP Redirect makes more sense, just need to specify that 308 MUST be used and that the server MUST set the Location header field of the HTTP response so clients re-request the POST using the Location value.</t>
            </li>
          </ul>
          <t>The DIME responds, upon successful registration, with their own Web Token contain the data model defined in <xref target="resp-model"/>. The Web Token SHOULD be encrypted, if containing any PII. An example is shown in <xref target="api-response"/>.</t>
          <figure anchor="api-response">
            <name>Example REST Registration API (response)</name>
            <artwork><![CDATA[
HTTP/1.1 200 OK
Accept: application/drip+cwt, application/drip+jwt
Content-Type: application/drip+cwt

[ CWT from DIME ]
]]></artwork>
          </figure>
          <t>This document allocates <tt>application/drip+cwt</tt>, <tt>application/drip+jwt</tt> and <tt>application/drip</tt> to the Media Types registry. It also allocates <tt>register-hhit</tt> to the <tt>/.well-known/</tt> registry.</t>
          <section anchor="coap">
            <name>Using CoAP for Registration</name>
            <t>Support of the Constrained Application Protocol (CoAP, <xref target="RFC7252"/>) is OPTIONAL.</t>
            <t>When using CoAP, DTLS SHOULD be used when possible and MUST send the data models (<xref target="reg-model"/> and <xref target="resp-model"/>) encoded as CBOR. When DTLS is not possible, and CoAP is instead used with UDP, model data MUST be encapsulated, signed and encrypted in a CWT as above.</t>
          </section>
          <section anchor="guidance-on-registration-errors">
            <name>Guidance on Registration Errors</name>
            <t>The following registration failure conditions and response are informative:</t>
            <ul spacing="normal">
              <li>
                <t>Upon invalid input from the registrant, the DIME SHOULD respond with either 400 (Bad Request) or 403 (Forbidden) as appropriate.</t>
              </li>
              <li>
                <t>Upon a duplicate HI or DET, the DIME SHOULD respond with 409 (Conflict).</t>
              </li>
              <li>
                <t>Any other processing failure of registration by a DIME SHOULD be responded with an appropriate Server Error status code.</t>
              </li>
            </ul>
            <t>Care should be given when responding with 403 (Forbidden) to not expose any information that could be used to socially engineer a fake request. For example, when following <xref target="raa-oracle"/>, it would be unwise for the HDA to detail an exact reason for the rejection. A malicious registrant could spam the endpoint, farming information on what UAS Serial Numbers, Operator IDs and their potential bindings exist to exploit.</t>
            <t>It should be noted that the above would be avoided with properly configured systems since signature validation and denial of service mitigations would be before the HDA even attempts to ascertain validation from the RAA.</t>
          </section>
        </section>
        <section anchor="reg-model">
          <name>Registration Model</name>
          <t>The data sent to the DIME for a given registration is policy driven. For example a Session ID registration SHOULD include a CAA specific identifier of the Operator to enable the private binding of the Session ID to both the Serial Number (found in the CSR) but also the Operator themselves.</t>
          <figure anchor="reg-cddl">
            <name>Registration Model CDDL</name>
            <artwork><![CDATA[
registration-content = {
  csr_list: [
    + csr: [
      idx: hash,
      entity_type: uint,
      csr: x509,
      vnb: utc / null,
      vna: utc / 1..15638400 / null,
      meta: { metadata } 
    ]
  ],
  metadata
}
]]></artwork>
          </figure>
          <t>The data model defined in <xref target="reg-cddl"/> is what is minimally required for a DIME to be functional. Additional fields SHOULD be registered to IANA under <xref target="drip-keys"/> for global harmonization. RAAs and HDAs MAY use their respective keys and their associated maps to define additional keys to be included in a registration. A dedicated Private Use space is provided for RAAs and HDAs to define keys and their uses.</t>
          <t>The <tt>uas</tt> map item uses the data model found in <xref target="uas-model"/> to carry any static information expected to also be found over Broadcast RID. It MUST NOT include in the <tt>uas_ids</tt> key the UAS Serial Number when a Session ID is being registered. It also MUST NOT contain the <tt>operator_location</tt> key, as this information is usually considered PII and typically is dynamic or unknown at time of registration. The DIME MUST fill in the <tt>auth</tt> key with any SAMs related to a registration and place the data model into DNS with <xref section="5.2" sectionFormat="of" target="DET-DNS"/> when the registrant entity is required to use Broadcast RID and expecting to use <xref target="RFC9575"/>.</t>
          <t>The registrant can select from a number of options to encode the values of valid not before (<tt>vnb</tt>) and valid not after (<tt>vna</tt>) for time of applicability of an individual CSR (<tt>csr-data</tt>). The use of the <tt>time</tt> or <tt>tdate</tt> types allow for absolute time references. The use of the <tt>uint</tt> type for <tt>vna</tt> specifies a positive offset in seconds from an absolute time. When <tt>null</tt> is used the registrant is informing the DIME that for <tt>vnb</tt> the DIME MUST use the current time as <tt>vnb</tt> during registration and for <tt>vna</tt> the DIME MUST set <tt>vna</tt> to a time such that the default DIME policy for maximum delta between <tt>vnb</tt> and <tt>vna</tt> is not exceeded.</t>
          <ul empty="true">
            <li>
              <t>Implementation Note: due to not differentiating between integers and floats in its number type, implementations using JSON as the encoded format MUST check the value of <tt>vna</tt> to determine if its being used as an offset or absolute time.</t>
            </li>
          </ul>
          <t>As an example of the use of <tt>vnb</tt> and <tt>vna</tt>, a registrant may set <tt>vnb=null</tt> and <tt>vna=3600</tt>. The DIME in this instance would use the current absolute time at receipt of the registration request for <tt>vnb</tt> and then apply the offset specified by <tt>vna</tt> to obtain an absolute time for <tt>vna</tt> that is 3600 seconds after <tt>vnb</tt>. These absolute times of <tt>vnb</tt> and <tt>vna</tt> are then used in the certificate being created by the DIME to endorse the registration <xref target="canonical-cert"/>.</t>
          <section anchor="registration-csr">
            <name>Certificate Signing Request</name>
            <ul empty="true">
              <li>
                <t>Author Note: RGM, does this section suffice to define the CSR models or do we need some more like what is in <xref target="DKI"/>?</t>
              </li>
            </ul>
            <t>An X.509 CSR MUST be used to convey the various cryptographic and identity properties of an entity during a registration. For CSRs the content of the following fields for DRIP should be noted:</t>
            <dl>
              <dt>Subject:</dt>
              <dd>
                <t>As defined in <xref section="4.1.2.6" sectionFormat="of" target="RFC5280"/>. This field is filled in based on the type of entity being registered. When the attribute type is set to SERIAL_NUMBER, it MUST contain the ANSI/CTA 2063-A UAS Serial Number encoded as a string. Other attribute types are subject to policy and are out of scope for this document.</t>
              </dd>
              <dt>Extensions:</dt>
              <dd>
                <t>When the registrant knows which HID and/or Suite ID they want the CSR SHOULD contain the Subject Alternate Name extension as defined in <xref section="4.2.1.6" sectionFormat="of" target="RFC5280"/> using ipAddress containing the fully formed DET and MUST mark the extension as <tt>critical</tt>. This DIME MUST check to ensure that the DET located in the extension is properly generated with the included public key of this CSR. If the registrant does not know or care the value of their HID and/or Suite ID, the Extensions field MUST NOT appear and the DIME will use its HID for DET generation using the public key provided by this CSR.</t>
              </dd>
            </dl>
            <t><xref target="csr-examples"/> contains examples of common CSRs used in DET registration.</t>
          </section>
          <section anchor="raa-oracle">
            <name>Validating Fields</name>
            <t>In certain circumstances field contents may only be properly validated by other entities outside of DRIP. For example the binding between UAS Serial Number and Operator ID should already be known by the CAA, as typically this information is required out of band of DRIP directly to the CAA in some form. The CAA should provide or itself have access to an "oracle" that can validate these claimed bindings for registration to proceed. If such an "oracle" is not consulted there is a risk that information being registered is fraudulent and DRIP has no method or authority to confirm the claims. If such information is accepted, future information queries by authorities can result in bogus data being returned, with no binding to an actual UAS or Operator.</t>
            <t>The CAA SHOULD, as part of its capacity as an RAA onboarding an HDA, provide data models, communication framework and any authentication mechanisms to query the oracle directly if the CAA allows HDAs to perform the queries themselves. Otherwise the RAA MUST provide an HTTPS POST interface that consumes a Web Token generated by the HDA containing the registrant Web Token. If the RAA is not configured or does not wish to handle such requests it MUST respond with 501 (Not Implemented), HDAs should proceed without validation as if validation was successful.</t>
            <t>If the RAA is configured to validate registration requests, it sends the data to the "oracle", via a mechanism out of scope for this document. When the "oracle" marks data as invalid the RAA MUST signal to the HDA that the registration is to be denied. Otherwise the RAA returns a Web Token to the HDA containing an X.509 Certificate with the Subject set to the same contents as the registrant CSR.</t>
          </section>
        </section>
        <section anchor="resp-model">
          <name>Response Model</name>
          <figure anchor="resp-cddl">
            <name>Response Model CDDL</name>
            <artwork><![CDATA[
response-content = [
  + [
    idx: hash,
    entity_type: uint,
    certs: {
      canonical_cert: x509,
      ? be_chain: [+ be: endorsement],
      * &(tstr , int) => any
    }
  ]
]
]]></artwork>
          </figure>
          <t>The <tt>canonical_cert</tt> key MUST be the certificate defined in <xref target="canonical-cert"/>. The <tt>be_chain</tt> contains the Broadcast Endorsement structures defined in <xref section="4.1" sectionFormat="of" target="RFC9575"/> and MAY not be sent by the DIME if the registrant is not expected to use Broadcast RID.</t>
          <t>Additional items MAY be sent back to the registrant by the DIME. Their keys SHOULD be registered under IANA as part of <xref target="drip-keys"/> to support global harmonization.</t>
          <section anchor="canonical-cert">
            <name>Canonical Registration Certificate</name>
            <t><xref section="4" sectionFormat="of" target="DKI"/> provides profiles for X.509 certificates adhering to the <xref target="ICAO-ACCP"/>, developed by the Trust Framework Panel. At least one of the DRIP profiles MUST be used.</t>
            <t>At least one certificate in the chain from an apex node to a leaf node MUST contain a URI, as part of the Subject Alternative Name Extension <xref target="RFC5280"/>, which points to the relevant Private Information Registry containing associated PII registered. This certificate MUST be contained in the HHIT RRType defined in <xref section="5.1" sectionFormat="of" target="DET-DNS"/>. The certificate MAY be anywhere on the path and SHOULD be as close to the apex in the path as possible for efficiency.</t>
            <t>At the time of publication, the current best practice is for the HDA Issue certificate to contain the base URI to be used for all Private Information Registry requests under the HDA. When an HDA supports multiple Private Information Registry providers, it SHOULD set the appropriate URI in the end entity certificate. The HDA MAY either set all different URIs together in its HDA Issue certificate at cost of the querent being then required to perform queries at each provided URI until it receives a response or use different Issuer DETs for each different Private Information Registry provider.</t>
            <t>When registering a DET to be used as a Session ID, the CSR MUST contain the UAS Serial Number as the Subject, and the certificate placed in the private registry also MUST contain the UAS Serial Number as the Subject, but the certificate placed in the public registry and used as the basis of the Broadcast Endorsement (or otherwise exposed publicly) MUST NOT contain the UAS Serial Number.</t>
            <ul empty="true">
              <li>
                <t>Author Note: include <xref section="4" sectionFormat="of" target="DKI"/> here if merged?</t>
              </li>
            </ul>
          </section>
        </section>
      </section>
      <section anchor="query">
        <name>Query</name>
        <t>A DIME has two query interfaces it MUST support. One interface is used for public information and the other (discoverable from public information) is for private information.</t>
        <section anchor="pub-info-reg">
          <name>Public Information Registries</name>
          <t>The information found in these registries has been designated (explicitly or implicitly) as public by cognizant authority and/or the information owner. Such information includes asymmetric cryptographic public keys needed for authentication in <xref target="RFC9575"/>, static Broadcast RID data and trustworthy pointers to additional information.</t>
          <t>These registries are Authoritative Name Servers in the DNS. See <xref target="DET-DNS"/> for operational requirements, query mechanism and response models.</t>
        </section>
        <section anchor="priv-info-reg">
          <name>Private Information Registries</name>
          <t>The information found in these registries is considered Personally Identifiable Information (PII) and/or is stored for potential future audit of registration. Access to Private Information Registries MUST be performed using RDAP <xref target="STD95"/>. This section defines RDAP behavior for DRIP.</t>
          <section anchor="rdap-uri">
            <name>URI Path Segment</name>
            <t>The URIs to Private Information resources MUST use the specification defined in <xref section="3.1.3" sectionFormat="of" target="RFC9082"/>. Use of <xref section="3.1.1" sectionFormat="of" target="RFC9082"/> is OPTIONAL.</t>
            <ul empty="true">
              <li>
                <t>Review(SWC): This makes sense if they are starting in DNS, but if they take a DET, and without going to DNS, go straight to the RDAP bootstrap servers, 3.1.1 is more direct and straightforward. Thoughts?</t>
              </li>
            </ul>
            <ul empty="true">
              <li>
                <t>Author Note: use of 3.1.1 could shorten the URIs as their content would be <tt>https://hda.example.com/rdap/ip/&lt;ip6-here&gt;</tt> instead of <tt>https://hda.example.com/rdap/domain/&lt;reverse-ip6-here&gt;</tt></t>
              </li>
            </ul>
          </section>
          <section anchor="conformance-literal">
            <name>Conformance Literal</name>
            <t>The string literal <tt>drip_version_0</tt> MUST be used in the <tt>rdapConformance</tt> section of the RDAP response to signal conformance with this specification.</t>
          </section>
          <section anchor="rdap-model">
            <name>Extension Model</name>
            <t>Queries of DETs in RDAP SHOULD respond with the appropriate Object Class as defined in <xref target="RFC9083"/> and MUST include the additional data element specified in <xref target="rdap-response"/>.</t>
            <figure anchor="rdap-response">
              <name>RDAP Response CDDL</name>
              <artwork><![CDATA[
dime = {
  csr: x509,
  canonical_cert: x509,
  hhit: [
    entity_type: uint, 
    ipv6: ip6
  ],
  be_chain: [+ be: endorsement]
  registrant: tstr, 
  ? raa_approval: x509,
  metadata
}
]]></artwork>
            </figure>
            <t>Additional keys SHOULD be registered to IANA under <xref target="drip-keys"/> for global harmonization. Specification of their usage and syntax in a NAS is provided by CAAs using a MOC that references this specification.</t>
          </section>
          <section anchor="diff-access">
            <name>Differential Access</name>
            <t>Per REG-2 and REG-4 of <xref section="4.4.1" sectionFormat="of" target="RFC9153"/>, RDAP queries to DRIP Private Information Registries MUST be protected using fine-grained AAA policies in a both human- &amp; machine-readable form for automated enforcement. RDAP supports only HTTP based mechanisms for authentication as defined in <xref section="3.2" sectionFormat="of" target="RFC7481"/>. A federated authentication mechanism, such as the examples in <xref section="3.2.1" sectionFormat="of" target="RFC7481"/>, is RECOMMENDED.</t>
            <t>For international and/or global harmonization, DRIP standardizes the following RDAP behavior for authentication of clients and servers:</t>
            <ul spacing="normal">
              <li>
                <t>MUST support HTTP Digest Authentication Scheme (<xref target="RFC7616"/>) <strong>AND</strong></t>
              </li>
              <li>
                <t>SHOULD NOT support HTTP Basic Authentication Scheme (<xref target="RFC7617"/>) but MAY accept Basic if peer offers that and nothing stronger <strong>AND</strong></t>
              </li>
              <li>
                <t>SHOULD support OpenID Connect for RDAP (<xref target="RFC9560"/>), or Mutual TLS (<xref section="7.4.6" sectionFormat="of" target="RFC5246"/>) or eXtensible Access Control Markup Language (XACML) with Security Assertion Markup Language (SAML) for all queries <strong>OR</strong></t>
              </li>
              <li>
                <t>MUST support OpenID Connect for RDAP <xref target="RFC9560"/>, or Mutual TLS <xref section="7.4.6" sectionFormat="of" target="RFC5246"/> or XACML with SAML for global and/or international queries and MAY do any other RDAP compatible AAA for domestic queries</t>
              </li>
            </ul>
            <ul empty="true">
              <li>
                <t>Author Note: MUST support (one of the options) for international and/or global queries and for domestic queries SHOULD use the same but MAY use any other RDAP compatible AAA mechanism instead.</t>
              </li>
            </ul>
            <t>When Mutual TLS is used, it MUST use a certificate as defined from <xref target="DKI"/>. It SHOULD use the certificate found in the HHIT RRType but MAY use another certificate found in an associated TLSA RRType.</t>
            <ul empty="true">
              <li>
                <t>Author Note: the list of OpenID Connect, Mutual TLS and XACML/SAML MUST be narrowed to a single choice. Soliciting input on the best approach to support international and/or global interoperability.</t>
              </li>
            </ul>
          </section>
        </section>
      </section>
    </section>
    <section anchor="ic">
      <name>IANA Considerations</name>
      <section anchor="raa-delegation-for-caas">
        <name>RAA Delegation for CAAs</name>
        <t>As part of <xref target="DET-DNS"/> IANA already has the pre-allocated mapping of RAA values for CAAs. Nations are to follow the guidance in <xref section="6.2.1.4" sectionFormat="of" target="DET-DNS"/> to request delegation of their DNS zone under <tt>3.0.0.1.0.0.2.ip6.arpa.</tt>.</t>
      </section>
      <section anchor="well-known-uris">
        <name>Well-Known URIs</name>
        <t>IANA is requested to add the following entries in the "Well-Known URIs" registry <xref target="WELL-KNOWN"/>.</t>
        <table>
          <name>Additions to Well-Known URIs Registry</name>
          <thead>
            <tr>
              <th align="left">URI Suffix</th>
              <th align="left">Change Controller</th>
              <th align="left">Reference</th>
              <th align="left">Status</th>
              <th align="left">Related Information</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">register-hhit</td>
              <td align="left">IETF</td>
              <td align="left">This RFC</td>
              <td align="left">permanent</td>
              <td align="left">N/A</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="rdap-extensions-registry">
        <name>RDAP Extensions Registry</name>
        <t>IANA is request to register the following value in the "RDAP Extensions" registry <xref target="RDAP-EXT"/>.</t>
        <artwork><![CDATA[
Extension Identifier: 
  drip_version_0
Registry Operator:
  Any
Specification:
  This specification
Contact:
  IETF <iesg@ietf.org>
Intended Usage:
  This extension is used to convey private information 
  under an HHIT registration.
]]></artwork>
      </section>
      <section anchor="media-types">
        <name>Media Types</name>
        <t>IANA is requested to add the following entries in the "Media Types" registry <xref target="MEDIA-TYPES"/>.</t>
        <table>
          <name>Additions to Media Types Registry</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">DRIP CWT</td>
              <td align="left">application/drip+cwt</td>
              <td align="left">
                <xref target="drip-cwt-mt"/></td>
            </tr>
            <tr>
              <td align="left">DRIP JWT</td>
              <td align="left">application/drip+jwt</td>
              <td align="left">
                <xref target="drip-jwt-mt"/></td>
            </tr>
          </tbody>
        </table>
        <section anchor="drip-cwt-mt">
          <name>application/drip+cwt Registration</name>
          <dl>
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>drip+cwt</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t>TODO</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>This RFC</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Applications that access DIMEs requesting HHIT registration, as well as DIMEs responding to registration requests.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>DRIP WG mailing list (drip@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="drip-jwt-mt">
          <name>application/drip+jwt Registration</name>
          <dl>
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>drip+jwt</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary, JWT values are encoded as a series of base64url-encoded values (with trailing '=' characters removed), some of which may be the empty string, separated by period ('.') characters.</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t>TODO</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>This RFC</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Applications that access DIMEs requesting HHIT registration, as well as DIMEs responding to registration requests.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>DRIP WG mailing list (drip@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="drip-keys">
        <name>DRIP CBOR/JSON Keys</name>
        <t>This specification establishes a new sub-registry called "DRIP CBOR/JSON Keys" within the "Drone Remote ID Protocol" registry. This registry is to maintain a globally harmonized list of JSON keys (i.e. "Names") and CBOR map integer keys (i.e. "Labels") for use in DRIP. The following ranges are defined based on the CBOR Label values:</t>
        <table anchor="key-table">
          <name>DRIP CBOR/JSON Key Registry Policies</name>
          <thead>
            <tr>
              <th align="left">Range</th>
              <th align="left">Registration Policy</th>
              <th align="left">Range Use</th>
              <th align="left">Comments</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">from -2^64 to -25</td>
              <td align="left">Private Use (<xref section="4.1" sectionFormat="of" target="RFC8126"/>)</td>
              <td align="left">HID Private Keys</td>
              <td align="left">Private use for RAAs and HDAs</td>
            </tr>
            <tr>
              <td align="left">from -24 to 23</td>
              <td align="left">TODO: TBD</td>
              <td align="left">ASTM UAS Keys</td>
              <td align="left">Keys found in ASTM UAS Standards such as <xref target="F3411"/></td>
            </tr>
            <tr>
              <td align="left">from 24 to 2^64-1</td>
              <td align="left">Specification Required (<xref section="4.6" sectionFormat="of" target="RFC8126"/>)</td>
              <td align="left">Reserved</td>
              <td align="left">Reserved for future registrations to maintain global harmonization</td>
            </tr>
          </tbody>
        </table>
        <t>Keys in the Private Use and Experimental ranges are RECOMMENDED to prepend a <tt>_</tt> to the Name to avoid namespace collisions with registered Names.</t>
        <t>The HID Private Keys range in this registry provide code-points (used in <xref target="reg-model"/> and <xref target="rdap-model"/> as part of <tt>metadata</tt>) for each RAA and HDA to define their own subset of elements in both registration and RDAP responses. The <tt>spec</tt> value of this registry SHOULD be used to enable the DIME or client to provide a "hint" for the data elements included. Specification of the <tt>spec</tt> string semantics are left to individual RAAs and HDAs to define as they see fit. RAA and HDA Operators SHOULD provide specification for any Private Use or Experimental Use values, but this may not be public due to policy.</t>
        <section anchor="review-criteria">
          <name>Review Criteria</name>
          <t>For registrations, review should note if the Name field matches an existing entry, the request should be denied. A request should also be denied if the specification duplicates an existing entry both in syntax and semantics. For example, if an existing key called <tt>whee</tt> already exists with the specification of <tt>[+ uint]</tt> and a new request comes along to register <tt>whee_but_mine</tt> with specification <tt>[+ uint]</tt>, then the latter should be rejected on the grounds of being able to use <tt>whee</tt> instead. This denial can be overruled if shown that the new registration has clear justification, as part of the specification citing technical reasoning, to exist.</t>
        </section>
        <section anchor="cborjson-key-fields">
          <name>CBOR/JSON Key Fields</name>
          <dl>
            <dt>Name (JSON Key Value):</dt>
            <dd>
              <t>A string value, to be used as a <tt>key</tt> in the <tt>key: value</tt> pair of a JSON object. No specific rules apply for syntax beyond being a valid JSON string for a object key, but it is recommended to use all lower-case and snake-case with underscores. Care should be given to the length of a Name to reduce wire size of JSON encodings for constrained environments.</t>
            </dd>
            <dt>Label (CBOR Integer Key Value):</dt>
            <dd>
              <t>A integer value, ranging from <tt>-2^64</tt> to <tt>2^64 - 1</tt>, to be used as a key in a CBOR map. Different ranges of values use different registration policies, see <xref target="key-table"/>.</t>
            </dd>
            <dt>Description:</dt>
            <dd>
              <t>A short description of the entry providing an overview of its semantic meaning and its expected use-cases.</t>
            </dd>
            <dt>Reference:</dt>
            <dd>
              <t>A link to a permanent and readily available specification defining the value syntax and semantics to be used for this key.</t>
            </dd>
          </dl>
        </section>
        <section anchor="registration-form">
          <name>Registration Form</name>
          <figure anchor="key-form">
            <artwork><![CDATA[
Name (JSON Key Value):
Label (CBOR Integer Key Value):
Description:
Specification:
]]></artwork>
          </figure>
        </section>
        <section anchor="initial-values">
          <name>Initial Values</name>
          <table anchor="pre-key-values">
            <name>Pre-Allocated DRIP CBOR/JSON Keys</name>
            <thead>
              <tr>
                <th align="left">Name (JSON Key Value)</th>
                <th align="left">Label (CBOR Integer Key Value)</th>
                <th align="left">Description</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">uas_type</td>
                <td align="left">0</td>
                <td align="left">Enumeration of UAS Type</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">uas_ids</td>
                <td align="left">1</td>
                <td align="left">UAS IDs</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">auth</td>
                <td align="left">2</td>
                <td align="left">Authentication Data</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">self_id</td>
                <td align="left">3</td>
                <td align="left">Self ID</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">classification</td>
                <td align="left">4</td>
                <td align="left">UA Category &amp; Class</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">area</td>
                <td align="left">5</td>
                <td align="left">Area Count, Radius, etc.</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">operator_id</td>
                <td align="left">6</td>
                <td align="left">Operator ID</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">ua_status</td>
                <td align="left">7</td>
                <td align="left">Enumeration of Status</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">ua_position</td>
                <td align="left">8</td>
                <td align="left">UA Position</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">ua_bearing</td>
                <td align="left">9</td>
                <td align="left">Bearing / Track Direction</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">ua_speed</td>
                <td align="left">10</td>
                <td align="left">Vertical &amp; Horizontal Speeds</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">ua_height</td>
                <td align="left">11</td>
                <td align="left">Height Above Ground or Take-off</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">accuracy</td>
                <td align="left">12</td>
                <td align="left">Enumerations of Accuracies</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">operator_position</td>
                <td align="left">13</td>
                <td align="left">Operator Position</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">timestamp</td>
                <td align="left">14</td>
                <td align="left">UTC Timestamp</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">compliance</td>
                <td align="left">15</td>
                <td align="left">Compliance Enumeration</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">raa</td>
                <td align="left">23</td>
                <td align="left">RAA</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">hda</td>
                <td align="left">24</td>
                <td align="left">HDA</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">csr</td>
                <td align="left">25</td>
                <td align="left">DER Encoded X.509 CSR</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">uas</td>
                <td align="left">26</td>
                <td align="left">UAS Datum Map</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">utm</td>
                <td align="left">27</td>
                <td align="left">UTM Operational Intent &amp; Source</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">spec</td>
                <td align="left">28</td>
                <td align="left">CAA Specification Code</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">canonical_cert</td>
                <td align="left">39</td>
                <td align="left">DER Encoded X.509 Certificate</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">be_chain</td>
                <td align="left">30</td>
                <td align="left">List of Broadcast Endorsements</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">registrant</td>
                <td align="left">31</td>
                <td align="left">Registrant Information</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">hhit</td>
                <td align="left">32</td>
                <td align="left">Hierarchial Host Identity Tag</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">oracle_x509</td>
                <td align="left">33</td>
                <td align="left">Oracle X.509 Certificate</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">uas_serial_number</td>
                <td align="left">34</td>
                <td align="left">ANSI/CTA 2063-A UAS Serial Number</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">caa_assigned_id</td>
                <td align="left">35</td>
                <td align="left">CAA Assigned ID</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">pilot_license_id</td>
                <td align="left">36</td>
                <td align="left">Pilot License Number</td>
                <td align="left">This RFC</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="sc">
      <name>Security Considerations</name>
      <t>The considerations discussed in <xref target="RFC9153"/>, <xref target="RFC9374"/>, <xref target="RFC9434"/>, <xref target="RFC9575"/> and <xref target="DET-DNS"/> apply.</t>
      <t>DIMEs use and provide various methods to protect data through: Attestation, Authentication, Authorization, Access Control, Attribution, Accounting, and Audit (AAA). All data, handled under DRIP, MUST be protected by AAA, as per applicable regulation and policy (which, in some cases, for public data, may impose minimal requirements). All private data MUST also be protected by strong encryption where permitted by applicable law etc. These requirements apply to data at rest and in transit in all phases of the process, i.e. registration and query.</t>
      <t>Attestation may be mandated by CAAs for devices (such as UA). Remote ATtestation ProcedureS (RATS) <xref target="RFC9334"/> is recommended for DRIP. The specific attestation mechanisms in a given jurisdiction are out of scope for this document.</t>
      <ul empty="true">
        <li>
          <t>Author Note: RGM, what else should go here?</t>
        </li>
      </ul>
      <section anchor="cryptographic-materials">
        <name>Cryptographic Materials</name>
        <t>Best practices dictate that cryptographic materials that should only be available to selected parties SHOULD be generated by one or more of those parties and stored accessibly only on those parties devices. E.g. the asymmetric key-pair from which a DET will be derived SHOULD be generated by the entity identified by that DET and the corresponding private key should be stored only on that entity's device. There may be scenarios where other parts of the UAS MAY generate the cryptographic materials and provision them as needed during an operation. Any such system MUST ensure security of the cryptographic material is guaranteed.</t>
      </section>
    </section>
    <section anchor="ptc">
      <name>Privacy &amp; Transparency Considerations</name>
      <t>The considerations discussed in <xref target="RFC9153"/> and <xref section="10" sectionFormat="of" target="RFC9434"/> apply.</t>
      <ul empty="true">
        <li>
          <t>Author Note: do we copy/paste Section 10 of <xref target="RFC9434"/> and update here or is below sufficient?</t>
        </li>
      </ul>
      <section anchor="det-ptc">
        <name>DETs as Session ID and Authentication Key ID</name>
        <t>The properties of a DET allow it to be used as a Session ID and/or an Authentication Key ID. There may be scenarios in which Session IDs are desired for privacy but Authentication is not; although this may reduce transparency and security, a DET MAY be used exclusively as a Session ID in such. There are scenarios in which Authentication is desired but Session IDs are not (e.g. where a CAA does not allow Session IDs); a DET MAY be used exclusively as an Authentication Key ID in such. In the scenario expected to be most common, both Session IDs and Authentication are desired; the same DET SHOULD be used as both the Session ID and Authentication Key ID in such. Consequences and operational impact of using different DETs for the Session ID and Authentication Key ID of the same entity are unknown and not covered in this document.</t>
      </section>
      <section anchor="selective-encryption">
        <name>Selective Encryption</name>
        <ul empty="true">
          <li>
            <t>Author Note: renamed section and/or add more explicit disclaimer?</t>
          </li>
        </ul>
        <t>Selective encryption may be allowed in some circumstances. An HHIT may be used in a private lookup to access decryption key material or obtain decryption as a service.</t>
        <t>Selective encryption of UAS RID using DRIP is only allowed when the DET to be used as the Session ID is issued by an HDA associated with a USS and that DET is associated with the corresponding Operational Intent in UTM. This enables the encryption of selected data elements in Broadcast RID to provide a layer of privacy for operators (e.g. their position) without compromising transparency to entities (e.g. public safety / law enforcement personnel) that need to know.</t>
        <t>Selective encryption typically requires network connectivity of the Observer to perform the private query to obtain the decryption service or key material. CAAs should consider the expected Observer environment and prohibit encryption wherever and whenever Observers cannot reasonably be expected to have connectivity. For example selective encryption, per CAA regulations, MAY be allowed in dense wireless IP connectivity areas (e.g. urban) but prohibited in poor wirelessly covered areas (e.g. rural).</t>
        <t>The issue of Observer network connectivity MAY be mitigated with the use of a shared decryption key used by multiple Session IDs under a given USS/HDA over a period of time, that is preloaded onto the Observer device before connectivity is lost. For example Observers MAY query USS/HDAs for flight volumes in which they are interested to preload their decryption key(s) for the Operational Intents/Session IDs that day.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="DET-DNS">
          <front>
            <title>DRIP Entity Tags in the Domain Name System</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Jim Reid" initials="J." surname="Reid">
              <organization>RTFM llp</organization>
            </author>
            <date day="27" month="June" year="2025"/>
            <abstract>
              <t>   This document defines the Domain Name System (DNS) functionality of a
   Drone Remote Identification Protocol (DRIP) Identity Management
   Entity (DIME).  It is built around DRIP Entity Tags (DETs) to
   standardize a hierarchical registry structure and associated
   processes to facilitate trustable and scalable registration and
   lookup of information related to Unmanned Aircraft Systems (UAS).
   The registry system supports issuance, discovery, and verification of
   DETs, enabling secure identification and association of UAS and their
   operators.  It also defines the interactions between different
   classes of registries (root, organizational, and individual) and
   their respective roles in maintaining the integrity of the
   registration data.  This architecture enables decentralized,
   federated operation while supporting privacy, traceability, and
   regulatory compliance requirements in the context of UAS Remote ID
   and other services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-31"/>
        </reference>
        <reference anchor="DKI">
          <front>
            <title>The DRIP DET public Key Infrastructure</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="22" month="April" year="2025"/>
            <abstract>
              <t>   The DRIP Entity Tag (DET) public Key Infrastructure (DKI) is a
   specific variant of classic Public Key Infrastructures (PKI) where
   the organization is around the DET, in place of X.520 Distinguished
   Names.  Further, the DKI uses DRIP Endorsements in place of X.509
   certificates for establishing trust within the DKI.

   There are two X.509 profiles for shadow PKI behind the DKI, with many
   of their X.509 fields mirroring content in the DRIP Endorsements.
   These PKIs can at times be used where X.509 is expected and non-
   constrained communication links are available that can handle their
   larger size.  It is recommended that a DRIP deployment implement both
   of these along side the Endorsement trees.

   C509 (CBOR) encoding of all X.509 certificates are also provided as
   an alternative for where there are gains in reduced object size.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-dki-08"/>
        </reference>
        <reference anchor="RFC9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC9575">
          <front>
            <title>DRIP Entity Tag (DET) Authentication Formats and Protocols for Broadcast Remote Identification (RID)</title>
            <author fullname="A. Wiethuechter" initials="A." role="editor" surname="Wiethuechter"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>The Drone Remote Identification Protocol (DRIP), plus trust policies and periodic access to registries, augments Unmanned Aircraft System (UAS) Remote Identification (RID), enabling local real-time assessment of trustworthiness of received RID messages and observed UAS, even by Observers lacking Internet access. This document defines DRIP message types and formats to be sent in Broadcast RID Authentication Messages to verify that attached and recently detached messages were signed by the registered owner of the DRIP Entity Tag (DET) claimed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9575"/>
          <seriesInfo name="DOI" value="10.17487/RFC9575"/>
        </reference>
        <referencegroup anchor="STD95" target="https://www.rfc-editor.org/info/std95">
          <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
            <front>
              <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <author fullname="B. Ellacott" initials="B." surname="Ellacott"/>
              <author fullname="N. Kong" initials="N." surname="Kong"/>
              <date month="March" year="2015"/>
              <abstract>
                <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP). It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP). RDAP is a successor protocol to the very old WHOIS protocol. The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="7480"/>
            <seriesInfo name="DOI" value="10.17487/RFC7480"/>
          </reference>
          <reference anchor="RFC7481" target="https://www.rfc-editor.org/info/rfc7481">
            <front>
              <title>Security Services for the Registration Data Access Protocol (RDAP)</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="N. Kong" initials="N." surname="Kong"/>
              <date month="March" year="2015"/>
              <abstract>
                <t>The Registration Data Access Protocol (RDAP) provides "RESTful" web services to retrieve registration metadata from Domain Name and Regional Internet Registries. This document describes information security services, including access control, authentication, authorization, availability, data confidentiality, and data integrity for RDAP.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="7481"/>
            <seriesInfo name="DOI" value="10.17487/RFC7481"/>
          </reference>
          <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
            <front>
              <title>Registration Data Access Protocol (RDAP) Query Format</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <date month="June" year="2021"/>
              <abstract>
                <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9082"/>
            <seriesInfo name="DOI" value="10.17487/RFC9082"/>
          </reference>
          <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
            <front>
              <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <date month="June" year="2021"/>
              <abstract>
                <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs). These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9083"/>
            <seriesInfo name="DOI" value="10.17487/RFC9083"/>
          </reference>
          <reference anchor="RFC9224" target="https://www.rfc-editor.org/info/rfc9224">
            <front>
              <title>Finding the Authoritative Registration Data Access Protocol (RDAP) Service</title>
              <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
              <date month="March" year="2022"/>
              <abstract>
                <t>This document specifies a method to find which Registration Data Access Protocol (RDAP) server is authoritative to answer queries for a requested scope, such as domain names, IP addresses, or Autonomous System numbers. This document obsoletes RFC 7484.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9224"/>
            <seriesInfo name="DOI" value="10.17487/RFC9224"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7616">
          <front>
            <title>HTTP Digest Access Authentication</title>
            <author fullname="R. Shekh-Yusef" initials="R." role="editor" surname="Shekh-Yusef"/>
            <author fullname="D. Ahrens" initials="D." surname="Ahrens"/>
            <author fullname="S. Bremer" initials="S." surname="Bremer"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) provides a simple challenge- response authentication mechanism that may be used by a server to challenge a client request and by a client to provide authentication information. This document defines the HTTP Digest Authentication scheme that can be used with the HTTP authentication mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7616"/>
          <seriesInfo name="DOI" value="10.17487/RFC7616"/>
        </reference>
        <reference anchor="RFC7617">
          <front>
            <title>The 'Basic' HTTP Authentication Scheme</title>
            <author fullname="J. Reschke" initials="J." surname="Reschke"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>This document defines the "Basic" Hypertext Transfer Protocol (HTTP) authentication scheme, which transmits credentials as user-id/ password pairs, encoded using Base64.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7617"/>
          <seriesInfo name="DOI" value="10.17487/RFC7617"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC9063">
          <front>
            <title>Host Identity Protocol Architecture</title>
            <author fullname="R. Moskowitz" initials="R." role="editor" surname="Moskowitz"/>
            <author fullname="M. Komu" initials="M." surname="Komu"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This memo describes the Host Identity (HI) namespace, which provides a cryptographic namespace to applications, and the associated protocol layer, the Host Identity Protocol, located between the internetworking and transport layers, that supports end-host mobility, multihoming, and NAT traversal. Herein are presented the basics of the current namespaces, their strengths and weaknesses, and how a HI namespace will add completeness to them. The roles of the HI namespace in the protocols are defined.</t>
              <t>This document obsoletes RFC 4423 and addresses the concerns raised by the IESG, particularly that of crypto agility. The Security Considerations section also describes measures against flooding attacks, usage of identities in access control lists, weaker types of identifiers, and trust on first use. This document incorporates lessons learned from the implementations of RFC 7401 and goes further to explain how HIP works as a secure signaling channel.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9063"/>
          <seriesInfo name="DOI" value="10.17487/RFC9063"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9560">
          <front>
            <title>Federated Authentication for the Registration Data Access Protocol (RDAP) Using OpenID Connect</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>The Registration Data Access Protocol (RDAP) provides Representational State Transfer (RESTful) web services to retrieve registration metadata from domain name and regional internet registries. RDAP allows a server to make access control decisions based on client identity, and as such, it includes support for client identification features provided by the Hypertext Transfer Protocol (HTTP). Identification methods that require clients to obtain and manage credentials from every RDAP server operator present management challenges for both clients and servers, whereas a federated authentication system would make it easier to operate and use RDAP without the need to maintain server-specific client credentials. This document describes a federated authentication system for RDAP based on OpenID Connect.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9560"/>
          <seriesInfo name="DOI" value="10.17487/RFC9560"/>
        </reference>
        <referencegroup anchor="STD90" target="https://www.rfc-editor.org/info/std90">
          <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259">
            <front>
              <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
              <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
              <date month="December" year="2017"/>
              <abstract>
                <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
                <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="90"/>
            <seriesInfo name="RFC" value="8259"/>
            <seriesInfo name="DOI" value="10.17487/RFC8259"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="STD94" target="https://www.rfc-editor.org/info/std94">
          <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949">
            <front>
              <title>Concise Binary Object Representation (CBOR)</title>
              <author fullname="C. Bormann" initials="C." surname="Bormann"/>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <date month="December" year="2020"/>
              <abstract>
                <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
                <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="94"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
          </reference>
        </referencegroup>
        <reference anchor="F3411" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3411-22A"/>
          <seriesInfo name="DOI" value="10.1520/F3411-22A"/>
        </reference>
        <reference anchor="F3548" target="https://www.astm.org/f3548-21.html">
          <front>
            <title>Standard Specification for UAS Traffic Management (UTM) UAS Service Supplier (USS) Interoperability</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3548-21"/>
          <seriesInfo name="DOI" value="10.1520/F3548-21"/>
        </reference>
        <reference anchor="F3586" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Practice for Remote ID Means of Compliance to Federal Aviation Administration Regulation 14 CFR Part 89</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3586-22"/>
          <seriesInfo name="DOI" value="10.1520/F3586-22"/>
        </reference>
        <reference anchor="ICAO-NUMBERS" target="https://www.icao.int/airnavigation/IATF/Pages/ASTM-Remote-ID.aspx">
          <front>
            <title>ICAO Remote ID Number Registry</title>
            <author>
              <organization>International Civil Aviation Organization</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="ICAO-ACCP">
          <front>
            <title>ICAO Aviation Common Certificate Policy</title>
            <author>
              <organization>International Civil Aviation Organization</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="WELL-KNOWN" target="https://www.iana.org/assignments/well-known-uris/">
          <front>
            <title>Well-Known URIs</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="MEDIA-TYPES" target="https://www.iana.org/assignments/media-types/">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="RDAP-EXT" target="https://www.iana.org/assignments/rdap-extensions/">
          <front>
            <title>RDAP Extensions</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 942?>

<section anchor="hid-abbrev">
      <name>HID Abbreviation</name>
      <t>The DET MAY be abbreviated. This is useful for display applications with limited screen real-estate as the display of the entire 128-bit (32 characters in hexadecimal, even without recommended punctuation or spacing) IPv6 address can be costly. Abbreviations SHOULD follow the following format rules.</t>
      <dl>
        <dt>Hierarchy Level:</dt>
        <dd>
          <t>Each hierarchy level (RAA/HDA) is represented by a maximum of six alphanumeric characters. This abbreviation SHOULD NOT be a single character in length, for obvious reasons of not being very useful. The decimal representation does fit into the 4 character restriction but is NOT RECOMMENDED. The RECOMMENDED abbreviation for the RAA level is to use the ISO3166-1 Alpha 2 code for nations. This abbreviation MAY be found in DNS under a HHIT RRType of the entity or its parents. If there is no abbreviation hint display devices SHOULD use a fixed size four character hexadecimal representation of the value. It is RECOMMENDED that display applications specify a default RAA value, and only display the RAA abbreviation explicitly when it does not match the default.</t>
        </dd>
        <dt>Entity Hash:</dt>
        <dd>
          <t>The entity is represented by a fixed size four character hexadecimal string using the last four characters of the DET. If a collision (within the same HID space) on display occurs, the four characters SHOULD shift to the left by one hexadecimal character until the collision is resolved. This window MUST stay within the last sixteen hexadecimal characters of the DET. The <tt>:</tt> character found in an IPv6 address string is ignored.</t>
        </dd>
      </dl>
      <ul empty="true">
        <li>
          <t>Review(SWC): Do we need to insert a flag character such as "*" to indicate when a hash has been shifted? If the abbreviation is used only to avoid conflicts, no; but if anyone actually knows some DETs in their operation, if they get shifted, they probably won't recognize them.</t>
        </li>
      </ul>
      <dl>
        <dt>Delimiter:</dt>
        <dd>
          <t>Each section is delimited by a single character. This can be any whitespace character (except newline and tab) or any non-alphanumeric character (period, comma, semicolon, etc.). It is RECOMMENDED that the delimiter is consistent between components. The RECOMMENDED delimiter is the colon (<tt>:</tt>) character.</t>
        </dd>
      </dl>
      <t>For example a DET with the values of RAA 16383 and HDA 1 without any abbreviation hint from DNS is represented by the string <tt>3FFF 0001 xxxx</tt> with <tt>xxxx</tt> representing a entity hash. If an abbreviation for the RAA (such as <tt>DRIP01</tt>) and HDA (such as <tt>TEST</tt>) are found in DNS then the DET can be represented with the string of <tt>DRIP01 TEST xxxx</tt>.</t>
      <t>For an example of the entity hash, let's assume there are two DETs with the following hashes in the same HID: <tt>0000:1111:2222:3333</tt> and <tt>0000:2222:1111:3333</tt>. At first both DETs are represented with the same abbreviation: <tt>RAA HDA 3333</tt>. One of these DETs is selected by the display application to shift the display hash one character to avoid the collision resulting in the following two abbreviations: <tt>RAA HDA 3333</tt> and <tt>RAA HDA 1333</tt>.</t>
    </section>
    <section anchor="compliance-form">
      <name>Compliance Submission Forms</name>
      <t>Author Note: talk with AS on this section</t>
    </section>
    <section anchor="csr-examples">
      <name>CSR Examples</name>
      <figure anchor="session-id-csr">
        <name>Broadcast RID Session CSR without subjectAltName</name>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE REQUEST-----
MIGaME4CAQAwGzEZMBcGA1UEBRMQMTY0OEJHRU4zVE1SMDAwMDAqMAUGAytlcAMh
AEV/gIxyi4tbRobDCu0zleb9gmQD4teLQt5FfkCey/XxoAAwBQYDK2VwA0EA3vxm
sCGt+qK39V9cfit4UptfqTd+wct7dxOgdmlYL+dTmC4HU1UaM21l0YnDP9CzoH93
4c2wzRrlB/J5BW35DQ==
-----END CERTIFICATE REQUEST-----

Certificate Request:
    Data:
        Version: 1 (0x0)
        Subject: serialNumber = 1648BGEN3TMR0000
        Subject Public Key Info:
            Public Key Algorithm: ED25519
                ED25519 Public-Key:
                pub:
                    45:7f:80:8c:72:8b:8b:5b:46:86:c3:0a:ed:33:95:
                    e6:fd:82:64:03:e2:d7:8b:42:de:45:7e:40:9e:cb:
                    f5:f1
        Attributes:
            a0:00
    Signature Algorithm: ED25519
         de:fc:66:b0:21:ad:fa:a2:b7:f5:5f:5c:7e:2b:78:52:9b:5f:
         a9:37:7e:c1:cb:7b:77:13:a0:76:69:58:2f:e7:53:98:2e:07:
         53:55:1a:33:6d:65:d1:89:c3:3f:d0:b3:a0:7f:77:e1:cd:b0:
         cd:1a:e5:07:f2:79:05:6d:f9:0d
]]></artwork>
      </figure>
      <figure anchor="session-id-csr-san">
        <name>Broadcast RID Session CSR with subjectAltName</name>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE REQUEST-----
MIHLMH8CAQAwGzEZMBcGA1UEBRMQMTY0OEJHRU4zVE1SMDAwMDAqMAUGAytlcAMh
AEV/gIxyi4tbRobDCu0zleb9gmQD4teLQt5FfkCey/XxoDEwLwYJKoZIhvcNAQkO
MSIwIDAeBgNVHREBAf8EFDAShxAgAQA//gABBS9EvMRvcVpCMAUGAytlcANBAD1O
ZBD16dCvhryQ1qIh5oh60ellac0gymi0dXt9QNZFrAEh3GoJrbpQKNcHc3SArCzJ
AgtxkmVaUz7wJ78LXgc=
-----END CERTIFICATE REQUEST-----

Certificate Request:
    Data:
        Version: 1 (0x0)
        Subject: serialNumber = 1648BGEN3TMR0000
        Subject Public Key Info:
            Public Key Algorithm: ED25519
                ED25519 Public-Key:
                pub:
                    45:7f:80:8c:72:8b:8b:5b:46:86:c3:0a:ed:33:95:
                    e6:fd:82:64:03:e2:d7:8b:42:de:45:7e:40:9e:cb:
                    f5:f1
        Attributes:
        Requested Extensions:
            X509v3 Subject Alternative Name: critical
                IP Address:2001:3F:FE00:105:2F44:BCC4:6F71:5A42
    Signature Algorithm: ED25519
         3d:4e:64:10:f5:e9:d0:af:86:bc:90:d6:a2:21:e6:88:7a:d1:
         e9:65:69:cd:20:ca:68:b4:75:7b:7d:40:d6:45:ac:01:21:dc:
         6a:09:ad:ba:50:28:d7:07:73:74:80:ac:2c:c9:02:0b:71:92:
         65:5a:53:3e:f0:27:bf:0b:5e:07
]]></artwork>
      </figure>
    </section>
    <section anchor="compliance-testing">
      <name>Compliance Testing</name>
      <t>It is the responsibility of each parent node in the tree that a child node pass functional interoperability testing prior to issuing a certificate for the child node.</t>
      <ul empty="true">
        <li>
          <t>Author: This section is a work in progress.</t>
        </li>
      </ul>
      <t>All interfaces MUST be tested on valid and invalid data (such as being malformed). When policy is required on an interface all essential permutations of the policy MUST be tested and all possible permutations SHOULD be tested. The policy engine MUST be invoked to validate proper decisions (including PERMIT and DENY or their equivalents) and actions are being made. All data returned from an interface MUST be tested to check that it conforms with specifications.</t>
      <t>There is a range in the RAA space allocated for experimentation and testing purposes. Sub-ranges can be delegated to parties, for a limited period of time, at the behest of the RAA Designated Expert, to test DIME interoperability (e.g. HDA to RAA, and RAA to RAA interactions) in any of the below subsections. The IANA Considerations section of <xref target="DET-DNS"/> contains more information on how these delegations are to be handled.</t>
      <t><xref target="compliance-form"/> provides a set of forms to be filled out and submitted as part of a CAA compliance process for using DRIP.</t>
      <figure>
        <name>System Interface Test Diagram</name>
        <artwork><![CDATA[
+-----+           +-----+
|     |           |     |
|     o----(1)--->o     |
|  X  |           |  Y  |
|     o<---(2)----o     |
|     |           |     |
+-----+           +-----+
]]></artwork>
      </figure>
      <section anchor="registration-interface">
        <name>Registration Interface</name>
        <t>X, Y pairs: (registrant, HDA), (HDA, RAA)</t>
        <t>1: Ensure that endpoints on Y can be accessed according to Y's policy by X. Ensure that the endpoints conform to the normative requirements of Test that Y interface properly handles valid and malformed data. Test that Y securely generates proper artifacts and stores them.</t>
        <t>2: Ensure that the interactions for (1) properly returns data to X from Y. This data MUST include the Broadcast Endorsements, X.509s and any other data elements required.</t>
      </section>
      <section anchor="public-query-interface">
        <name>Public Query Interface</name>
        <t>X, Y pairs: (UAS Observer, HDA), (UAS Observer, RAA), (HDA, RAA), (RAA, HDA), (HDA, HDA'), (RAA, RAA')</t>
        <t>1: Ensure that Y has a properly configured and publicly accessible Authoritative Name Server for its delegated <tt>ip6.arpa</tt> domain.</t>
        <t>2: Ensure that Y returns the valid RRTypes defined in <xref target="DET-DNS"/> to X based on an <tt>ip6.arpa</tt> query via standard DNS methods (i.e. using UDP on port 53). Ensure that the HHIT RRType contains the correct Certificate with an URI.</t>
      </section>
      <section anchor="private-query-interface">
        <name>Private Query Interface</name>
        <t>X, Y pairs: (UAS Observer, HDA), (UAS Observer, RAA), (HDA, RAA), (RAA, HDA), (HDA, HDA'), (RAA, RAA')</t>
        <t>1: Ensure that the provide URI from the public query interface points to a valid URI. Ensure that the endpoint on Y has proper AAA mechanisms as defined in this document and enforces the proper policy options.</t>
        <t>2: Ensure that the Y endpoint securely returns the data expected according to policy (matrix of authorized, valid request, unauthorized and invalid request) to X.</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
