<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wiethuechter-drip-det-tada-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="det-tada">Registration &amp; Usage of DRIP Entity Tags for Trustworthy Air Domain Awareness</title>
    <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-det-tada-01"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <city>Oak Park</city>
          <region>MI</region>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="02"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 143?>

<t>This document standardizes usage of Drone Remote Identification Protocol (DRIP) Entity Tags (DETs) as identifiers to enable trustworthy Air Domain Awareness (ADA) for Unmanned Aircraft Systems (UAS) in Remote Identification (RID), UAS Traffic Management (UTM) and Advanced Air Mobility (AAM). DETs can serve as Session IDs for privacy, Authentication Key IDs for accountability, and encryption key IDs for confidentiality.</t>
    </abstract>
  </front>
  <middle>
    <?line 147?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="purpose">
        <name>Purpose</name>
        <t>This document provides to stakeholders in a National Airspace System (NAS), such as a Civil Aviation Authority (CAA) and its constituents, a point of entry into a set of relevant standards. These standards provide guidance to enable trustworthy Air Domain Awareness (ADA) primarily via cooperative technologies. Such technologies can include, but are not limited to, Unmanned Aircraft (UA) Systems (UAS) Remote Identification (RID), UAS Traffic Management (UTM) and Advanced Air Mobility (AAM).</t>
        <t>This document specifies an interoperable manner of achieving the stated objectives in an international context to be used by CAAs in a relevant Means of Compliance (MOC). One such MOC is ASTM <xref target="F3586"/> for UAS RID to comply with the United States (US) CAA regulations.</t>
        <t>A CAA MAY override any technical specification in this document but MUST, if claiming compliance with this document, provide the reason and an alternative specification satisfying the same objective.</t>
      </section>
      <section anchor="background">
        <name>Background</name>
        <t><xref target="RFC9153"/> provides comprehensive background on the UAS RID use-case and the UTM/AAM context.</t>
        <t>Trustworthiness revolves around identification and authentication. <xref target="RFC9374"/> defines the Drone Remote Identification Protocol (DRIP) Entity Tag (DET), a trustable identifier backed by asymmetric cryptography. <xref target="RFC9575"/> standardizes authentication of DETs and associated information using strong cryptography suited for constrained mobile wireless links (typical of Broadcast RID). Broadcast and Network RID are defined by ASTM <xref target="F3411"/> which designates the  International Civil Aviation Organization (ICAO) to maintain code-points for Specific Session ID Types and Specific Authentication Methods (SAMs) <xref target="ICAO-NUMBERS"/>. ICAO includes DETs as a Specific Session ID Type and lists the four DRIP SAMs.</t>
        <t>DETs generated by registrants (typically a UAS Operator or UAS) are merely proposed until they are registered within the hierarchy consisting of at least two levels above the leaf DET: Registered Assigning Authority (RAA) and Hierarchial Host Identity Tag (HHIT) Domain Authority (HDA). The registry system, made up of DRIP Identity Management Entities (DIMEs) acting as either RAAs or HDAs, ensures uniqueness within the hierarchy, endorses inclusion through X.509 certificates, and provides access to public and private information associated with a DET registration. Public information is served using the Domain Name System (DNS) and is specified in <xref target="DET-DNS"/>. Private information, such as Personally Identifiable Information (PII), is served using the Registration Data Access Protocol (RDAP, <xref target="STD95"/>) and protected through policy based differentiated access.</t>
        <t>This document specifies fundamental registration processes and interactions surrounding the Private Information Registry function defined in the DRIP Architecture (<xref target="RFC9434"/>).</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>Participating entities are assumed in this document to be in compliance with relevant existing UAS standards such as ASTM <xref target="F3411"/>, <xref target="F3548"/> and <xref target="ICAO-ACCP"/>.</t>
        <t>This document governs use of a DET in the following cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>An entity that uses a Session ID (some participating entities, e.g. HDAs, may not need Session IDs), MUST use a DET for that Session ID.</t>
          </li>
          <li>
            <t>An entity that participates in DRIP interactions (even if not needing a Session ID), MUST use a DET for the DRIP public authentication key ID in those interactions.</t>
          </li>
          <li>
            <t>An entity that requires a strongly cryptographically verifiable IP compatible identifier, MAY use a DET for any other legal purpose.</t>
          </li>
          <li>
            <t>An entity SHOULD NOT use a DET as a locator in physical or logical space (e.g. as a globally routable IPv6 address outside of an overlay network), as deconflation is intended, see <xref target="RFC9063"/>.</t>
          </li>
        </ol>
        <t>The archetypal case is a UAS for which the DET serves as both the UAS ID (first case above) and the Authentication Key ID (second case).</t>
        <ul empty="true">
          <li>
            <t>Author Note: narrow context for at least first bullet above.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <section anchor="additional-definitions">
        <name>Additional Definitions</name>
        <t>This document makes use of terms (PII, USS, etc.) defined in <xref target="RFC9153"/>, <xref target="RFC9434"/> and <xref target="RFC9374"/>. For convenience of the reader, some of the major definitions are restated here.</t>
        <dl>
          <dt>DRIP Identity Management Entity (DIME):</dt>
          <dd>
            <t>Originally defined in <xref target="RFC9434"/> and expanded technically in <xref target="DET-DNS"/>. An entity providing registrar and registry services specifically for DETs. They can act as either an Registered Assigning Authority (RAA) or Hierarchial Host Identity Tag (HHIT) Domain Authority (HDA).</t>
          </dd>
          <dt>Web Token:</dt>
          <dd>
            <t>In the context of this specification; a Web Token can be either a Concise Binary Object Representation (CBOR, <xref target="STD94"/>) Web Token (CWT, <xref target="RFC8392"/>) or JavaScript Object Notation (JSON, <xref target="STD90"/>) Web Token (JWT, <xref target="RFC7519"/>).</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="interactions-responsibilities">
      <name>Interactions &amp; Responsibilities</name>
      <t>This section outlines the various entity roles in the ecosystem. For each, it summarizes motivations for participating in that DRIP role, as well as the interactions and responsibilities they have in doing so. All entity roles, except as otherwise noted, MUST register a DET with a parent entity in the corresponding parental role (e.g. an HDA must register with an RAA), as per <xref target="registration"/>, and MUST use it subsequently in all DRIP interactions requiring an entity ID.</t>
      <section anchor="uas-observers">
        <name>UAS Observers</name>
        <t>An Observer is typically an individual who has a device capable of wirelessly receiving Broadcast RID whether it be an opportunistic passerby with a local-only (i.e. non-Internet connected) smartphone application or a widely deployed sensing system with various IP-based back-hauls. Each has their own motivations for detecting a UAS in their area and querying for additional information. Typically in DRIP, Observers are expected to use DNS (when able) to obtain at least the public keys of unknown DETs and use it to validate signatures found in ASTM <xref target="F3411"/> Authentication Messages. Some Observers may be granted, by cognizant authorities, authorization to perform more detailed queries of further information, that is considered private (as not explicitly classified as public, placed in DNS, and/or transmitted in cleartext in Broadcast RID).</t>
        <ul empty="true">
          <li>
            <t>Author Note:  Broadcast RID here can be dropped or substituted for some phrase comparing Observers to a sensor head, but distinct from a Display-only Observer. If that makes sense and if it is a good distinction to have? One could say Display Applications are in a way Observers (albeit very far removed from the field in most cases where the term is used). Unless we make them their own class of users that could use DETs (and for what?)</t>
          </li>
        </ul>
        <t>All Observers supporting DRIP:</t>
        <ul spacing="normal">
          <li>
            <t>MUST adhere to relevant details of <xref section="6.4.2" sectionFormat="of" target="RFC9575"/> with regards to receive processing of DRIP SAMs.
            </t>
            <ul spacing="normal">
              <li>
                <t>Processing of SAMs MAY be deferred or outsourced to a dedicated system.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>RECOMMEND display all DETs following <xref target="RFC5952"/> or as described in <xref target="hid-abbrev"/>.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Author Note: as justification for "processing MAY be deferred": Intention here was to allow for Observers not needing to fully process data if desired and push said processing to SDSPs. An example is a slim Finder concept that does no parsing of RID data, just extraction out of transport framing.</t>
          </li>
        </ul>
        <t>Observers authorized by cognizant authorities to access any private (in addition to all public) information recorded as part of the registration process also:</t>
        <ul spacing="normal">
          <li>
            <t>MUST support RDAP authentication/authorization mechanisms allowed by the cognizant authority.
            </t>
            <ul spacing="normal">
              <li>
                <t>Those RECOMMENDED for global harmonization are identified in <xref target="diff-access"/>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>MUST register to authentication systems as required by the cognizant authority.
            </t>
            <ul spacing="normal">
              <li>
                <t>A DIME MAY be used as part of an authentication system.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="uas-operators">
        <name>UAS Operators</name>
        <t>UAS Operators is used herein as a catch-all term for several more specific UAS related roles: Remote Pilot, Pilot In Command (PIC), party (typically an organization) to whom or which the UAS is registered with the cognizant CAA, etc. DRIP does not attempt to clarify the definition of Operator to match any specific CAA, instead using the ambiguity to group these roles based on their similar DRIP interactions.</t>
        <t>A UAS Operator's desire to use DETs can be any number of the following operational factors:</t>
        <ul spacing="normal">
          <li>
            <t>Confidentiality of flights through Session IDs.</t>
          </li>
          <li>
            <t>Privacy of Remote Pilots by encrypting their Ground Control Station (GCS) position.
            </t>
            <ul spacing="normal">
              <li>
                <t>This option may be constrained by their jurisdiction's RID regulations.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Reputation of their UAS based on observation and reports of behavior supported by Authentication.</t>
          </li>
        </ul>
        <t>To participate a UAS Operator SHOULD use a DET, registered either with an RAA or HDA, as part of any interactions in DRIP, such as registering a UAS Session ID for their UA. A UAS Operator MAY use another cryptographic scheme for interactions but it MUST be asymmetric with their public key accessible to all domain participants via a standardized method for the cryptographic purpose of signature verification.</t>
      </section>
      <section anchor="uas-manufacturers">
        <name>UAS Manufacturers</name>
        <t>While UAS Manufactures do not have a direct requirement for DRIP, they typically wish to maintain good reputation of their brands and are often driven by market forces. Such forces include requirements and preferences of both UAS Observers and Operators.</t>
        <t>This document assumes a UAS Manufacturer is already in compliance with ASTM <xref target="F3411"/>. Thus those that wish to support DRIP also:</t>
        <ul spacing="normal">
          <li>
            <t>MUST provide a mechanism, typically through a GCS, to generate and register a DET for use as either a Session ID, Authentication Key ID or both.
            </t>
            <ul spacing="normal">
              <li>
                <t>MUST bind DET to both UAS Serial Number and Operator. Binding MAY be indirect if system can verify Serial Number already registered to Operator.</t>
              </li>
              <li>
                <t>SHOULD be issued in a manner that keeps private key ONLY ever on UA, does not expose it to GCS etc., but MAY be done in manner that exposes it to GCS or Operator if necessary.</t>
              </li>
              <li>
                <t>SHOULD allow user selection of a parent DIME (typically HDA) using a URI, Hierarchy ID (HID) value, or both</t>
              </li>
              <li>
                <t>MAY support registering multiple DETs in a batch transaction</t>
              </li>
            </ul>
          </li>
          <li>
            <t>SHOULD provide a mechanism to enable, during registration, subsequent encryption of selected fields (e.g. pilot/GCS location), only if the CAA allows it.</t>
          </li>
          <li>
            <t>MUST follow <xref section="6" sectionFormat="of" target="RFC9575"/> as it relates to transmission of SAMs, when using DET as an Authentication Key ID</t>
          </li>
          <li>
            <t>MUST, in the <xref target="F3411"/> Basic ID Message, set the UAS ID Type to Specific Session ID, Specific Session ID Type to DRIP Entity ID, and encode the DET in network byte order, when using DET as a UAS Session ID</t>
          </li>
          <li>
            <t>MAY use a DET, following <xref section="4.2" sectionFormat="of" target="RFC9374"/>, as a UAS Serial Number
            </t>
            <ul spacing="normal">
              <li>
                <t>It is expected that the UAS Manufacturer runs their own HDA, under which these DETs are registered</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="hda-operators">
        <name>HDA Operators</name>
        <t>In the UTM context, it is expected that the HDA function will be provided by a UAS Service Supplier (USS) to its clients (e.g. UAS Operators). This can be in-house or out-sourced to a service bureau more specialized in cryptographically verifiable identifiers usable to access data and systems on networks. Outside the UTM context, an HDA can be a stand-alone provider to any registrant desiring a DET, or more generally HHIT.</t>
        <t>Being associated with a USS has some operational benefits:</t>
        <ul spacing="normal">
          <li>
            <t>Ease for UAS Operators to use both Session IDs and UTM together</t>
          </li>
          <li>
            <t>Binding between the DET and Operational Intent
            </t>
            <ul spacing="normal">
              <li>
                <t>Enables safer use of encryption</t>
              </li>
              <li>
                <t>Ability to keep DET private until just before an operation goes active</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>An HDA Operator:</t>
        <ul spacing="normal">
          <li>
            <t>MUST register, with its parent RAA, one or more DETs, and use it or them in DRIP interactions</t>
          </li>
          <li>
            <t>MUST implement interfaces and functions described in <xref target="dime-operation"/></t>
          </li>
          <li>
            <t>MUST maintain DET registrations with relevant PII as required by their jurisdiction</t>
          </li>
          <li>
            <t>MUST fulfill the requirements of their jurisdiction</t>
          </li>
          <li>
            <t>SHOULD NOT provide to clients the ability to enable encryption of data elements considered PII, especially in Broadcast RID</t>
          </li>
        </ul>
        <t>As part of a USS an HDA Operator also:</t>
        <ul spacing="normal">
          <li>
            <t>MAY provide encryption ID services, if allowed by jurisdiction</t>
          </li>
          <li>
            <t>MAY have its registration interfaces (<xref target="registration"/>) be integrated into relevant USS interfaces and functions</t>
          </li>
          <li>
            <t>SHOULD defer the publishing of a client DET in DNS when it is bound with an Operational Intent until it is "active"
            </t>
            <ul spacing="normal">
              <li>
                <t>Methods to sync an Operational Intent in a USS state and DET state in HDA are out of scope for this document</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="raa-operators">
        <name>RAA Operators</name>
        <t>In the context of this document, RAA Operators are typically CAAs or other cognizant authorities of a Nation State. Each Nation State is allocated four RAA values that are used at their discretion. To obtain these allocations, a Nation State contacts the Apex operator for the UAS or other applicable hierarchy, currently IANA on behalf of ICAO, requesting their provisioning providing any details required by the Apex Operator to configure domain delegations.</t>
        <t>Each RAA has the responsibility to delegate HDAs under them. Allocation methods of HDA values are at the discretion of the RAA Operator and their policies. Any requirements to operate under an RAA, beyond those as defined in this document to operate as an HDA, are out of scope for this document.</t>
        <t>An RAA Operator:</t>
        <ul spacing="normal">
          <li>
            <t>MUST obtain an RAA value(s) from the Apex Operator and provide content for NS RRType(s), see <xref target="ic"/></t>
          </li>
          <li>
            <t>MUST register, with its parent (if any), one or more DETs, and use it or them in DRIP interactions</t>
          </li>
          <li>
            <t>MUST implement interfaces and functions described in <xref target="dime-operation"/></t>
          </li>
          <li>
            <t>MUST maintain DET registrations with relevant PII as required by their jurisdiction</t>
          </li>
          <li>
            <t>MUST provide requirements for prospective HDA Operators, and SHOULD do so publicly via an easily located web site</t>
          </li>
          <li>
            <t>MUST ensure HDA Operator compliance with this specification</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Author Note: subsection or appendix on a potential RAA scheme for CAA? i.e. 1x MIL, 1x GOV, 1x COMMERCIAL, 1x SPARE with some example guidance on HDA allocation?</t>
          </li>
        </ul>
      </section>
      <section anchor="apex-operators">
        <name>Apex Operators</name>
        <t>The Apex role is the administration root and the domain apex for a specific IPv6 prefix which are typically associated with an industry sector (i.e. DETs being for aviation). This translates to the technical tasking of delegating RAA values and maintaining the reverse DNS zone associated with the allocated IPv6 prefix which contain the DNS delegations to RAAs. An Apex in its capacity as the administration root MAY endorse the required RAA delegation in the hierarchy.</t>
        <t>Currently IANA performs the functions of RAA delegation (with no endorsement) and DNS zone maintenance for the DET prefix. This is largely a custodial task as critical portions of the RAA range, with regards to aviation, are already reserved or allocated with the rest of the range unassigned.</t>
        <t>In the context of aviation pre-allocated RAAs to CAAs are currently expected to mutually cross-certify as specified in <xref target="ICAO-ACCP"/>.</t>
      </section>
    </section>
    <section anchor="dime-operation">
      <name>Requirements for DIME Operation</name>
      <t>The requirements below apply to both RAA and HDA Operators with a focus on how HDA Operators provide registration and related services for their clients (i.e. UAS Operators and their UAS). All data models are represented in this document using the Concise Data Definition Language (CDDL, <xref target="RFC8610"/>) using the prelude defined in <xref section="E" sectionFormat="of" target="RFC8610"/> as well as an additional DRIP-specific prelude defined in <xref target="cddl-prelude"/>.</t>
      <section anchor="uas-model">
        <name>Common UAS RID Data Model</name>
        <t>A common data model is specified by DRIP for various UAS RID elements typically transmitted over ASTM <xref target="F3411"/>.</t>
        <t>The field names and their general typing of <xref target="rid-model"/> are borrowed from the ASTM <xref target="F3411"/> data dictionary (Table 1 and Table 2). See that document for additional context and background information on aviation application-specific interpretation of the field semantics. The contents of this model are considered opaque to DRIP.</t>
        <t>The model is an expansion upon the BRID RRType model, which only contained static data, defined in <xref section="5.2" sectionFormat="of" target="DET-DNS"/>.</t>
        <figure anchor="rid-model">
          <name>Common UAS RID CDDL</name>
          <artwork><![CDATA[
uas-datum = {
  ? timestamp => utc,
  ? uas_type => 0..15,
  ? uas_ids => [
    + [
      id_type: 0..15,
      uas_id: uas-id
    ]
  ],
  ? ua_status => 0..15,
  ? ua_position => [
    lla: position, 
    barometric_altitude: number / null
  ],
  ? ua_bearing => uint,
  ? ua_speed => [
    vertical: number / null,
    horizontal: number / null
  ],
  ? ua_height => [
    agl: bool, 
    height: number
  ],
  ? accuracy => [
    vertical: 0..15,
    horizontal: 0..15,
    altitude: 0..15,
    barometric: 0..15,
    timestamp: 0..15
  ],
  ? auth => [
    + [
      auth_type: 0..15,
      data: auth-data
    ]
  ],
  ? self_id => [
    desc_type: 0..255, 
    desc: tstr .size 23
  ],
  ? operator_position => position,
  ? classification => [
    region: 0..8,
    category: 0..15,
    class: 0..15
  ],
  ? area => [
    count: 1..255,
    radius: number,
    floor: number,
    ceiling: number
  ],
  ? operator_id => [
    operator_type: 0..255,
    operator_id: tstr .size 20
  ],
  ? compliance => [+ uint]
}
]]></artwork>
        </figure>
        <t>The mapping between JSON keys (as strings) and CBOR keys (as unsigned integers) for <xref target="rid-model"/> are defined in <xref target="drip-keys"/>.</t>
        <ul empty="true">
          <li>
            <t>Author Note: do we specify the enumeration for compliance in this document? Is it an IANA registry?</t>
          </li>
        </ul>
      </section>
      <section anchor="registration">
        <name>Registration</name>
        <t>This section defines the interaction model, data models and methods for registration of a DET into a DIME for global interoperability. Standardization of additional methods and data models to register to a DIME (DETs or otherwise) is out of scope for this document.</t>
        <section anchor="disclaimer">
          <name>Disclaimer</name>
          <t>DRIP does NOT provide protection against incorrect (e.g. fraudulent) data entered during registration or asserted subsequently. DRIP does protect against alteration (intentional or unintentional) of data subsequent to its assertion by the cryptographic signer. The signer might be the proximate sender (e.g. UA transmitting Broadcast RID) or might be an attestor far away and long ago (e.g. root Certificate Authority). It is the duty of the operator of each DIME, or the party on whose behalf the DIME is being operated, to validate the registration data. The RAA (e.g. CAA) SHOULD provide services to obtain this goal, see <xref target="raa-oracle"/>.</t>
        </section>
        <section anchor="interaction-model">
          <name>Interaction Model</name>
          <t>Registration of DETs uses the interaction model shown in <xref target="det-reg-z"/>.</t>
          <figure anchor="det-reg-z">
            <name>Simplified DET Registration Z-Diagram</name>
            <artwork align="center"><![CDATA[
            registrant             dime
                |                   |
(0) GEN_DET/HI  |                   |
(1) GEN_CSR     |                   |
                |----(2) INPUT----->|
                |                   | (3) VALID_INPUT?
                |<-------FAIL-------|
                |                   | (4) DUPE_HI?
                |<-------FAIL-------|
                |                   | (5) DUPE_DET?
                |<-------FAIL-------|
                |                   | (6) GEN_CERTS
                |                   | (7) UPDATE_DATABASE
                |                   | (8) UPDATE_NS
                |<----(9) OUTPUT----|
]]></artwork>
          </figure>
          <dl>
            <dt>(0) GEN_DET/HI:</dt>
            <dd>
              <t>The registrant that plans to use the identity and its cryptographic properties SHOULD generate the asymmetric key-pair of their choosing and MUST protect the private key with Best Current Practices. The registrant MAY derive the corresponding DET. How the registrant obtains the desired HID for DET generation is out of scope for this document.</t>
            </dd>
            <dt>(1) GEN_CSR:</dt>
            <dd>
              <t>The registrant MUST generate a Certificate Signing Request (CSR) for their HI/DET. See <xref target="dkix-csr"/> for more details.</t>
            </dd>
            <dt>(2) INPUT:</dt>
            <dd>
              <t>The registrant MUST format and send the required information for a given service registration as specified by the DIME using <xref target="registration-methods"/>.</t>
            </dd>
            <dt>(3) VALID_INPUT?:</dt>
            <dd>
              <t>The DIME, upon receipt of service registration inputs, MUST validate the input data. This may be simply performing syntax checks to ensure the data is properly formatted all the way to full semantic validation (see <xref target="raa-oracle"/>). Signed data MUST have their signatures verified before further processing. Failure of input validation SHOULD returns errors to the registrant.</t>
            </dd>
            <dt>(4) DUPE_HI?:</dt>
            <dd>
              <t>The DIME MUST check that the proposed HI is not a already in use within the specified HID scope. The registrant SHOULD be notified with an error if duplication is detected.</t>
            </dd>
            <dt>(5) DUPE_DET?:</dt>
            <dd>
              <t>The DIME MUST check that the proposed DET, derived from the HI, is not a already in use within the specified HID scope. If the registrant proposed a DET with HID outside that of the DIME, it MUST be rejected. If the registrant only provided the HI, the DIME MUST generate the DET using the HID for which that DIME is authoritative. The registrant SHOULD be notified with an error if duplication is detected.</t>
            </dd>
            <dt>(6) GEN_CERTS:</dt>
            <dd>
              <t>The DIME, after all the above validation, MUST generate a Broadcast Endorsement using the provided HI and DET from the registrant as the evidence. This Endorsement is used in <xref target="RFC9575"/>. The DIME MUST also generate a corresponding X.509 certificate as per <xref target="canonical-cert"/>, confirming that the DIME has accepted the registrant's DET/HI pair for registration. Other Certificates MAY be generated during registration but are out of scope for this document.</t>
            </dd>
            <dt>(7) UPDATE_DATABASE:</dt>
            <dd>
              <t>The DIME MUST update the Private Information Registry with all registration data required by the jurisdiction or the DIME's own policy, typically including PII, all of which must be protected by AAA as per applicable regulation and policy. It MAY include additional metadata or public information. How the Private Information Registry is updated is out of scope for this document.</t>
            </dd>
            <dt>(8) UPDATE_NS:</dt>
            <dd>
              <t>The DIME MUST update the Authoritative Name Server with any public information that was part of the registration. This information MUST be stored as described in <xref target="DET-DNS"/>.</t>
            </dd>
            <dt>(9) OUTPUT:</dt>
            <dd>
              <t>The DIME, upon successful updates of the Private Information Registry and Authoritative Name Server, responds according to <xref target="registration-methods"/>.</t>
            </dd>
          </dl>
        </section>
        <section anchor="registration-methods">
          <name>Interface &amp; Encoding</name>
          <t>Registration request and response data MUST be encapsulated in a Web Token (either CWT <xref target="RFC8392"/> or JWT <xref target="RFC7519"/>). For Session IDs and Authentication Key IDs the registrant usually is the Operator (or a proxy for the Operator such as the GCS) but MAY be the UA directly if the UA has a long term cryptographic identity.</t>
          <t>The method for a registrant to find a DIME is out of scope for this document. DIMEs MUST use <xref target="RFC8615"/> to provide DRIP-related interfaces and perform redirects to the relevant URIs. DIME registration endpoints MUST use POST expecting a Web Token from registrants. During a request a registrant MUST encrypt the Web Token in accordance with PRIV-2 of <xref section="4.3.1" sectionFormat="of" target="RFC9153"/> as during a request it typically includes PII. An example is shown in <xref target="api-request"/>.</t>
          <ul empty="true">
            <li>
              <t>Author Note: <tt>/.well-known/</tt> could be a single URI like <tt>register-hhit</tt> or more specific ones like <tt>uas-operator</tt> and <tt>uas-session</tt>. Do we have a preference?</t>
            </li>
          </ul>
          <figure anchor="api-request">
            <name>Example REST Registration API (request)</name>
            <artwork><![CDATA[
POST /.well-known/register-hhit HTTP/1.1
Host: uss.example.com
Accept: application/drip+cwt, application/drip+jwt
Content-Type: application/drip+cwt
Content-Length: <CWT length>

[ CWT from registrant ]
]]></artwork>
          </figure>
          <t>The DIME responds, upon successful registration, with their own Web Token contain the data model defined in <xref target="resp-model"/>. The Web Token SHOULD be encrypted, if containing any PII. An example is shown in <xref target="api-response"/>.</t>
          <figure anchor="api-response">
            <name>Example REST Registration API (response)</name>
            <artwork><![CDATA[
HTTP/1.1 200 OK
Accept: application/drip+cwt, application/drip+jwt
Content-Type: application/drip+cwt

[ CWT from DIME ]
]]></artwork>
          </figure>
          <t>This document allocates <tt>application/drip+cwt</tt>, <tt>application/drip+jwt</tt> and <tt>application/drip</tt> to the Media Types registry. It also allocates <tt>register-hhit</tt> to the <tt>/.well-known/</tt> registry.</t>
          <section anchor="coap">
            <name>Using CoAP for Registration</name>
            <t>Support of the Constrained Application Protocol (CoAP, <xref target="RFC7252"/>) is OPTIONAL.</t>
            <t>When using CoAP, DTLS SHOULD be used when possible and MUST send the data models (<xref target="reg-model"/> and <xref target="resp-model"/>) encoded as CBOR. When DTLS is not possible, and CoAP is instead used with UDP, model data MUST be encapsulated, signed and encrypted in a CWT as above.</t>
          </section>
          <section anchor="guidance-on-registration-errors">
            <name>Guidance on Registration Errors</name>
            <t>The following registration failure conditions and response are informative:</t>
            <ul spacing="normal">
              <li>
                <t>Upon invalid input from the registrant, the DIME SHOULD respond with either 400 (Bad Request) or 403 (Forbidden) as appropriate.</t>
              </li>
              <li>
                <t>Upon a duplicate HI or DET, the DIME SHOULD respond with 409 (Conflict).</t>
              </li>
              <li>
                <t>Any other processing failure of registration by a DIME SHOULD be responded with an appropriate Server Error status code.</t>
              </li>
            </ul>
            <t>Care should be given when responding with 403 (Forbidden) to not expose any information that could be used to socially engineer a fake request. For example, when following <xref target="raa-oracle"/>, it would be unwise for the HDA to detail an exact reason for the rejection. A malicious registrant could spam the endpoint, farming information on what UAS Serial Numbers, Operator IDs and their potential bindings exist to exploit.</t>
            <t>It should be noted that the above would be avoided with properly configured systems since signature validation and denial of service mitigations would be before the HDA even attempts to ascertain validation from the RAA.</t>
          </section>
        </section>
        <section anchor="reg-model">
          <name>Registration Model</name>
          <t>The data sent to the DIME for a given registration is policy driven. For example a Session ID registration SHOULD include a CAA specific identifier of the Operator to enable the private binding of the Session ID to both the Serial Number (found in the CSR, <xref target="dkix-csr"/>) but also the Operator themselves.</t>
          <figure anchor="reg-cddl">
            <name>Registration Model CDDL</name>
            <artwork><![CDATA[
registration-content = {
  csr_list: [
    + csr: [
      idx: hash,
      entity_type: uint,
      csr: x509,
      vnb: utc / null,
      vna: utc / 1..15638400 / null,
      meta: { metadata } 
    ]
  ],
  metadata
}
]]></artwork>
          </figure>
          <t>The data model defined in <xref target="reg-cddl"/> is what is minimally required for a DIME to be functional. Additional fields SHOULD be registered to IANA under <xref target="drip-keys"/> for global harmonization. RAAs and HDAs MAY use their respective keys and their associated maps to define additional keys to be included in a registration. A dedicated Private Use space is provided for RAAs and HDAs to define keys and their uses.</t>
          <t>The <tt>uas</tt> map item uses the data model found in <xref target="uas-model"/> to carry any static information expected to also be found over Broadcast RID. It MUST NOT include in the <tt>uas_ids</tt> key the UAS Serial Number when a Session ID is being registered. It also MUST NOT contain the <tt>operator_location</tt> key, as this information is usually considered PII and typically is dynamic or unknown at time of registration. The DIME MUST fill in the <tt>auth</tt> key with any SAMs related to a registration and place the data model into DNS with <xref section="5.2" sectionFormat="of" target="DET-DNS"/> when the registrant entity is required to use Broadcast RID and expecting to use <xref target="RFC9575"/>.</t>
          <t>The registrant can select from a number of options to encode the values of valid not before (<tt>vnb</tt>) and valid not after (<tt>vna</tt>) for time of applicability of an individual CSR (<tt>csr-data</tt>). The use of the <tt>time</tt> or <tt>tdate</tt> types allow for absolute time references. The use of the <tt>uint</tt> type for <tt>vna</tt> specifies a positive offset in seconds from an absolute time. When <tt>null</tt> is used the registrant is informing the DIME that for <tt>vnb</tt> the DIME MUST use the current time as <tt>vnb</tt> during registration and for <tt>vna</tt> the DIME MUST set <tt>vna</tt> to a time such that the default DIME policy for maximum delta between <tt>vnb</tt> and <tt>vna</tt> is not exceeded.</t>
          <ul empty="true">
            <li>
              <t>Implementation Note: due to not differentiating between integers and floats in its number type, implementations using JSON as the encoded format MUST check the value of <tt>vna</tt> to determine if its being used as an offset or absolute time.</t>
            </li>
          </ul>
          <t>As an example of the use of <tt>vnb</tt> and <tt>vna</tt>, a registrant may set <tt>vnb=null</tt> and <tt>vna=3600</tt>. The DIME in this instance would use the current absolute time at receipt of the registration request for <tt>vnb</tt> and then apply the offset specified by <tt>vna</tt> to obtain an absolute time for <tt>vna</tt> that is 3600 seconds after <tt>vnb</tt>. These absolute times of <tt>vnb</tt> and <tt>vna</tt> are then used in the certificate being created by the DIME to endorse the registration <xref target="canonical-cert"/>.</t>
          <section anchor="raa-oracle">
            <name>Validating Fields</name>
            <t>In certain circumstances field contents may only be properly validated by other entities outside of DRIP. For example the binding between UAS Serial Number and Operator ID should already be known by the CAA, as typically this information is required out of band of DRIP directly to the CAA in some form. The CAA should provide or itself have access to an "oracle" that can validate these claimed bindings for registration to proceed. If such an "oracle" is not consulted there is a risk that information being registered is fraudulent and DRIP has no method or authority to confirm the claims. If such information is accepted, future information queries by authorities can result in bogus data being returned, with no binding to an actual UAS or Operator.</t>
            <t>The CAA SHOULD, as part of its capacity as an RAA onboarding an HDA, provide data models, communication framework and any authentication mechanisms to query the oracle directly if the CAA allows HDAs to perform the queries themselves. Otherwise the RAA MUST provide an HTTPS POST interface that consumes a Web Token generated by the HDA containing the registrant Web Token. If the RAA is not configured or does not wish to handle such requests it MUST respond with 501 (Not Implemented), HDAs should proceed without validation as if validation was successful.</t>
            <t>If the RAA is configured to validate registration requests, it sends the data to the "oracle", via a mechanism out of scope for this document. When the "oracle" marks data as invalid the RAA MUST signal to the HDA that the registration is to be denied. Otherwise the RAA returns a Web Token to the HDA containing an X.509 Certificate with the Subject set to the same contents as the registrant CSR.</t>
          </section>
        </section>
        <section anchor="resp-model">
          <name>Response Model</name>
          <figure anchor="resp-cddl">
            <name>Response Model CDDL</name>
            <artwork><![CDATA[
response-content = [
  + [
    idx: hash,
    entity_type: uint,
    certs: {
      canonical_cert: x509,
      ? be_chain: [+ be: endorsement],
      * &(tstr , int) => any
    }
  ]
]
]]></artwork>
          </figure>
          <t>The <tt>canonical_cert</tt> key MUST be the certificate defined in <xref target="canonical-cert"/>. The <tt>be_chain</tt> contains the Broadcast Endorsement structures defined in <xref section="4.1" sectionFormat="of" target="RFC9575"/> and MAY not be sent by the DIME if the registrant is not expected to use Broadcast RID.</t>
          <t>Additional items MAY be sent back to the registrant by the DIME. Their keys SHOULD be registered under IANA as part of <xref target="drip-keys"/> to support global harmonization.</t>
          <section anchor="canonical-cert">
            <name>Canonical Registration Certificate</name>
            <t><xref target="dkix"/> provides profiles for X.509 certificates adhering to the <xref target="ICAO-ACCP"/>, developed by the Trust Framework Panel. At least one of the DRIP profiles MUST be used.</t>
            <t>At least one certificate in the chain from an apex node to a leaf node MUST contain a URI, as part of the Subject Alternative Name Extension <xref target="RFC5280"/>, which points to the relevant Private Information Registry containing associated PII registered. This certificate MUST be contained in the HHIT RRType defined in <xref section="5.1" sectionFormat="of" target="DET-DNS"/>. The certificate MAY be anywhere on the path and SHOULD be as close to the apex in the path as possible for efficiency.</t>
            <t>At the time of publication, the current best practice is for the HDA Issue certificate to contain the base URI to be used for all Private Information Registry requests under the HDA. When an HDA supports multiple Private Information Registry providers, it SHOULD set the appropriate URI in the Operational certificate. The HDA MAY either set all different URIs together in its HDA Issue certificate at cost of the querent being then required to perform queries at each provided URI until it receives a response or use different Issuer DETs for each different Private Information Registry provider.</t>
            <t>When registering a DET to be used as a Session ID, the CSR <xref target="dkix-csr"/> MUST contain the UAS Serial Number as the Subject, and the certificate placed in the private registry also MUST contain the UAS Serial Number as the Subject, but the certificate placed in the public registry and used as the basis of the Broadcast Endorsement (or otherwise exposed publicly) MUST NOT contain the UAS Serial Number.</t>
          </section>
        </section>
      </section>
      <section anchor="query">
        <name>Query</name>
        <t>A DIME has two query interfaces it MUST support. One interface is used for public information and the other (discoverable from public information) is for private information.</t>
        <section anchor="pub-info-reg">
          <name>Public Information Registries</name>
          <t>The information found in these registries has been designated (explicitly or implicitly) as public by cognizant authority and/or the information owner. Such information includes asymmetric cryptographic public keys needed for authentication in <xref target="RFC9575"/>, static Broadcast RID data and trustworthy pointers to additional information.</t>
          <t>These registries are Authoritative Name Servers in the DNS. See <xref target="DET-DNS"/> for operational requirements, query mechanism and response models.</t>
        </section>
        <section anchor="priv-info-reg">
          <name>Private Information Registries</name>
          <t>The information found in these registries is considered Personally Identifiable Information (PII) and/or is stored for potential future audit of registration. Access to Private Information Registries MUST be performed using RDAP <xref target="STD95"/>. This section defines RDAP behavior for DRIP.</t>
          <section anchor="rdap-uri">
            <name>URI Path Segment</name>
            <t>The URIs to Private Information resources MUST use the specification defined in <xref section="3.1.1" sectionFormat="of" target="RFC9082"/>. Use of <xref section="3.1.3" sectionFormat="of" target="RFC9082"/> is OPTIONAL.</t>
          </section>
          <section anchor="conformance-literal">
            <name>Conformance Literal</name>
            <t>The string literal <tt>drip_version_0</tt> MUST be used in the <tt>rdapConformance</tt> section of the RDAP response to signal conformance with this specification.</t>
          </section>
          <section anchor="rdap-model">
            <name>Extension Model</name>
            <t>Queries of DETs in RDAP SHOULD respond with the appropriate Object Class as defined in <xref target="RFC9083"/> and MUST include the additional data element specified in <xref target="rdap-response"/>.</t>
            <figure anchor="rdap-response">
              <name>RDAP Response CDDL</name>
              <artwork><![CDATA[
dime = {
  csr: x509,
  canonical_cert: x509,
  hhit: [
    entity_type: uint, 
    ipv6: ip6
  ],
  be_chain: [+ be: endorsement]
  registrant: tstr, 
  ? raa_approval: x509,
  metadata
}
]]></artwork>
            </figure>
            <t>Additional keys SHOULD be registered to IANA under <xref target="drip-keys"/> for global harmonization. Specification of their usage and syntax in a NAS is provided by CAAs using a MOC that references this specification.</t>
          </section>
          <section anchor="diff-access">
            <name>Differential Access</name>
            <t>Per REG-2 and REG-4 of <xref section="4.4.1" sectionFormat="of" target="RFC9153"/>, RDAP queries to DRIP Private Information Registries MUST be protected using fine-grained AAA policies in a both human- &amp; machine-readable form for automated enforcement. RDAP supports only HTTP based mechanisms for authentication as defined in <xref section="3.2" sectionFormat="of" target="RFC7481"/>. A federated authentication mechanism, such as the examples in <xref section="3.2.1" sectionFormat="of" target="RFC7481"/>, is RECOMMENDED.</t>
            <t>For international and/or global harmonization, DRIP standardizes the following RDAP behavior for authentication of clients and servers:</t>
            <ul spacing="normal">
              <li>
                <t>MUST support HTTP Digest Authentication Scheme (<xref target="RFC7616"/>) <strong>AND</strong></t>
              </li>
              <li>
                <t>SHOULD NOT support HTTP Basic Authentication Scheme (<xref target="RFC7617"/>) but MAY accept Basic if peer offers that and nothing stronger <strong>AND</strong></t>
              </li>
              <li>
                <t>MUST support Mutual TLS <xref section="7.4.6" sectionFormat="of" target="RFC5246"/> for global and/or international queries <strong>AND</strong></t>
              </li>
              <li>
                <t>SHOULD use Mutual TLS <xref section="7.4.6" sectionFormat="of" target="RFC5246"/> but MAY do any other RDAP compatible AAA for domestic queries</t>
              </li>
            </ul>
            <t>A DIME when supporting Mutual TLS MUST accept valid DKIX certificates (<xref target="dkix"/>) and MAY accept other certificates.</t>
            <ul empty="true">
              <li>
                <t>Author Note: the selection of Mutual TLS is an initial down selection from OpenID Connect for RDAP (<xref target="RFC9560"/>), or Mutual TLS (<xref section="7.4.6" sectionFormat="of" target="RFC5246"/>) or eXtensible Access Control Markup Language (XACML) with Security Assertion Markup Language (SAML). This is still a discussion point.</t>
              </li>
            </ul>
          </section>
        </section>
      </section>
    </section>
    <section anchor="ic">
      <name>IANA Considerations</name>
      <section anchor="raa-delegation-for-caas">
        <name>RAA Delegation for CAAs</name>
        <t>As part of <xref target="DET-DNS"/> IANA already has the pre-allocated mapping of RAA values for CAAs. Nations are to follow the guidance in <xref section="6.2.1.4" sectionFormat="of" target="DET-DNS"/> to request delegation of their DNS zone under <tt>3.0.0.1.0.0.2.ip6.arpa.</tt>.</t>
      </section>
      <section anchor="well-known-uris">
        <name>Well-Known URIs</name>
        <t>IANA is requested to add the following entries in the "Well-Known URIs" registry <xref target="WELL-KNOWN"/>.</t>
        <table>
          <name>Additions to Well-Known URIs Registry</name>
          <thead>
            <tr>
              <th align="left">URI Suffix</th>
              <th align="left">Change Controller</th>
              <th align="left">Reference</th>
              <th align="left">Status</th>
              <th align="left">Related Information</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">register-hhit</td>
              <td align="left">IETF</td>
              <td align="left">This RFC</td>
              <td align="left">permanent</td>
              <td align="left">N/A</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="rdap-extensions-registry">
        <name>RDAP Extensions Registry</name>
        <t>IANA is request to register the following value in the "RDAP Extensions" registry <xref target="RDAP-EXT"/>.</t>
        <artwork><![CDATA[
Extension Identifier: 
  drip_version_0
Registry Operator:
  Any
Specification:
  This specification
Contact:
  IETF <iesg@ietf.org>
Intended Usage:
  This extension is used to convey private information 
  under an HHIT registration.
]]></artwork>
      </section>
      <section anchor="media-types">
        <name>Media Types</name>
        <t>IANA is requested to add the following entries in the "Media Types" registry <xref target="MEDIA-TYPES"/>.</t>
        <table>
          <name>Additions to Media Types Registry</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">DRIP CWT</td>
              <td align="left">application/drip+cwt</td>
              <td align="left">
                <xref target="drip-cwt-mt"/></td>
            </tr>
            <tr>
              <td align="left">DRIP JWT</td>
              <td align="left">application/drip+jwt</td>
              <td align="left">
                <xref target="drip-jwt-mt"/></td>
            </tr>
          </tbody>
        </table>
        <section anchor="drip-cwt-mt">
          <name>application/drip+cwt Registration</name>
          <dl>
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>drip+cwt</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t>TODO</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>This RFC</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Applications that access DIMEs requesting HHIT registration, as well as DIMEs responding to registration requests.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>DRIP WG mailing list (drip@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
        <section anchor="drip-jwt-mt">
          <name>application/drip+jwt Registration</name>
          <dl>
            <dt>Type name:</dt>
            <dd>
              <t>application</t>
            </dd>
            <dt>Subtype name:</dt>
            <dd>
              <t>drip+jwt</t>
            </dd>
            <dt>Required parameters:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Optional parameters:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Encoding considerations:</dt>
            <dd>
              <t>binary, JWT values are encoded as a series of base64url-encoded values (with trailing '=' characters removed), some of which may be the empty string, separated by period ('.') characters.</t>
            </dd>
            <dt>Security considerations:</dt>
            <dd>
              <t>TODO</t>
            </dd>
            <dt>Interoperability considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Published specification:</dt>
            <dd>
              <t>This RFC</t>
            </dd>
            <dt>Applications that use this media type:</dt>
            <dd>
              <t>Applications that access DIMEs requesting HHIT registration, as well as DIMEs responding to registration requests.</t>
            </dd>
            <dt>Fragment identifier considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Person &amp; email address to contact for further information:</dt>
            <dd>
              <t>DRIP WG mailing list (drip@ietf.org)</t>
            </dd>
            <dt>Intended usage:</dt>
            <dd>
              <t>COMMON</t>
            </dd>
            <dt>Restrictions on usage:</dt>
            <dd>
              <t>none</t>
            </dd>
            <dt>Author/Change controller:</dt>
            <dd>
              <t>IETF</t>
            </dd>
            <dt>Provisional registration:</dt>
            <dd>
              <t>no</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="drip-keys">
        <name>DRIP CBOR/JSON Keys</name>
        <t>This specification establishes a new sub-registry called "DRIP CBOR/JSON Keys" within the "Drone Remote ID Protocol" registry. This registry is to maintain a globally harmonized list of JSON keys (i.e. "Names") and CBOR map integer keys (i.e. "Labels") for use in DRIP. The following ranges are defined based on the CBOR Label values:</t>
        <table anchor="key-table">
          <name>DRIP CBOR/JSON Key Registry Policies</name>
          <thead>
            <tr>
              <th align="left">Range</th>
              <th align="left">Registration Policy</th>
              <th align="left">Range Use</th>
              <th align="left">Comments</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">from -2^64 to -25</td>
              <td align="left">Private Use (<xref section="4.1" sectionFormat="of" target="RFC8126"/>)</td>
              <td align="left">HID Private Keys</td>
              <td align="left">Private use for RAAs and HDAs</td>
            </tr>
            <tr>
              <td align="left">from -24 to 23</td>
              <td align="left">TODO: TBD</td>
              <td align="left">ASTM UAS Keys</td>
              <td align="left">Keys found in ASTM UAS Standards such as <xref target="F3411"/></td>
            </tr>
            <tr>
              <td align="left">from 24 to 2^64-1</td>
              <td align="left">Specification Required (<xref section="4.6" sectionFormat="of" target="RFC8126"/>)</td>
              <td align="left">Global Harmonization</td>
              <td align="left">Reserved for future registrations to maintain global harmonization</td>
            </tr>
          </tbody>
        </table>
        <t>Keys in the Private Use and Experimental ranges are RECOMMENDED to prepend a <tt>_</tt> to the Name to avoid namespace collisions with registered Names.</t>
        <t>The HID Private Keys range in this registry provide code-points (used in <xref target="reg-model"/> and <xref target="rdap-model"/> as part of <tt>metadata</tt>) for each RAA and HDA to define their own subset of elements in both registration and RDAP responses. The <tt>spec</tt> value of this registry SHOULD be used to enable the DIME or client to provide a "hint" for the data elements included. Specification of the <tt>spec</tt> string semantics are left to individual RAAs and HDAs to define as they see fit. RAA and HDA Operators SHOULD provide specification for any Private Use or Experimental Use values, but this may not be public due to policy.</t>
        <section anchor="review-criteria">
          <name>Review Criteria</name>
          <t>For registrations, review should note if the Name field matches an existing entry, the request should be denied. A request should also be denied if the specification duplicates an existing entry both in syntax and semantics. For example, if an existing key called <tt>whee</tt> already exists with the specification of <tt>[+ uint]</tt> and a new request comes along to register <tt>whee_but_mine</tt> with specification <tt>[+ uint]</tt>, then the latter should be rejected on the grounds of being able to use <tt>whee</tt> instead. This denial can be overruled if shown that the new registration has clear justification, as part of the specification citing technical reasoning, to exist.</t>
        </section>
        <section anchor="cborjson-key-fields">
          <name>CBOR/JSON Key Fields</name>
          <dl>
            <dt>Name (JSON Key Value):</dt>
            <dd>
              <t>A string value, to be used as a <tt>key</tt> in the <tt>key: value</tt> pair of a JSON object. No specific rules apply for syntax beyond being a valid JSON string for a object key, but it is recommended to use all lower-case and snake-case with underscores. Care should be given to the length of a Name to reduce wire size of JSON encodings for constrained environments.</t>
            </dd>
            <dt>Label (CBOR Integer Key Value):</dt>
            <dd>
              <t>A integer value, ranging from <tt>-2^64</tt> to <tt>2^64 - 1</tt>, to be used as a key in a CBOR map. Different ranges of values use different registration policies, see <xref target="key-table"/>.</t>
            </dd>
            <dt>Description:</dt>
            <dd>
              <t>A short description of the entry providing an overview of its semantic meaning and its expected use-cases.</t>
            </dd>
            <dt>Reference:</dt>
            <dd>
              <t>A link to a permanent and readily available specification defining the value syntax and semantics to be used for this key.</t>
            </dd>
          </dl>
        </section>
        <section anchor="registration-form">
          <name>Registration Form</name>
          <figure anchor="key-form">
            <artwork><![CDATA[
Requested Range: 
Name (JSON Key Value):
Description:
Specification:
]]></artwork>
          </figure>
        </section>
        <section anchor="initial-values">
          <name>Initial Values</name>
          <table anchor="pre-key-values">
            <name>Pre-Allocated DRIP CBOR/JSON Keys</name>
            <thead>
              <tr>
                <th align="left">Name (JSON Key Value)</th>
                <th align="left">Label (CBOR Integer Key Value)</th>
                <th align="left">Description</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">uas_type</td>
                <td align="left">0</td>
                <td align="left">Enumeration of UAS Type</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">uas_ids</td>
                <td align="left">1</td>
                <td align="left">UAS IDs</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">auth</td>
                <td align="left">2</td>
                <td align="left">Authentication Data</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">self_id</td>
                <td align="left">3</td>
                <td align="left">Self ID</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">classification</td>
                <td align="left">4</td>
                <td align="left">UA Category &amp; Class</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">area</td>
                <td align="left">5</td>
                <td align="left">Area Count, Radius, etc.</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">operator_id</td>
                <td align="left">6</td>
                <td align="left">Operator ID</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">ua_status</td>
                <td align="left">7</td>
                <td align="left">Enumeration of Status</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">ua_position</td>
                <td align="left">8</td>
                <td align="left">UA Position</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">ua_bearing</td>
                <td align="left">9</td>
                <td align="left">Bearing / Track Direction</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">ua_speed</td>
                <td align="left">10</td>
                <td align="left">Vertical &amp; Horizontal Speeds</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">ua_height</td>
                <td align="left">11</td>
                <td align="left">Height Above Ground or Take-off</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">accuracy</td>
                <td align="left">12</td>
                <td align="left">Enumerations of Accuracies</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">operator_position</td>
                <td align="left">13</td>
                <td align="left">Operator Position</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">timestamp</td>
                <td align="left">14</td>
                <td align="left">UTC Timestamp</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">compliance</td>
                <td align="left">15</td>
                <td align="left">Compliance Enumeration</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">raa</td>
                <td align="left">23</td>
                <td align="left">RAA</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">hda</td>
                <td align="left">24</td>
                <td align="left">HDA</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">csr</td>
                <td align="left">25</td>
                <td align="left">DER Encoded X.509 CSR</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">uas</td>
                <td align="left">26</td>
                <td align="left">UAS Datum Map</td>
                <td align="left">This RFC, <xref target="uas-model"/></td>
              </tr>
              <tr>
                <td align="left">utm</td>
                <td align="left">27</td>
                <td align="left">UTM Operational Intent &amp; Source</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">spec</td>
                <td align="left">28</td>
                <td align="left">CAA Specification Code</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">canonical_cert</td>
                <td align="left">39</td>
                <td align="left">DER Encoded X.509 Certificate</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">be_chain</td>
                <td align="left">30</td>
                <td align="left">List of Broadcast Endorsements</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">registrant</td>
                <td align="left">31</td>
                <td align="left">Registrant Information</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">hhit</td>
                <td align="left">32</td>
                <td align="left">Hierarchial Host Identity Tag</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">oracle_x509</td>
                <td align="left">33</td>
                <td align="left">Oracle X.509 Certificate</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">uas_serial_number</td>
                <td align="left">34</td>
                <td align="left">ANSI/CTA 2063-A UAS Serial Number</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">caa_assigned_id</td>
                <td align="left">35</td>
                <td align="left">CAA Assigned ID</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">pilot_license_id</td>
                <td align="left">36</td>
                <td align="left">Pilot License Number</td>
                <td align="left">This RFC</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="sc">
      <name>Security Considerations</name>
      <t>The considerations discussed in <xref target="RFC9153"/>, <xref target="RFC9374"/>, <xref target="RFC9434"/>, <xref target="RFC9575"/> and <xref target="DET-DNS"/> apply.</t>
      <t>DIMEs use and provide various methods to protect data through: Attestation, Authentication, Authorization, Access Control, Attribution, Accounting, and Audit (AAA). All data, handled under DRIP, MUST be protected by AAA, as per applicable regulation and policy (which, in some cases, for public data, may impose minimal requirements). All private data MUST also be protected by strong encryption where permitted by applicable law etc. These requirements apply to data at rest and in transit in all phases of the process, i.e. registration and query.</t>
      <t>Attestation may be mandated by CAAs for devices (such as UA). Remote ATtestation ProcedureS (RATS) <xref target="RFC9334"/> is recommended for DRIP. The specific attestation mechanisms in a given jurisdiction are out of scope for this document.</t>
      <ul empty="true">
        <li>
          <t>Author Note: RGM, what else should go here?</t>
        </li>
      </ul>
      <section anchor="cryptographic-materials">
        <name>Cryptographic Materials</name>
        <t>Best practices dictate that cryptographic materials that should only be available to selected parties SHOULD be generated by one or more of those parties and stored accessibly only on those parties devices. E.g. the asymmetric key-pair from which a DET will be derived SHOULD be generated by the entity identified by that DET and the corresponding private key should be stored only on that entity's device. There may be scenarios where other parts of the UAS MAY generate the cryptographic materials and provision them as needed during an operation. Any such system MUST ensure security of the cryptographic material is guaranteed.</t>
      </section>
    </section>
    <section anchor="ptc">
      <name>Privacy &amp; Transparency Considerations</name>
      <t>The considerations discussed in <xref target="RFC9153"/> and <xref section="10" sectionFormat="of" target="RFC9434"/> apply.</t>
      <ul empty="true">
        <li>
          <t>Author Note: do we copy/paste Section 10 of <xref target="RFC9434"/> and update here or is below sufficient?</t>
        </li>
      </ul>
      <section anchor="det-ptc">
        <name>DETs as Session ID and Authentication Key ID</name>
        <t>The properties of a DET allow it to be used as a Session ID and/or an Authentication Key ID. There may be scenarios in which Session IDs are desired for privacy but Authentication is not; although this may reduce transparency and security, a DET MAY be used exclusively as a Session ID in such. There are scenarios in which Authentication is desired but Session IDs are not (e.g. where a CAA does not allow Session IDs); a DET MAY be used exclusively as an Authentication Key ID in such. In the scenario expected to be most common, both Session IDs and Authentication are desired; the same DET SHOULD be used as both the Session ID and Authentication Key ID in such. Consequences and operational impact of using different DETs for the Session ID and Authentication Key ID of the same entity are unknown and not covered in this document.</t>
      </section>
      <section anchor="selective-encryption">
        <name>Selective Encryption</name>
        <ul empty="true">
          <li>
            <t>Author Note: renamed section and/or add more explicit disclaimer?</t>
          </li>
        </ul>
        <t>Selective encryption may be allowed in some circumstances. An HHIT may be used in a private lookup to access decryption key material or obtain decryption as a service.</t>
        <t>Selective encryption of UAS RID using DRIP is only allowed when the DET to be used as the Session ID is issued by an HDA associated with a USS and that DET is associated with the corresponding Operational Intent in UTM. This enables the encryption of selected data elements in Broadcast RID to provide a layer of privacy for operators (e.g. their position) without compromising transparency to entities (e.g. public safety / law enforcement personnel) that need to know.</t>
        <t>Selective encryption typically requires network connectivity of the Observer to perform the private query to obtain the decryption service or key material. CAAs should consider the expected Observer environment and prohibit encryption wherever and whenever Observers cannot reasonably be expected to have connectivity. For example selective encryption, per CAA regulations, MAY be allowed in dense wireless IP connectivity areas (e.g. urban) but prohibited in poor wirelessly covered areas (e.g. rural).</t>
        <t>The issue of Observer network connectivity MAY be mitigated with the use of a shared decryption key used by multiple Session IDs under a given USS/HDA over a period of time, that is preloaded onto the Observer device before connectivity is lost. For example Observers MAY query USS/HDAs for flight volumes in which they are interested to preload their decryption key(s) for the Operational Intents/Session IDs that day.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="DET-DNS">
          <front>
            <title>DRIP Entity Tags in the Domain Name System</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Jim Reid" initials="J." surname="Reid">
              <organization>RTFM llp</organization>
            </author>
            <date day="19" month="August" year="2025"/>
            <abstract>
              <t>   This document defines the Domain Name System (DNS) functionality of a
   Drone Remote Identification Protocol (DRIP) Identity Management
   Entity (DIME).  It is built around DRIP Entity Tags (DETs) to
   standardize a hierarchical registry structure and associated
   processes to facilitate trustable and scalable registration and
   lookup of information related to Unmanned Aircraft Systems (UAS).
   The registry system supports issuance, discovery, and verification of
   DETs, enabling secure identification and association of UAS and their
   operators.  It also defines the interactions between different
   classes of registries (root, organizational, and individual) and
   their respective roles in maintaining the integrity of the
   registration data.  This architecture enables decentralized,
   federated operation while supporting privacy, traceability, and
   regulatory compliance requirements in the context of UAS Remote ID
   and other services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-33"/>
        </reference>
        <reference anchor="RFC9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC9575">
          <front>
            <title>DRIP Entity Tag (DET) Authentication Formats and Protocols for Broadcast Remote Identification (RID)</title>
            <author fullname="A. Wiethuechter" initials="A." role="editor" surname="Wiethuechter"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>The Drone Remote Identification Protocol (DRIP), plus trust policies and periodic access to registries, augments Unmanned Aircraft System (UAS) Remote Identification (RID), enabling local real-time assessment of trustworthiness of received RID messages and observed UAS, even by Observers lacking Internet access. This document defines DRIP message types and formats to be sent in Broadcast RID Authentication Messages to verify that attached and recently detached messages were signed by the registered owner of the DRIP Entity Tag (DET) claimed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9575"/>
          <seriesInfo name="DOI" value="10.17487/RFC9575"/>
        </reference>
        <referencegroup anchor="STD95" target="https://www.rfc-editor.org/info/std95">
          <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
            <front>
              <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <author fullname="B. Ellacott" initials="B." surname="Ellacott"/>
              <author fullname="N. Kong" initials="N." surname="Kong"/>
              <date month="March" year="2015"/>
              <abstract>
                <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP). It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP). RDAP is a successor protocol to the very old WHOIS protocol. The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="7480"/>
            <seriesInfo name="DOI" value="10.17487/RFC7480"/>
          </reference>
          <reference anchor="RFC7481" target="https://www.rfc-editor.org/info/rfc7481">
            <front>
              <title>Security Services for the Registration Data Access Protocol (RDAP)</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="N. Kong" initials="N." surname="Kong"/>
              <date month="March" year="2015"/>
              <abstract>
                <t>The Registration Data Access Protocol (RDAP) provides "RESTful" web services to retrieve registration metadata from Domain Name and Regional Internet Registries. This document describes information security services, including access control, authentication, authorization, availability, data confidentiality, and data integrity for RDAP.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="7481"/>
            <seriesInfo name="DOI" value="10.17487/RFC7481"/>
          </reference>
          <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
            <front>
              <title>Registration Data Access Protocol (RDAP) Query Format</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <date month="June" year="2021"/>
              <abstract>
                <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9082"/>
            <seriesInfo name="DOI" value="10.17487/RFC9082"/>
          </reference>
          <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
            <front>
              <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <date month="June" year="2021"/>
              <abstract>
                <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs). These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9083"/>
            <seriesInfo name="DOI" value="10.17487/RFC9083"/>
          </reference>
          <reference anchor="RFC9224" target="https://www.rfc-editor.org/info/rfc9224">
            <front>
              <title>Finding the Authoritative Registration Data Access Protocol (RDAP) Service</title>
              <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
              <date month="March" year="2022"/>
              <abstract>
                <t>This document specifies a method to find which Registration Data Access Protocol (RDAP) server is authoritative to answer queries for a requested scope, such as domain names, IP addresses, or Autonomous System numbers. This document obsoletes RFC 7484.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9224"/>
            <seriesInfo name="DOI" value="10.17487/RFC9224"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4108">
          <front>
            <title>Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document describes the use of the Cryptographic Message Syntax (CMS) to protect firmware packages, which provide object code for one or more hardware module components. CMS is specified in RFC 3852. A digital signature is used to protect the firmware package from undetected modification and to provide data origin authentication. Encryption is optionally used to protect the firmware package from disclosure, and compression is optionally used to reduce the size of the protected firmware package. A firmware package loading receipt can optionally be generated to acknowledge the successful loading of a firmware package. Similarly, a firmware package load error report can optionally be generated to convey the failure to load a firmware package. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4108"/>
          <seriesInfo name="DOI" value="10.17487/RFC4108"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7616">
          <front>
            <title>HTTP Digest Access Authentication</title>
            <author fullname="R. Shekh-Yusef" initials="R." role="editor" surname="Shekh-Yusef"/>
            <author fullname="D. Ahrens" initials="D." surname="Ahrens"/>
            <author fullname="S. Bremer" initials="S." surname="Bremer"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) provides a simple challenge- response authentication mechanism that may be used by a server to challenge a client request and by a client to provide authentication information. This document defines the HTTP Digest Authentication scheme that can be used with the HTTP authentication mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7616"/>
          <seriesInfo name="DOI" value="10.17487/RFC7616"/>
        </reference>
        <reference anchor="RFC7617">
          <front>
            <title>The 'Basic' HTTP Authentication Scheme</title>
            <author fullname="J. Reschke" initials="J." surname="Reschke"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>This document defines the "Basic" Hypertext Transfer Protocol (HTTP) authentication scheme, which transmits credentials as user-id/ password pairs, encoded using Base64.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7617"/>
          <seriesInfo name="DOI" value="10.17487/RFC7617"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC9063">
          <front>
            <title>Host Identity Protocol Architecture</title>
            <author fullname="R. Moskowitz" initials="R." role="editor" surname="Moskowitz"/>
            <author fullname="M. Komu" initials="M." surname="Komu"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>This memo describes the Host Identity (HI) namespace, which provides a cryptographic namespace to applications, and the associated protocol layer, the Host Identity Protocol, located between the internetworking and transport layers, that supports end-host mobility, multihoming, and NAT traversal. Herein are presented the basics of the current namespaces, their strengths and weaknesses, and how a HI namespace will add completeness to them. The roles of the HI namespace in the protocols are defined.</t>
              <t>This document obsoletes RFC 4423 and addresses the concerns raised by the IESG, particularly that of crypto agility. The Security Considerations section also describes measures against flooding attacks, usage of identities in access control lists, weaker types of identifiers, and trust on first use. This document incorporates lessons learned from the implementations of RFC 7401 and goes further to explain how HIP works as a secure signaling channel.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9063"/>
          <seriesInfo name="DOI" value="10.17487/RFC9063"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9560">
          <front>
            <title>Federated Authentication for the Registration Data Access Protocol (RDAP) Using OpenID Connect</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>The Registration Data Access Protocol (RDAP) provides Representational State Transfer (RESTful) web services to retrieve registration metadata from domain name and regional internet registries. RDAP allows a server to make access control decisions based on client identity, and as such, it includes support for client identification features provided by the Hypertext Transfer Protocol (HTTP). Identification methods that require clients to obtain and manage credentials from every RDAP server operator present management challenges for both clients and servers, whereas a federated authentication system would make it easier to operate and use RDAP without the need to maintain server-specific client credentials. This document describes a federated authentication system for RDAP based on OpenID Connect.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9560"/>
          <seriesInfo name="DOI" value="10.17487/RFC9560"/>
        </reference>
        <referencegroup anchor="STD90" target="https://www.rfc-editor.org/info/std90">
          <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259">
            <front>
              <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
              <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
              <date month="December" year="2017"/>
              <abstract>
                <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
                <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="90"/>
            <seriesInfo name="RFC" value="8259"/>
            <seriesInfo name="DOI" value="10.17487/RFC8259"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="STD94" target="https://www.rfc-editor.org/info/std94">
          <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949">
            <front>
              <title>Concise Binary Object Representation (CBOR)</title>
              <author fullname="C. Bormann" initials="C." surname="Bormann"/>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <date month="December" year="2020"/>
              <abstract>
                <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
                <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="94"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
          </reference>
        </referencegroup>
        <reference anchor="F3411" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3411-22A"/>
          <seriesInfo name="DOI" value="10.1520/F3411-22A"/>
        </reference>
        <reference anchor="F3548" target="https://www.astm.org/f3548-21.html">
          <front>
            <title>Standard Specification for UAS Traffic Management (UTM) UAS Service Supplier (USS) Interoperability</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3548-21"/>
          <seriesInfo name="DOI" value="10.1520/F3548-21"/>
        </reference>
        <reference anchor="F3586" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Practice for Remote ID Means of Compliance to Federal Aviation Administration Regulation 14 CFR Part 89</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3586-22"/>
          <seriesInfo name="DOI" value="10.1520/F3586-22"/>
        </reference>
        <reference anchor="ICAO-NUMBERS" target="https://www.icao.int/airnavigation/IATF/Pages/ASTM-Remote-ID.aspx">
          <front>
            <title>ICAO Remote ID Number Registry</title>
            <author>
              <organization>International Civil Aviation Organization</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="ICAO-ACCP">
          <front>
            <title>ICAO Aviation Common Certificate Policy</title>
            <author>
              <organization>International Civil Aviation Organization</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="_802.1AR" target="https://doi.org/10.1109/ieeestd.2018.8423794">
          <front>
            <title>IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
          <seriesInfo name="DOI" value="10.1109/ieeestd.2018.8423794"/>
        </reference>
        <reference anchor="WELL-KNOWN" target="https://www.iana.org/assignments/well-known-uris/">
          <front>
            <title>Well-Known URIs</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="MEDIA-TYPES" target="https://www.iana.org/assignments/media-types/">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="RDAP-EXT" target="https://www.iana.org/assignments/rdap-extensions/">
          <front>
            <title>RDAP Extensions</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 926?>

<section anchor="cddl-prelude">
      <name>DRIP CDDL Prelude</name>
      <t>This appendix is normative.</t>
      <artwork><![CDATA[
; DRIP Type Definitions 
; (follow STD94 Section 6 for CBOR/JSON conversion)
metadata = (
  ? uas: uas-datum,
  ? utm: [
    operational_intent: uuid,
    uss_uri: uri
  ],
  ? raa: {
    ? spec: tstr,
    + &(tstr, int): any
  },
  ? hda: {
    ? spec: tstr,
    + &(tstr, int): any
  }
  * &(tstr, int): any
)
x509 = bstr ; DER encoded X.509 object (CSR or Certificate)
endorsement = bstr .size 136
hash = bstr .size 8 ; generated with cSHAKE
auth-data = bstr .size 1..362
uas-id = bstr .size 20
utc = tdate / time

; DRIP Keys (JSON key = CBOR label)
; private_use = -2^64 .. -25
; astm = -24 .. 23
uas_type = 0
uas_ids = 1
auth = 2
self_id = 3
area = 4
classification = 5
operator_id = 6
ua_status = 7
ua_position = 8
ua_bearing = 9
ua_speed = 10
ua_height = 11
accuracy = 12
operator_position = 13
timestamp = 14
compliance = 15
raa = 23
hda = 24
csr = 25
uas = 26
utm = 27
spec = 28
canonical_cert = 29
be_chain = 30
registrant = 31 ; jcard or pointer (i.e. hhit of operator)?
hhit = 32
oracle_x509 = 33
uas_serial_number = 34
caa_assigned_id = 35
pilot_license_id = 36

; External Tags
uuid = #6.37
ip6 = #6.54
position = #6.103([
        latitude: number, 
        longitude: number, 
        altitude: number
])
]]></artwork>
    </section>
    <section anchor="hid-abbrev">
      <name>HID Abbreviation</name>
      <t>The DET MAY be abbreviated. This is useful for display applications with limited screen real-estate as the display of the entire 128-bit (32 characters in hexadecimal, even without recommended punctuation or spacing) IPv6 address can be costly. Abbreviations SHOULD follow the following format rules.</t>
      <dl>
        <dt>Hierarchy Level:</dt>
        <dd>
          <t>Each hierarchy level (RAA/HDA) is represented by a maximum of six alphanumeric characters. This abbreviation SHOULD NOT be a single character in length, for obvious reasons of not being very useful. The decimal representation does fit into the 4 character restriction but is NOT RECOMMENDED. The RECOMMENDED abbreviation for the RAA level is to use the ISO3166-1 Alpha 2 code for nations. This abbreviation MAY be found in DNS under a HHIT RRType of the entity or its parents. If there is no abbreviation hint display devices SHOULD use a fixed size four character hexadecimal representation of the value. It is RECOMMENDED that display applications specify a default RAA value, and only display the RAA abbreviation explicitly when it does not match the default.</t>
        </dd>
        <dt>Entity Hash:</dt>
        <dd>
          <t>The entity is represented by a fixed size four character hexadecimal string using the last four characters of the DET. If a collision (within the same HID space) on display occurs, the four characters SHOULD shift to the left by one hexadecimal character until the collision is resolved. This window MUST stay within the last sixteen hexadecimal characters of the DET. The <tt>:</tt> character found in an IPv6 address string is ignored.</t>
        </dd>
      </dl>
      <ul empty="true">
        <li>
          <t>Review(SWC): Do we need to insert a flag character such as "*" to indicate when a hash has been shifted? If the abbreviation is used only to avoid conflicts, no; but if anyone actually knows some DETs in their operation, if they get shifted, they probably won't recognize them.</t>
        </li>
      </ul>
      <dl>
        <dt>Delimiter:</dt>
        <dd>
          <t>Each section is delimited by a single character. This can be any whitespace character (except newline and tab) or any non-alphanumeric character (period, comma, semicolon, etc.). It is RECOMMENDED that the delimiter is consistent between components. The RECOMMENDED delimiter is the colon (<tt>:</tt>) character.</t>
        </dd>
      </dl>
      <t>For example a DET with the values of RAA 16383 and HDA 1 without any abbreviation hint from DNS is represented by the string <tt>3FFF 0001 xxxx</tt> with <tt>xxxx</tt> representing a entity hash. If an abbreviation for the RAA (such as <tt>DRIP01</tt>) and HDA (such as <tt>TEST</tt>) are found in DNS then the DET can be represented with the string of <tt>DRIP01 TEST xxxx</tt>.</t>
      <t>For an example of the entity hash, let's assume there are two DETs with the following hashes in the same HID: <tt>0000:1111:2222:3333</tt> and <tt>0000:2222:1111:3333</tt>. At first both DETs are represented with the same abbreviation: <tt>RAA HDA 3333</tt>. One of these DETs is selected by the display application to shift the display hash one character to avoid the collision resulting in the following two abbreviations: <tt>RAA HDA 3333</tt> and <tt>RAA HDA 1333</tt>.</t>
    </section>
    <section anchor="compliance-testing">
      <name>Compliance Testing</name>
      <t>It is the responsibility of each parent node in the tree that a child node pass functional interoperability testing prior to issuing a certificate for the child node.</t>
      <ul empty="true">
        <li>
          <t>Author: This section is a work in progress.</t>
        </li>
      </ul>
      <t>All interfaces MUST be tested on valid and invalid data (such as being malformed). When policy is required on an interface all essential permutations of the policy MUST be tested and all possible permutations SHOULD be tested. The policy engine MUST be invoked to validate proper decisions (including PERMIT and DENY or their equivalents) and actions are being made. All data returned from an interface MUST be tested to check that it conforms with specifications.</t>
      <t>There is a range in the RAA space allocated for experimentation and testing purposes. Sub-ranges can be delegated to parties, for a limited period of time, at the behest of the RAA Designated Expert, to test DIME interoperability (e.g. HDA to RAA, and RAA to RAA interactions) in any of the below subsections. The IANA Considerations section of <xref target="DET-DNS"/> contains more information on how these delegations are to be handled.</t>
      <t><xref target="compliance-form"/> provides a set of forms to be filled out and submitted as part of a CAA compliance process for using DRIP.</t>
      <figure>
        <name>System Interface Test Diagram</name>
        <artwork><![CDATA[
+-----+           +-----+
|     |           |     |
|     o----(1)--->o     |
|  X  |           |  Y  |
|     o<---(2)----o     |
|     |           |     |
+-----+           +-----+
]]></artwork>
      </figure>
      <section anchor="registration-interface">
        <name>Registration Interface</name>
        <t>X, Y pairs: (registrant, HDA), (HDA, RAA)</t>
        <t>1: Ensure that endpoints on Y can be accessed according to Y's policy by X. Ensure that the endpoints conform to the normative requirements of Test that Y interface properly handles valid and malformed data. Test that Y securely generates proper artifacts and stores them.</t>
        <t>2: Ensure that the interactions for (1) properly returns data to X from Y. This data MUST include the Broadcast Endorsements, X.509s and any other data elements required.</t>
      </section>
      <section anchor="public-query-interface">
        <name>Public Query Interface</name>
        <t>X, Y pairs: (UAS Observer, HDA), (UAS Observer, RAA), (HDA, RAA), (RAA, HDA), (HDA, HDA'), (RAA, RAA')</t>
        <t>1: Ensure that Y has a properly configured and publicly accessible Authoritative Name Server for its delegated <tt>ip6.arpa</tt> domain.</t>
        <t>2: Ensure that Y returns the valid RRTypes defined in <xref target="DET-DNS"/> to X based on an <tt>ip6.arpa</tt> query via standard DNS methods (i.e. using UDP on port 53). Ensure that the HHIT RRType contains the correct Certificate with an URI.</t>
      </section>
      <section anchor="private-query-interface">
        <name>Private Query Interface</name>
        <t>X, Y pairs: (UAS Observer, HDA), (UAS Observer, RAA), (HDA, RAA), (RAA, HDA), (HDA, HDA'), (RAA, RAA')</t>
        <t>1: Ensure that the provide URI from the public query interface points to a valid URI. Ensure that the endpoint on Y has proper AAA mechanisms as defined in this document and enforces the proper policy options.</t>
        <t>2: Ensure that the Y endpoint securely returns the data expected according to policy (matrix of authorized, valid request, unauthorized and invalid request) to X.</t>
      </section>
      <section anchor="compliance-form">
        <name>Compliance Submission Forms</name>
        <t>Author Note: talk with AS on this section</t>
      </section>
    </section>
    <section anchor="dkix">
      <name>DRIP Key Infrastructure X.509 (DKIX)</name>
      <t>This appendix is normative.</t>
      <t>The following sections define profiles and any specific field content for X.509 certificates that serve as a "shadow" of Endorsements that make up the DRIP Key Infrastructure (DKI). It is recommended that DKIX-Full (<xref target="dkix-full"/>) be deployed, as its CA certificates contain ICAO policy OIDs the reflect on the whole DKIX deployment.</t>
      <t>A DKIX compliant Certificate Authority (CA) MUST implement generation of the DKI Endorsements. It SHOULD also generate both DKIX profiles (<xref target="dkix-lite"/> and <xref target="dkix-full"/>). In this section Endorsing Server and CA are interchangeable.</t>
      <ul empty="true">
        <li>
          <t>Author Note: At this point in defining the shadow PKIs, alternatives to a strict hierarchy is still an open work item.</t>
        </li>
      </ul>
      <section anchor="dkix-csr">
        <name>Signing Request</name>
        <t>The Certificate Signing Request (CSR) is a mandatory for all DET registrations. Depending on the entity being registered, there is specific content rules.</t>
        <artwork><![CDATA[
Certificate Request:
    Data:
        Version: 1 (0x0)
        Subject:
        Subject Public Key Info:
            Public Key Algorithm: ED25519
                ED25519 Public-Key:
                pub:
        Attributes:
        Requested Extensions:
            X509v3 Subject Alternative Name: critical
                IP Address:
    Signature Algorithm: ED25519
]]></artwork>
        <dl>
          <dt>Subject:</dt>
          <dd>
            <t>As defined in <xref section="4.1.2.6" sectionFormat="of" target="RFC5280"/>. This field is filled in based on the type of entity being registered. When the attribute type is set to SERIAL_NUMBER, it MUST contain the ANSI/CTA 2063-A UAS Serial Number encoded as a string. The value of this field for other entity types are subject to policy and are out of scope for this document.</t>
          </dd>
          <dt>Subject Alternative Name:</dt>
          <dd>
            <t>When the registrant knows which HID and/or Suite ID they want the CSR SHOULD contain the Subject Alternate Name extension as defined in <xref section="4.2.1.6" sectionFormat="of" target="RFC5280"/> using ipAddress containing the fully formed DET and MUST mark the extension as <tt>critical</tt>. This DIME MUST check to ensure that the DET located in the extension is properly generated with the included public key of this CSR. If the registrant does not know or care the value of their HID and/or Suite ID, the Extensions field MUST NOT appear and the DIME will use its HID for DET generation using the public key provided by this CSR.</t>
          </dd>
        </dl>
        <t>The use of other Extension fields are out of scope for this document.</t>
      </section>
      <section anchor="dkix-lite">
        <name>Lite Profile</name>
        <t>DKIX-Lite is designed to fully mirror the DKI in the smallest reasonable X.509 certificates (e.g. 240 bytes for DER), but still adhere to <xref target="RFC5280"/> MUST field usage. The profile can be found in <xref target="dkix-lite-profile"/> and a field matrix found in <xref target="dkix-lite-matrix"/>.</t>
        <figure anchor="dkix-lite-profile">
          <name>DKIX-Lite Profile</name>
          <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
        Signature Algorithm: ED25519
        Issuer: CN =
        Validity
            Not Before:
            Not After :
        Subject:
        Subject Public Key Info:
            Public Key Algorithm: ED25519
                ED25519 Public-Key:
                pub:
        X509v3 extensions:
            X509v3 Subject Alternative Name: critical
                IP Address:
    Signature Algorithm: ED25519
    Signature Value:
]]></artwork>
        </figure>
        <table anchor="dkix-lite-matrix">
          <name>DKIX-Lite Field Matrix</name>
          <thead>
            <tr>
              <th align="left">Field</th>
              <th align="left">Authorization</th>
              <th align="left">Issuing</th>
              <th align="left">Operational</th>
              <th align="left">Comments</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Serial Number</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">
                <xref target="lite-serial"/></td>
            </tr>
            <tr>
              <td align="left">Subject</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST NOT</td>
              <td align="left">
                <xref target="ca-subject"/></td>
            </tr>
            <tr>
              <td align="left">Issuer</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">
                <xref target="issuer"/></td>
            </tr>
            <tr>
              <td align="left">Subject Alternative Name (SAN) IP6</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">
                <xref target="san-ip6"/></td>
            </tr>
            <tr>
              <td align="left">Subject Alternative Name (SAN) URI</td>
              <td align="left">MAY</td>
              <td align="left">MAY</td>
              <td align="left">MAY</td>
              <td align="left">
                <xref target="san-uri"/></td>
            </tr>
            <tr>
              <td align="left">Basic Constraints</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST NOT</td>
              <td align="left">CA=True, flagged as Critical</td>
            </tr>
            <tr>
              <td align="left">Subject Key Identifier (SKI)</td>
              <td align="left">MUST NOT</td>
              <td align="left">MUST NOT</td>
              <td align="left">MUST NOT</td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left">Authority Key Identifier (AKI)</td>
              <td align="left">MUST NOT</td>
              <td align="left">MUST NOT</td>
              <td align="left">MUST NOT</td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left">Key Usage</td>
              <td align="left">MAY</td>
              <td align="left">MAY</td>
              <td align="left">MAY</td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left">CA Policy OIDs</td>
              <td align="left">MAY</td>
              <td align="left">MAY</td>
              <td align="left">MAY</td>
              <td align="left">
                <xref target="policy-oid"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="dkix-full">
        <name>Full Profile</name>
        <t>The X.509 certificates are minimalistic (less than 400 bytes for DER). Any DRIP specific OIDs should come from the ICAO arc (see <xref target="policy-oid"/>). The profile can be found in <xref target="dkix-full-profile"/> and a field matrix found in <xref target="dkix-full-matrix"/>.</t>
        <figure anchor="dkix-full-profile">
          <name>DKIX-Full Profile</name>
          <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
        Signature Algorithm: ED25519
        Issuer: CN =
        Validity
            Not Before:
            Not After :
        Subject:
        Subject Public Key Info:
            Public Key Algorithm: ED25519
                ED25519 Public-Key:
                pub:
        X509v3 extensions:
            X509v3 Subject Alternative Name: critical 
                IP Address:
                URI:
            X509v3 Subject Key Identifier:
            X509v3 Authority Key Identifier:
            X509v3 Basic Constraints: critical
            X509v3 Key Usage: critical
    Signature Algorithm: ED25519
    Signature Value:
]]></artwork>
        </figure>
        <table anchor="dkix-full-matrix">
          <name>DKIX-Full Field Matrix</name>
          <thead>
            <tr>
              <th align="left">Field</th>
              <th align="left">Authorization</th>
              <th align="left">Issuing</th>
              <th align="left">Operational</th>
              <th align="left">Comments</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Serial Number</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">
                <xref target="full-serial"/></td>
            </tr>
            <tr>
              <td align="left">Subject</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST NOT</td>
              <td align="left">
                <xref target="ca-subject"/></td>
            </tr>
            <tr>
              <td align="left">Issuer</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">
                <xref target="issuer"/></td>
            </tr>
            <tr>
              <td align="left">Subject Alternative Name (SAN) IP6</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">
                <xref target="san-ip6"/></td>
            </tr>
            <tr>
              <td align="left">Subject Alternative Name (SAN) URI</td>
              <td align="left">MAY</td>
              <td align="left">MAY</td>
              <td align="left">MAY</td>
              <td align="left">
                <xref target="san-uri"/></td>
            </tr>
            <tr>
              <td align="left">Basic Constraints</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST NOT</td>
              <td align="left">CA=True, flagged as Critical</td>
            </tr>
            <tr>
              <td align="left">Subject Key Identifier (SKI)</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST NOT</td>
              <td align="left">
                <xref target="ski"/></td>
            </tr>
            <tr>
              <td align="left">Authority Key Identifier (AKI)</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">MUST</td>
              <td align="left">
                <xref target="aki"/></td>
            </tr>
            <tr>
              <td align="left">Key Usage</td>
              <td align="left">SHOULD</td>
              <td align="left">SHOULD</td>
              <td align="left">SHOULD</td>
              <td align="left">-</td>
            </tr>
            <tr>
              <td align="left">CA Policy OIDs</td>
              <td align="left">RECOMMENDED</td>
              <td align="left">RECOMMENDED</td>
              <td align="left">RECOMMENDED</td>
              <td align="left">
                <xref target="policy-oid"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="certificate-fields">
        <name>Certificate Fields</name>
        <t>The following sections contain clarifications on the usage of fields in the DKIX when they deviate from "standard" X.509 <xref target="RFC5280"/> practice or have specific functions in the context of DRIP.</t>
        <section anchor="serial-number">
          <name>Serial Number</name>
          <section anchor="lite-serial">
            <name>Lite</name>
            <t>The Serial Number is a MUST field, but it has no usage in this DRIP-Lite. It is 1-byte in size and thus duplicates are guaranteed. To drop this field could make many X.509 parsing libraries fail.</t>
            <t>However, CA certificate's Serial Number MAY be the common 20 bytes. This is to avoid possible issues with general software expecting this size Serial Numbers for CAs.</t>
            <t>If Serial Numbers are incrementally assigned, 31 bits are sufficient for an Issuing CA with 2B DETs active. A CA should determine its best-used Serial Number field size to limit the impact of this field on the certificate size.</t>
          </section>
          <section anchor="full-serial">
            <name>Full</name>
            <t>The certificates will contain a 20-byte randomly generated Serial Number, compliant with CABForum recommendations. Serial Numbers are included for CRL functionality.</t>
          </section>
        </section>
        <section anchor="ca-subject">
          <name>Subject</name>
          <t>The Subject field is only used in Authorization and Issuing Certificates. For Operational Certificates, the Subject is Empty and the DET will be in Subject Alternative Name (SAN, <xref target="san-ip6"/>). In the SAN, the DET can be properly encoded as an IPv6 address.</t>
          <t>The format defined in <xref target="ca-subject-format"/> MUST be used. The CA Subject Name serves a dual purpose: foremost, to place the CA within the DKI tree, but secondly for outside of DRIP usage to tag that this CA's function is to serve DRIP Entities.</t>
          <figure anchor="ca-subject-format">
            <name>CA Subject Format</name>
            <artwork><![CDATA[
DRIP-{APEX|RAA|HDA}-{A|I}[-RAA#][-HDA#]
]]></artwork>
          </figure>
          <t>As examples; an Authorization DET for RAA 16376 would be: <tt>DRIP-RAA-A-16376</tt> and an Issuing DET for HDA 16376 under the same RAA would be: <tt>DRIP-HDA-I-16376-16376</tt>.</t>
        </section>
        <section anchor="issuer">
          <name>Issuer</name>
          <t>The Issuer MUST be the higher level's DET.</t>
          <t>The Issuer for the Apex Authorization certificate MUST be its DET (indicating self-signed). If the RAA Authorization certificate is self-signed (i.e., no Apex), its Issuer is its DET.</t>
          <t>The Issuer content of its DET assists in finding this specific Issuer in the DRIP <tt>ip6.arpa.</tt> DNS tree and any additional information.</t>
        </section>
        <section anchor="san-ip6">
          <name>Subject Alternative Name IP6</name>
          <t>Subject Alternative Name is only used in Operational certificates. It is used to provide the DET as an IP address with an Empty Subject (SAN MUST be flagged as Critical).</t>
          <t>The Subject Alternative Name is also used in Manufacturer DET certificates. These may contain the <tt>hardwareModuleName</tt> as described in <xref target="_802.1AR"/> that references <xref target="RFC4108"/>.</t>
          <t>Per <xref target="RFC5280"/> and <xref target="_802.1AR"/>, Manufacturer DET certificates with <tt>hardwareModuleName</tt> MUST have the notAfter date as <tt>99991231235959Z</tt>.</t>
        </section>
        <section anchor="san-uri">
          <name>Subject Alternative Name URI</name>
          <t>This field contains a pointer in the form of a URI where additional information on the CA and certificates under its control can be found. For example, an authorized authority may access end-entity PII like an Operator phone number through this URI link using the method specified in <xref target="priv-info-reg"/>.</t>
          <t>Authorization certificates MAY have a SAN URI and MUST when it is self-signed. Issuing certificates SHOULD have a SAN URI. Operational certificates MAY have a SAN URI.</t>
          <t>The RECOMMENDED configuration with respect to Issuing and Operational certificates for a CA is to place the SAN URI in the Issuing certificate and exclude them in Operational certificates. When multiple providers are used by the CA to handle additional information there SHOULD be a unique Issuing certificate with SAN URI for each provider, and Operational certificates MUST NOT contain a SAN URI. Otherwise a CA with multiple providers MUST NOT have a SAN URI in the Issuing certificate and MUST set the SAN URI to the specific provider for each Operational certificate.</t>
          <t>The contents of the SAN URI are the base URI of the host to query for additional information of a DET.</t>
          <ul empty="true">
            <li>
              <t>Author Note: do we want to create a <tt>./well-known/hhit-query</tt>? Then base URIs in the certificates can become something like: <tt>https://hda.example.com</tt>, then the clients append <tt>/.well-known/hhit-query/&lt;ip6&gt;</tt> (<tt>&lt;ip6&gt;</tt> here is a specific DET). Path preservation can then be used by the server to replace <tt>/.well-known/hhit-query/</tt> with whatever is required on the path for the specific server such as <tt>/my/bloated/path/to/rdap/ip/</tt>.</t>
            </li>
          </ul>
        </section>
        <section anchor="ski">
          <name>Subject Key Identifier</name>
          <t>The Subject Key Identifier MUST be the DET. This is a major deviation from "standard" X.509 certificates that hash (normally with SHA2) the Public Key to fill the Subject Key Identifier.</t>
          <t>The Subject Key Identifier is NOT included in Operational certificates. If needed by some application, it is identical with SAN.</t>
        </section>
        <section anchor="aki">
          <name>Authority Key Identifier</name>
          <t>The Authority Key Identifier MUST be the higher level's Subject Key Identifier (i.e. DET). This partially follows standard practice to chain up the Authority Key Identifier from the Subject Key Identifier, except for how the Subject Key Identifiers are populated.</t>
          <t>The Authority Key Identifier for the Apex Authorization (or self-signed RAA Authorization) certificate MUST be the Subject Key Identifier (indicating self-signed).</t>
        </section>
        <section anchor="policy-oid">
          <name>CA Policy OIDs</name>
          <t>It is recommended that a CA have policy OIDs defining rules for EEs within its domain. The OIDs used here will tend to be within ICAO's arc of <tt>1.3.27.16</tt>.</t>
          <t>If the CA certificate has policy OIDs, it MUST include an ICAO LOA OID (arc of <tt>1.3.27.16.1.1.0</tt>) defining "the confidence in the security measures that protect the private key and manage the certificate lifecycle".</t>
          <table anchor="loa-oid-table">
            <name>ICAO LOA OID Assignments under 1.3.27.16.1.1.0</name>
            <thead>
              <tr>
                <th align="left">OID</th>
                <th align="left">Description</th>
                <th align="left">Applicability</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">1</td>
                <td align="left">Low</td>
                <td align="left">This level is relevant to environments where Risks and consequences of data Compromise are low. Subscriber Private Keys shall be stored in software at this Identity Assurance Level (IAL).</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">LowDevice</td>
                <td align="left">This policy is identical to that defined for the Low Assurance policy (above) with the exception of identity proofing, re-key, and Activation Data.</td>
              </tr>
              <tr>
                <td align="left">3</td>
                <td align="left">Low-TSP Mediated Signature</td>
                <td align="left">This policy is identical to that defined for the Low Assurance policy (above) with the exception that the Private key is not in the possession of the user, but rather by a Trust Service Provider.</td>
              </tr>
              <tr>
                <td align="left">4</td>
                <td align="left">Medium</td>
                <td align="left">This level is relevant to environments where Risks and consequences of data Compromise are moderate. This may include transactions having substantial monetary value or Risk of fraud or involving access to private information where the likelihood of malicious access is substantial. Subscriber Private Keys shall be stored in software at this IAL.</td>
              </tr>
              <tr>
                <td align="left">5</td>
                <td align="left">MediumDevice</td>
                <td align="left">This policy is identical to that defined for the Medium Assurance policy (above) with the exception of identity proofing, re-key, and Activation Data.</td>
              </tr>
              <tr>
                <td align="left">6</td>
                <td align="left">Medium-TSP Mediated Signature</td>
                <td align="left">This policy is identical to that defined for the Medium Assurance policy (above) with the exception that the Private key is not in the possession of the user, but rather by a Trust Service Provider.</td>
              </tr>
              <tr>
                <td align="left">7</td>
                <td align="left">MediumHardware</td>
                <td align="left">This policy is identical to that defined for the Medium Assurance policy (above) with the exception of Subscriber Cryptographic Module requirements described in <xref target="ICAO-ACCP"/>.</td>
              </tr>
              <tr>
                <td align="left">8</td>
                <td align="left">MediumDeviceHardware</td>
                <td align="left">This policy is identical to that defined for the Medium Hardware Assurance policy (above) with the exception of identity proofing, re-key, and Activation Data.</td>
              </tr>
              <tr>
                <td align="left">9</td>
                <td align="left">High</td>
                <td align="left">This level is relevant to environments where Risks and consequences of data Compromise are high. Certificates issued at the High-CardAuth IAL shall only be issued for Card Authentication, as defined by NIST SP 800-73 or equivalent standard. Further, this policy is identical to that defined for the identical to the MediumHardware IAL except where specifically noted in <xref target="ICAO-ACCP"/>.</td>
              </tr>
              <tr>
                <td align="left">10</td>
                <td align="left">High-CardAuth</td>
                <td align="left">This level is relevant to environments where Risks and consequences of data Compromise are high. Certificates issued at the High-cardAuth IAL shall only be issued for Card Authentication, as defined by NIST SP 800-73 or equivalent standard.</td>
              </tr>
              <tr>
                <td align="left">11</td>
                <td align="left">High-ContentSigning</td>
                <td align="left">This level is relevant to environments where Risks and consequences of data Compromise are High. This may include transactions having substantial monetary value or Risk of fraud or involving access to private information where the likelihood of malicious access is substantial. Certificates issued at the High IAL shall only be issued to human Subscribers.Certificates issued at the High-contentSigning IAL shall only be issued to the CMS for signing the HIGH card security objects (e.g. Certificates, CRLs, OCSP responses). Further, this policy is identical to that defined for the identical to the MediumHardware IAL except where specifically noted in <xref target="ICAO-ACCP"/>.</td>
              </tr>
            </tbody>
          </table>
          <t>In this document, the term “Device” is defined as a Non-Person Entity, i.e., an entity with a digital identity that acts in cyberspace but is not a human actor. This can include Organizations, hardware devices (e.g. a UA), software applications, and information artifacts.</t>
          <t>Operational Certificates issued to Devices shall assert policies mapped to LowDevice, MediumDevice, MediumDeviceHardware, or High Content Signing policies. All other policies defined here should be reserved for human Subscribers when used in Operational Certificates. Thus it is recommended that Issuing CAs/HDAs should be segregated by device and human subscribers so policy can be stated at the CA level rather in individual certificates.</t>
        </section>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
