<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wiethuechter-drip-detim-arch-00" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="DETIM Architecture">DRIP Entity Tag (DET) Identity Management Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-detim-arch-00"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="S." surname="Card" fullname="Stuart Card">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street/>
          <city>Oak Park</city>
          <region>MI</region>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2022" month="September" day="27"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the high level architecture for the registration and discovery of DRIP Entity Tags (DETs) using DNS technologies and practices. Discovery of DETs and their artifacts are through the existing DNS structure and methods by using FQDNs. A general overview of the interfaces required between components is described in this document with supporting documents giving technical specifications.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Registries are fundamental to Remote ID (RID). Only very limited operational information can be Broadcast, but extended information is sometimes needed. The most essential element of information sent is the UAS ID itself, the unique key for lookup of extended information in registries.</t>
      <t>While it is expected that registry functions will be integrated with USS, who will provide them is not yet determined in most, and is expected to vary between, jurisdictions. However this evolves, the essential registry functions, starting with management of identifiers, are expected to remain the same, so are specified herein.</t>
      <t>While most data to be sent via Broadcast or Network RID is public, much of the extended information in registries will be private. Thus AAA for registries is essential, not just to ensure that access is granted only to strongly authenticated, duly authorized parties, but also to support subsequent attribution of any leaks, audit of who accessed information when and for what purpose, etc. As specific AAA requirements will vary by jurisdictional regulation, provider philosophy, customer demand, etc., they are left to specification in policies, which should be human readable to facilitate analysis and discussion, and machine readable to enable automated enforcement, using a language amenable to both, e.g., XACML.</t>
      <t>The intent of the negative and positive access control requirements on registries is to ensure that no member of the public would be hindered from accessing public information, while only duly authorized parties would be enabled to access private information. Mitigation of Denial of Service attacks and refusal to allow database mass scraping would be based on those behaviors, not on identity or role of the party submitting the query per se, but querant identity information might be gathered (by security systems protecting DRIP implementations) on such misbehavior.</t>
      <t>Registration under DRIP is vital to manage the inevitable collisions in the hash portion of the DET. Forgery of the DET is still possible, but including it as a part of a public registration mitigates this risk. This document creates the DRIP DET registration and discovery ecosystem.  This includes all components in the ecosystem (e.g., RAA, HDA, UA, GCS, USS).</t>
      <section anchor="abstract-process-reasoning" numbered="true" toc="default">
        <name>Abstract Process &amp; Reasoning</name>
        <t>In DRIP each entity (registry, operator and aircraft) is expected to generate a full DRIP Entity ID <xref target="drip-rid" format="default"/> on the local device their key is expected to be used. These are registered with a Public Information Registry within the hierarchy along with whatever data is required by the cognizant CAA and the registry. Any PII is stored in a Private Information Registry protected through industry practice AAA or better. In response, the entity will obtain an endorsement from the registry proving such registration.</t>
        <t>Manufacturers that wish to participate in DRIP should not only support DRIP as a Session ID type for their aircraft but also generate a DET then encode it as a Serial Number. This would allow aircraft under CAA mandates to fly only ID Type 1 (Serial Number) could still use DRIP and most of its benefits. Even if DRIP is not supported for Serial Numbers by a Manufacturer it is hoped that they would still run a registry to store their Serial Numbers and allow look ups for generic model information. This look up could be especially helpful in UTM for Situational Awareness when an aircraft flying with a Serial Number is detected and allow for an aircraft profile to be displayed.</t>
        <t>Operators are registered with a number of registries or their regional RAA. This acts as a verification check when a user performs other registration operations; such as provisioning an aircraft with a new Session ID. It is an open question if an Operator registers to their CAA (the RAA) or multiple USS's (HDA's). PII of the Operator would vary based on the CAA they are under and the registry.</t>
        <t>Finally aircraft that support using a DET would provision per flight to a USS, proposing a DET to the registry to generate a binding between the aircraft (Session ID, Serial Number and Operational Intent), operator and registry. Aircraft then follow <xref target="drip-auth" format="default"/> to meet various requirements from <xref target="RFC9153" format="default"/> during flight.</t>
      </section>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <section anchor="required-terminology" numbered="true" toc="default">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions" numbered="true" toc="default">
        <name>Additional Definitions</name>
        <t>See <xref target="RFC9153" format="default"/> for common DRIP terms and <xref target="drip-arch" format="default"/> Section 2.2 for additional terms used in this document.</t>
        <t>HDA:</t>
        <ul empty="true" spacing="normal">
          <li>Hierarchial HIT Domain Authority. The 14 bit field identifying the HIT Domain Authority under a RAA.</li>
        </ul>
        <t>HID:</t>
        <ul empty="true" spacing="normal">
          <li>Hierarchy ID. The 28 bit field providing the HIT Hierarchy ID.</li>
        </ul>
        <t>PII:</t>
        <ul empty="true" spacing="normal">
          <li>Personally Identifiable Information. Any information a cognizant authority (such as a government agency) or a user requires differentiated access to obtain.</li>
        </ul>
        <t>RAA:</t>
        <ul empty="true" spacing="normal">
          <li>Registered Assigning Authority. The 14 bit field identifying the Hierarchical HIT Assigning Authority.</li>
        </ul>
      </section>
    </section>
    <section anchor="dime-roles" numbered="true" toc="default">
      <name>DIME Roles</name>
      <t>The DRIP Identity Management Entity (DIME) is an entity encompassed various logical components (<xref target="dime-arch" format="default"/>) and can be classified to serve a number of different roles (this section). The general hierarchy of these roles are illustrated in <xref target="reg-class-fig" format="default"/>.</t>
      <figure anchor="reg-class-fig">
        <name>Registry Hierarchy</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
                +----------+
                |   Apex   | 
                +-o------o-+
                  |      |
******************|******|*****************************
                  |      |
            +-----o-+  +-o-----+
RAAs        |  IRM  |  |  RAA  o------.
            +---o---+  +---o---+      '
                |          |          |
****************|**********|**********|****************
                |          |          |
            +---o---+  +---o---+  +---o---+
HDAs        |  MRA  |  | RIDR  |  |  HDA  |
            +-------+  +-------+  +-------+
]]></artwork>
      </figure>
      <section anchor="apex" numbered="true" toc="default">
        <name>Apex</name>
        <t>The apex is special DIME role that holds the value of RAA=0 and HDA=0. It serves as the branch point from the larger DNS system in which HHITs are defined. The Apex generally has prefix portions of the HHIT associated with it (such as 2001:0030/28) which are assigned by IANA from the non-routable special IPv6 address space for ORCHIDs (where HHITs are derived from).</t>
        <t>The Apex manages all delegations and allocations of the HHIT's RAA to various parties with NS records to redirect DNS queries to proper sub-branches.</t>
      </section>
      <section anchor="raa" numbered="true" toc="default">
        <name>Registered Assigning Authority (RAA)</name>
        <t>RAA's are the upper hierarchy in DRIP (denoted by a 14-bit field (16,384 RAAs) of an HHIT). An RAA is a business or organization that manages a registry of HDAs (<xref target="hda" format="default"/>). Most are contemplated to be Civil Aviation Authorities (CAA), such as the Federal Aviation Authority (FAA), that then delegate HDAs to manage their National Air Space (NAS). This is does not preclude other entities to operate an RAA if the Apex allows it.</t>
        <t>For DRIP and the UAS use case ICAO will handle the registration of RAAs. Once ICAO accepts an RAA, it will assign a number and create a zone delegation under the <tt>&lt;prefix&gt;.hhit.arpa.</tt> DNS zone for the RAA.</t>
        <t>As DETs may be used in many different domains, RAA should be allocated in blocks with consideration on the likely size of a particular usage. Alternatively, different prefixes can be used to separate different domains of use of HHITs.</t>
        <t>An RAA must provide a set of services to allocate HDAs to organizations. It must have a public policy on what is necessary to obtain an HDA. It must maintain a DNS zone minimally for discovering HID RVS servers. All RAA's use an HDA value of 0 and have their RAA value delegated to them by the Root.</t>
        <section anchor="irm" numbered="true" toc="default">
          <name>ICAO Registry of Manufacturers (IRM)</name>
          <t>An RAA-level DIME that hands out HDA values to participating Manufacturer's that hold an ICAO Manufacturer Code used in <xref target="CTA2063A" format="default"/>.</t>
          <t>To manage the large ICAO Manufacturer Code space (34  character set; 4 characters; 1,336,336 possible codes) a range of RAA values are set aside for the DRIP use case. These are the RAA values of 2 (0x0002) up to 96 (0x0060). This allows a single HDA for each Manufacturer Code.</t>
          <t>All IRM's have two reserved HDA values. 0 (0x0000) for itself in its role as an RAA and 1 (0x0001) if it wishes to offer HDA services.</t>
        </section>
      </section>
      <section anchor="hda" numbered="true" toc="default">
        <name>Hierarchial HIT Domain Authority (HDA)</name>
        <t>An HDA may be an USS, ISP, or any third party that takes on the business to register the actual UAS entities that need DETs.  This includes, but is not limited to UA, GCS, and Operators. It should also provide needed UAS services including those required for HIP-enabled devices (e.g. RVS).</t>
        <t>The HDA is a 14-bit field (16,384 HDAs per RAA) of a DET assigned by an RAA.  An HDA should maintain a set of RVS servers for UAS clients that may use HIP.  How this is done and scales to the potentially millions of customers are outside the scope of this document. This service should be discoverable through the DNS zone maintained by the HDA's RAA.</t>
        <t>An RAA may assign a block of values to an individual organization. This is completely up to the individual RAA's published policy for delegation. Such policy is out of scope.</t>
        <section anchor="mra" numbered="true" toc="default">
          <name>Manufacturers Registry of Aircraft (MRA)</name>
          <t>An HDA-level DIME run by a manufacturer of UAS systems that participate in Remote ID. Stores UAS Serial Numbers under a specific ICAO Manufacturer Code (assigned to the manufacturer by ICAO).</t>
          <t>A DET can be encoded into a Serial Number (see <xref target="drip-rid" format="default"/>) and this registry would hold a mapping from the Serial Number to the DET and its artifacts.</t>
          <section anchor="ridr" numbered="true" toc="default">
            <name>Remote ID Registries (RIDR)</name>
            <t>An HDA-level DIME that holds the binding between a UAS Session ID (for DRIP the DET) and the UA Serial Number. The Serial Number MUST have its access protected to allow only authorized parties to obtain. The Serial Number SHOULD be encrypted in a way only the authorized party can decrypt.</t>
            <t>As part of the UTM system they also hold a binding between a UAS ID (Serial Number or Session ID) and an Operational Intent. They may either be a direct logical part of a UAS Service Supplier (USS) or be a UTM wide service to USS's.</t>
          </section>
        </section>
      </section>
      <section anchor="role-abbreviation-in-dets" numbered="true" toc="default">
        <name>Role Abbreviation in DETs</name>
        <t>On receiver devices a DET can be translated to a more human readable form such as: <tt>{RAA Abbreviation} {HDA Abbreviation} {Last 4 Characters of DET Hash}</tt>. An example of this would be <tt>US FAA FE23</tt>. To support this DIMEs are RECOMMENDED to have an abbreviation that could be used for this form. These abbreviations SHOULD be a maximum of six characters in length. Spaces SHOULD NOT be used and be replaced with either underscores (<tt>_</tt>) or dashes (<tt>-</tt>). For RAAs the abbreviation is RECOMMENDED to be set to the ISO 3166 country code (either Alpha-2 or Alpha-3) for the CAA.</t>
        <t>If a DIME does not have an abbreviation or it can not be looked up then the receiver SHOULD use the hexadecimal encoding of the field it is missing.</t>
      </section>
    </section>
    <section anchor="dime-arch" numbered="true" toc="default">
      <name>DIME Architecture</name>
      <figure anchor="dime-arch-fig">
        <name>Registry Hierarchy</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+--------------------+
| Registering Client |
+------------o-------+
             |
*************|*************************************************************************
*            |              DRIP Indentity Management Entity                          *
*            |                                                                        *
*     +------o-------+              +-------------+              +--------------+     *
*     | DRIP         |              |             |              |              |     *
*     | Provisioning o--------------o             |              |              |     *
*     | Agent        |              |             |              |              |     *
*     +-------o------+              |             |              |              |     *
*             |                     |             |              |              |     *
*             |                     | DRIP        |              | Registration |     *
*     +-------o--+                  | Information o--------------o Data         |     *
*     | Registry o------------------o Agent       |              | Directory    |     *
*     +-------o--+                  |             |              | Service      |     *
*             |                     |             |              |              |     *
*             |                     |             |              |              |     *
*     +-------o-----+               |             |              |              |     *
*     | Name Server |               |             |              |              |     *
*     +------o------+               +-----o-------+              +------o-------+     *
*            |                            |                             |             * 
*            |                            |                             |             *
*************|****************************|*****************************|**************
             |                            |                             |
             |                    +-------o-------+                     |
             '--------------------o Lookup Client o---------------------'
                                  +---------------+
]]></artwork>
      </figure>
      <t>The DIME, in any of its roles (<xref target="dime-roles" format="default"/>), is comprised of a number of logical components that perform specific functions. Any of these components in <xref target="dime-arch" format="default"/> could be delegated to other entities as a service both co-located or remote. For example the Name Server component could be handled by a well established DNS registrar/registry with the DRIP Provisioning Agent (DPA) (<xref target="dpa" format="default"/>) interfacing to them. Another common example may be the DPA, Registry and Name Server are all co-located in one implementation with an interface to a DRIP Information Agent (DIA) offered by another organization.</t>
      <section anchor="dpa" numbered="true" toc="default">
        <name>DRIP Provisioning Agent (DPA)</name>
        <t>The DPA performs the important task of vetting information (such as the DRIP Endorsements) coming from clients wishing to register and then delegate (internally or externally) various items to other components in the DIME.</t>
        <t>A standard interface over HTTPS MUST be provided for clients to access with JSON or CBOR encoding of objects being sent to the DPA. This interface specification is out of scope for this document.</t>
        <t>There MUST be an interface from the DPA to a Registry (<xref target="registry" format="default"/>) component which handles the DNS specific requirements of the DIME as defined by the Registry. There MAY also be interface from the DPA to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
      </section>
      <section anchor="registry" numbered="true" toc="default">
        <name>Registry</name>
        <t>The Registry component handles all the required DNS based requirements of the DIME to function for DRIP. This includes the registration and maintenance of various DNS Resource Records which use the DRIP FQDNs (<xref target="drip-fqdn" format="default"/>).</t>
        <t>A standardized interface MUST be implemented for interactions with the DPA (<xref target="dpa" format="default"/>). This interface MAY be over HTTPS using JSON/CBOR encoding or MAY use the Extensional Provisioning Protocol (EPP) <xref target="RFC5730" format="default"/>. The specifications of either of these interfaces is out of scope for this document.</t>
        <t>There MAY be interface from the Registry to a DRIP Information Agent (<xref target="dia" format="default"/>) as defined by the DIA.</t>
      </section>
      <section anchor="nameserver" numbered="true" toc="default">
        <name>Name Server (NS)</name>
        <t>This may be very important here as we should not preclude a USS from running his own Name Server but they are not DNS experts and will need guidance or at least pointers to it to not mess it up. Such as SOA and NS formats to allow delegation if as RAA.</t>
        <t>Most of time is probably outsourced.</t>
        <t>The interface of the Name Server to any component (nominally the Registry) in a DIME is out of scope as typically they are implementation specific.</t>
      </section>
      <section anchor="dia" numbered="true" toc="default">
        <name>DRIP Information Agent (DIA)</name>
        <t>The DIA is the main component handling requests for information from entities outside of the DIME. Typically this is when an Observer looks up a Session ID from an UA and gets pointed to the DIA via a SVR RR to obtain information not available via DNS.</t>
        <t>The information contained in the DIA is generally more oriented around the Operator of a given UAS and is thus classified as Personally Identifiable Information (PII). To protect the privacy of an Operator of the UAS this information is not publicly accessible and is only available behind policy driven differentiated access mechanisms. As an example the Serial Number, under the FAA, is classified as PII and can only be accessed by federal entities (such as the FAA themselves).</t>
        <t>For DRIP the Registration Data Access Protocol (RDAP) (<xref target="RFC7480" format="default"/>, <xref target="RFC9082" format="default"/> and <xref target="RFC9083" format="default"/>) is the selected protocol to provide policy driven differentiated access for queries of information.</t>
        <t>A standard interface over HTTPS MUST be provided for clients to access with JSON/CBOR encoding of objects being sent to the DIA. There MUST also be a standardized interface for the DPA or Registry to add, update or delete information into the DIA. Both of these interfaces are out of scope for this document.</t>
        <t>An interface defined by the Registration Data Directory Service (RDDS) (<xref target="rdds" format="default"/>) is also required as specified by the RDDS.</t>
      </section>
      <section anchor="rdds" numbered="true" toc="default">
        <name>Registration Data Directory Service (RDDS)</name>
        <t>This is the primary information database for the DIA. An interface MUST be provided to the DIA but its specification is out of scope as they are typically implementation specific.</t>
      </section>
    </section>
    <section anchor="registrationprovisioning-process" numbered="true" toc="default">
      <name>Registration/Provisioning Process</name>
      <t>The general process for a registering party is as follows:</t>
      <ol spacing="normal" type="1"><li>Verify input Endorsement(s) from registering party</li>
        <li>Check for collision of DET and HI</li>
        <li>Populate Registry/Name Server with required/optional resource records using the FQDN</li>
        <li>Populate DIA/RDDS with PII and other info</li>
        <li>Generate and return required/optional Endorsements/Certificates</li>
      </ol>
      <t>In the following subsections an abbreviated form of <xref target="dime-arch" format="default"/> using component abbreviations is used to describe the flow of information. The data elements being transmitted between entities is marked accordingly in each figure for the specific examples.</t>
      <section anchor="serial-number" numbered="true" toc="default">
        <name>Serial Number</name>
        <t>Primarily registered to MRA's (<xref target="mra" format="default"/>) by the Manufacturers. Could be also registered to CAA's (using their HDA functionality) as part of Operator registration or to USS's in their capacity as HDAs. In the later two cases no DNS RRs are made to protect the privacy of the registering parties.</t>
        <t>When the Serial Number is really an encoded DET the DET FQDN is used to point to HIP and CERT RRs rather than the Serial Number FQDN. Instead a CNAME is made between the Serial Number FQDN and the DET FQDN. The same can still happen if the manufacturer chooses to use their own Serial Number formatting (still within the specification of <xref target="CTA2063A" format="default"/>) and create the CNAME back to a DET loaded into the unmanned aircraft.</t>
        <figure anchor="dime-sn-example">
          <name>Example DIME:MRA with Serial Number (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +-------------------+
    | Unmanned Aircraft |
    +--o---o------------+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: MRA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Serial Number, UA Information, UA Self-Endorsement
(b) Success Code, Endorsement: MRA on UA
(c) HIP RR, CERT RRs
(d) UA Information
]]></artwork>
        </figure>
        <t>The unmanned aircraft, intending to use DRIP, generates a keypair, DET and <tt>Self-Endorsement: UA</tt> using the RAA and HDA values specified by the manufacturers DIME (running as an MRA). The DET is converted into a Serial Number (per <xref target="drip-rid" format="default"/>) or the manufacturer creates their own Serial Number.</t>
        <t>The Serial Number, UA information and the <tt>Self-Endorsement: UA</tt> are sent to the manufacturers DIME. The DIME validates the Self-Endorsement and checks for DET and HI collisions in the Name Server/DIA. A <tt>Broadcast Endorsement: DIME on UA</tt> is generated which is provisioned into the aircraft for use when using the Serial Number as its UAS ID. In the Name Server HIP RRs are created using the DET FQDN while a CNAME points the Serial Number FQDN to the DET FQDN.</t>
        <ul empty="true" spacing="normal">
          <li>Note: <xref target="dime-sn-example" format="default"/> is specific for a DET encoded Serial Number. The Endorsements in (a) and (b) as well as RRs in (c) would not be present for non-DET based Serial Numbers.</li>
        </ul>
      </section>
      <section anchor="operator" numbered="true" toc="default">
        <name>Operator</name>
        <t>Either by USS or CAA run HDAs. Regulation might require interaction between them. An Operator can request that certain information normally generated and provisioned into DNS be omitted due to privacy concerns.</t>
        <figure anchor="dime-operator-example">
          <name>Example DIME:HDA with Operator (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +----------+
    | Operator |
    +--o---o---+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: HDA               *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Operator Information, Operator Self-Endorsement
(b) Success Code, Endorsement: HDA on Operator
(c) HIP RR, CERT RRs
(d) Operator Information
]]></artwork>
        </figure>
        <t>The Operator generates a keypair and DET as specified in <xref target="drip-rid" format="default"/> along with a self-signed endorsement (<tt>Self-Endorsement: Operator</tt>). The RAA and HDA values used in the DET generation for the Operator are found by referencing their selected DIME of choice (in <xref target="dime-operator-example" format="default"/> an HDA).</t>
        <t>The self-signed endorsement along with other relevant information (such as Operator PII) is sent to the DIME over a secure channel. The specification of this secure channel is out of scope for this document.</t>
        <t>The DIME cross checks any personally identifiable information as required. <tt>Self-Endorsement: Operator</tt> is verified. The DET and HI is searched in the DIME DIA and Name Server to confirm that no collisions occur. A new endorsement is generated (<tt>Endorsement: DIME on Operator</tt>) and sent securely back to the Operator. Resource Records for the HI and Endorsements are added to the DIME Registry/Name Server.</t>
        <t>With the receipt of <tt>Endorsement: DIME on Operator</tt> the registration of the Operator is complete.</t>
        <ul empty="true" spacing="normal">
          <li>Note: (c) in <xref target="dime-operator-example" format="default"/> MAY be requested by the Operator to be omitted due to PII concerns.</li>
        </ul>
      </section>
      <section anchor="session-id" numbered="true" toc="default">
        <name>Session ID</name>
        <t>Session IDs are generally handled by HDAs, specifically RIDRs. In <xref target="dime-sid-example" format="default"/> the UAS comprises of an unmanned aircraft and a Ground Control Station (GCS). Both parties are involved in the registration process.</t>
        <figure anchor="dime-sid-example">
          <name>Example DIME:RIDR with Session ID (DET) Registration</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
    +---------+
    |   UAS   |
    +--o---o--+
       |   ^
   (a) |   | (b)
       |   |
*******|***|*****************************
*      |   |    DIME: RIDR              *
*      |   |                            *
*      v   |             +----------+   *
*   +--o---o--+          |          |   *
*   |   DPA   o--------->o          |   *
*   +----o----+   (d)    |          |   *
*        |               |          |   *
*        | (c)           | DIA/RDDS |   *
*        v               |          |   *
*   +----o--------+      |          |   *
*   | Registry/NS |      |          |   *
*   +-------------+      |          |   *
*                        +----------+   *
*                                       *
*****************************************

(a) Mutual Endorsement: RIDR on GCS, Endorsement: GCS on UA, Session ID Information
(b) Success Code, Broadcast Endorsement: RIDR on UA, Endorsement: RIDR on UAS
(c) HIP RR, CERT RRs
(d) Session ID Information
]]></artwork>
        </figure>
        <t>Through mechanisms not specified in this document the Operator should have methods (via the GCS) to instruct the unmanned aircraft onboard systems to generate a keypair, DET and Self-Endorsement: UA. The <tt>Self-Endorsement: UA</tt> is extracted by the Operator onto the GCS.</t>
        <t>The GCS is already pre-provisioned and registered to the DIME with its own keypair, DET, <tt>Self-Endorsement: GCS</tt> and <tt>Endorsement: RIDR on GCS</tt>. The GCS creates a new <tt>Endorsement: GCS on UA</tt> and also creates <tt>Mutual Endorsement: RIDR on GCS</tt>. These new endorsements along with Session ID Information are sent to the DIME via a secure channel.</t>
        <t>The DIME validates all the endorsements and checks for DET and HI collisions in the Name Server/DIA using the proposed UA DET. A <tt>Broadcast Endorsement: DIME on UA</tt> is generated. An <tt>Endorsement: RIDR on UAS</tt> is generated using the <tt>Endorsement: GCS on UA</tt>. HIP and CERT RRs are provisioned into the Registry/Name server. Both endorsements are back to the GCS on a secure channel.</t>
        <t>The GCS then injects the Broadcast <tt>Endorsement: RIDR on UA</tt> securely into the unmanned aircraft. <tt>Endorsement: RIDR on GCS</tt> is securely stored by the GCS.</t>
        <ul empty="true" spacing="normal">
          <li>Note: in <xref target="dime-sid-example" format="default"/> the Session ID Information is expected to contain the Serial Number along with other PII specific information (such as UTM data) related to the Session ID.</li>
        </ul>
        <section anchor="ua-based" numbered="true" toc="default">
          <name>UA Based</name>
          <t>There MAY be some unmanned aircraft that have their own Internet connectivity allowing them to register a Session ID themselves without outside help from other devices such as a GCS. When such a system is in use its imperative that the Operator has some method to create the Endorsement: Operator on UA to send to the DIME. The process and methods to perform this are out of scope for this document but MUST be done in a secure fashion.</t>
        </section>
        <section anchor="uas-based" numbered="true" toc="default">
          <name>UAS Based</name>
          <t>Most unmanned aircraft will not have their own Internet connectivity but will have a connection to a GCS. Typically a GCS is an application on a user device (such as smartphone) that allow the user to fly their aircraft. For the Session ID registration the DIME MUST be provided with an Endorsement: GCS on UA which implies there is some mechanism extracting and inserting information from the unmanned aircraft to the GCS. These methods MUST be secure but are out of scope for this document.</t>
          <t>With this system it is also possible to have the GCS generate the DET based Session ID and insert it securely into the unmanned aircraft after registration is done. This is NOT RECOMMENDED as this invalidates the objective of the asymmetric cryptography in the underlying DET as the private key MAY get in the posession of another entity other than the unmanned aircraft. See <xref target="det-gen-concern" format="default"/> for more details.</t>
        </section>
      </section>
      <section anchor="child-dime" numbered="true" toc="default">
        <name>Child DIME</name>
        <t>TODO</t>
      </section>
    </section>
    <section anchor="differentiated-access-process" numbered="true" toc="default">
      <name>Differentiated Access Process</name>
      <t>High level explanation of differentiated access goals and requirements.</t>
    </section>
    <section anchor="drip-in-the-domain-name-system" numbered="true" toc="default">
      <name>DRIP in the Domain Name System</name>
      <t>The individual DETs may be potentially too numerous (e.g., 60 - 600M) and dynamic (e.g., new DETs every minute for some HDAs) to store in a signed, DNS zone. The HDA SHOULD provide DNS service for its zone and provide the DET detail response.</t>
      <t>DNSSEC is strongly recommended (especially for RAA-level zones). Frequency of updates, size of the zone, and registry policy may impact its use.</t>
      <t>Per <xref target="drip-arch" format="default"/> all public information is stored in the DNS to satisfy REG-1 from <xref target="RFC9153" format="default"/>. CERT RRs (<xref target="cert" format="default"/>) contain public Endorsements or X.509 Certificate relevant to a given Session ID. SVR RRs (<xref target="svr" format="default"/>) point an Observer to a service to obtain further information if they have and can prove duly constituted authority.</t>
      <section anchor="prefix-to-tld-mapping" numbered="true" toc="default">
        <name>Prefix to TLD Mapping</name>
        <t>For DRIP, the prefix <tt>2001:0030/28</tt> is slated for DETs being used in UAS. Other prefixes may be allocated by IANA in future for different use cases that do not fit cleanly into an existing prefix.</t>
        <t>IANA registry for this?</t>
        <t>If so we could remove prefix from FQDN form...Stu would like this to happen</t>
      </section>
      <section anchor="drip-fqdn" numbered="true" toc="default">
        <name>DRIP Fully Qualified Domain Names</name>
        <section anchor="det-fqdn" numbered="true" toc="default">
          <name>DRIP Entity Tag</name>
          <section anchor="forward-lookup" numbered="true" toc="default">
            <name>Forward Lookup</name>
            <t>The DET has the following FQDN form:</t>
            <ul empty="true" spacing="normal">
              <li>{hash}.{oga_id}.{hda}.{raa}.{prefix}.hhit.arpa.</li>
            </ul>
            <t>When building a DET FQDN the following two things must be done:</t>
            <ol spacing="normal" type="1"><li>The RAA, HDA and OGA ID values MUST be converted from hexadecimal to decimal form.</li>
              <li>The FQDN must be built using the exploded (all padding present) form of the IPv6 address.</li>
            </ol>
            <t>Below is an example:</t>
            <artwork name="" type="" align="left" alt=""><![CDATA[
DET: 2001:0030:00a0:0145:a3ad:1952:0ad0:a69e
ID: a3ad:1952:0ad0:a69e
OGA: 5
HDA: 0014 = 20
RAA: 000a = 10
Prefix: 2001003
FQDN: a3ad19520ad0a69e.5.20.10.2001003.hhit.arpa.
]]></artwork>
            <ul empty="true" spacing="normal">
              <li>Note: any of the fields in the FQDN could be CNAME'd to more human readable interpretations. For example the DET FQDN <tt>204.2001003.hhit.arpa.</tt> may have a CNAME to <tt>uas.faa.gov</tt>; if RAA 204 was delegated to the FAA.</li>
            </ul>
          </section>
          <section anchor="reverse-lookup" numbered="true" toc="default">
            <name>Reverse Lookup</name>
            <t>The DET reverse lookup should be a standard IPv6 reverse address in <tt>ip6.arpa.</tt>.</t>
            <artwork name="" type="" align="left" alt=""><![CDATA[
$ORIGIN  5.4.1.0.0.a.0.0.0.3.0.0.1.0.0.2.ip6.arpa.
e.9.6.a.0.d.a.0.2.5.9.1.d.a.3.a    IN   PTR
]]></artwork>
          </section>
        </section>
        <section anchor="sn-fqdn" numbered="true" toc="default">
          <name>Serial Number</name>
          <t>See Section 4.2 of <xref target="drip-rid" format="default"/> for how to encode DETs as Serial Numbers.</t>
          <artwork name="" type="" align="left" alt=""><![CDATA[
Serial Number: 8653FZ2T7B8RA85D19LX
ICAO Mfr Code: 8653
Length Code: F
ID: FZ2T7B8RA85D19LX
FQDN: Z2T7B8RA85D19LX.8653.mfr.hhit.arpa.
]]></artwork>
          <t>Serial Number pose a unique problem. If we explicitly only allow HHITs be under the <tt>hhit.arpa.</tt> domain structure how do we standardize the lookup of Serial Numbers? Perhaps to look up Serial Numbers one must go to a different tree like <tt>mfr.icao.int.</tt>? We can have CNAMEs in MRAs for this but they probably need the same TLD (<tt>hhit.arpa.</tt>) to be found properly and these are clearly not HHITs.</t>
        </section>
      </section>
      <section anchor="supported-dns-records" numbered="true" toc="default">
        <name>Supported DNS Records</name>
        <section anchor="hip" numbered="true" toc="default">
          <name>HIP</name>
          <t>All DIMEs will use HIP RR <xref target="RFC8005" format="default"/> as the primary public source of DET HIs. The DETs are encoded in an FQDN (<xref target="det-fqdn" format="default"/>) and are the lookup key for the RR. DIMEs have their own DET associated with them and their respective name server will hold a HIP RR that is pointed to by their DET FQDN.</t>
          <t>MRA (<xref target="mra" format="default"/>) and RIDR (<xref target="ridr" format="default"/>) DIMEs will also have HIP RRs for their registered parties (aircraft and operators respectfully).</t>
        </section>
        <section anchor="tlsa" numbered="true" toc="default">
          <name>TLSA</name>
          <t>This RR, <xref target="RFC6698" format="default"/>, is mainly used to support DTLS deployments where the DET is used (e.g. Network RID and the wider UTM system). The HI is encoded using the SubjectPublicKeyInfo selector. DANE <xref target="RFC6698" format="default"/> is for servers, DANCE <xref target="dane-clients" format="default"/> is for clients.</t>
          <t>The TLSA RR MAY be used in place of the HIP RR, where to primary need of the DET HI is for DTLS authentication. This DNS server side optimization is for where the overhead of both RR is onerous. Thus all clients that work with the HIP RR SHOULD be able to able to extract the HI from the TLSA RR.</t>
        </section>
        <section anchor="cert" numbered="true" toc="default">
          <name>CERT</name>
          <t>Endorsements can be placed into DNS in the CERT RRs <xref target="RFC4398" format="default"/>. An exception to this is the Attestation Certificate made during Session ID registration.  This is as this particular certificate acts similar to a car registration and should be held safe by the operator.</t>
          <t>Endorsements will be stored in Certificate Type OID Private (value 254) with a base OID of <tt>1.3.6.1.4.1.6715.2</tt> and further classified by the Endorsement/Certificate Type and then Entities involved.</t>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Endorsement Type</th>
                <th align="left">OID Value</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Self-Endorsement</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Endorsement</td>
                <td align="left">2</td>
              </tr>
              <tr>
                <td align="left">Concise Endorsement</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">Mutual Endorsement</td>
                <td align="left">4</td>
              </tr>
              <tr>
                <td align="left">Link Endorsement</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Broadcast Endorsement</td>
                <td align="left">6</td>
              </tr>
            </tbody>
          </table>
          <table align="center">
            <thead>
              <tr>
                <th align="left">Entity Type</th>
                <th align="left">OID Value</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Unmanned Aircraft (UA)</td>
                <td align="left">1</td>
              </tr>
              <tr>
                <td align="left">Ground Control Station (GCS)</td>
                <td align="left">2</td>
              </tr>
              <tr>
                <td align="left">Operator (OP)</td>
                <td align="left">3</td>
              </tr>
              <tr>
                <td align="left">HDA</td>
                <td align="left">4</td>
              </tr>
              <tr>
                <td align="left">RAA</td>
                <td align="left">5</td>
              </tr>
              <tr>
                <td align="left">Root</td>
                <td align="left">6</td>
              </tr>
            </tbody>
          </table>
          <t>As an example the following OID: <tt>1.3.6.1.4.1.6715.2.6.4.1</tt> would decompose into: the base OID (<tt>1.3.6.1.4.1.6715.2</tt>), the Endorsement Type (<tt>6</tt>: Broadcast Endorsement) and then the parties involved (<tt>4</tt>: HDA, <tt>1</tt>: UA)</t>
          <t>Certificate Type X.509 as per PKIX (value 1) MAY be used to store X.509 certificates as discussed in (Appendix B).</t>
          <t>Editor Note: This OID is an initial allocation under the IANA Enterprise Number OID. It is expect that a general OID will be allocated at some point.</t>
        </section>
        <section anchor="ns" numbered="true" toc="default">
          <name>NS</name>
          <t>Used to interconnect entities</t>
        </section>
        <section anchor="svr" numbered="true" toc="default">
          <name>SVR</name>
          <t>The SVR RR for DRIP always is populated at the "local" registry level. That is an HDA's DNS would hold the SVR RR that points to that HDAs private registry for all data it manages. This data includes data being stored on its children.</t>
          <t>The best example of this is RIDR (<xref target="ridr" format="default"/>) would have a SVR RR that points to a database that contains any extra information of a Session ID it has registered. Another example is the MRA (<xref target="mra" format="default"/>) has a SVR RR pointing to where the metadata of a UA registered in the MRA can be located.</t>
          <t>In all cases the server being pointed to MUST be protected using AAA, such as using RDAP.</t>
        </section>
        <section anchor="cname" numbered="true" toc="default">
          <name>CNAME</name>
          <t>Used for SN -&gt; DET mapping and other cross TLD jumps?</t>
        </section>
      </section>
    </section>
    <section anchor="endorsements" numbered="true" toc="default">
      <name>Endorsements</name>
      <t>Under DRIP Endorsements are defined in a JSON structure that can be encode to CBOR or have their keys removed and be sent as a binary blob. When the latter is used very specific forms are defined with naming conventions to know the data fields and their lengths for parsing.</t>
      <t>The first subsection defines the structure of an Endorsement while the remain subsections define specific forms that are commonly used. The binary forms of the subsections can be found in <xref target="bin-examples" format="default"/>.</t>
      <section anchor="endorsement-structure" numbered="true" toc="default">
        <name>Endorsement Structure</name>
        <figure anchor="endorsement-json">
          <name>Endorsement JSON Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
endorsement_struct = {
    "identity": {
        "hhit": "base16 HHIT/DET",
        "hi_b16": "base16 HI",
        "hi_b64": "base64 HI"
    },
    "evidence": [
        endorsement_struct,
        "base16 data",
        "base64 data"
    ],
    "scope": {
        "vnb": 0,
        "vna": 0
    }
    "signature": {
        "sig_b16": "base16 Signature",
        "sig_b64": "base64 Signature"
    }
}
]]></artwork>
        </figure>
        <section anchor="identity" numbered="true" toc="default">
          <name>Identity</name>
          <t>The <tt>identity</tt> section is where the main identity information of the signer of the endorsement is found. This can be in many forms such as the the Base16 encoded HHIT or the raw Host Identity (HI) in either Base16 or Base64.</t>
        </section>
        <section anchor="evidence" numbered="true" toc="default">
          <name>Evidence</name>
          <t>The <tt>evidence</tt> section contain a list of the claims being asserted in the endorsement. The list order after signing can not be tampered with (resulting in different signatures) and is its content is generally well defined in specific endorsements.</t>
          <t>The content may be a blob in Base16/Base64 or be another endorsement structure.</t>
        </section>
        <section anchor="scope" numbered="true" toc="default">
          <name>Scope</name>
          <t>The <tt>scope</tt> section is more formally "the scope of validity of the endorsement". The scope can come in various forms but MUST always have a "valid not before" (<tt>vnb</tt>) and "valid not after" (<tt>vna</tt>) timestamps.</t>
          <t>Other forms of the scope could for example be a 4-dimensional volume definition. This could be in raw latitude, longitude, altitude pairs or may be a URI pointing to scope information.</t>
        </section>
        <section anchor="signature" numbered="true" toc="default">
          <name>Signature</name>
          <t>The <tt>signature</tt> section contain the signature data for the endorsement. The signature itself MUST be in either Base16 or Base64 strings. Other forms or data elements could also be present in the <tt>signature</tt> section if specified in a specific endorsement.</t>
        </section>
      </section>
      <section anchor="self-endorsement" numbered="true" toc="default">
        <name>Self-Endorsement (SE-x)</name>
        <figure anchor="se-x">
          <name>Self-Endorsement JSON Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
self_endorsement = {
    "identity": {
        "hhit": "base16 HHIT/DET"
    },
    "evidence": [
        "base16 host identity"
    ],
    "scope": {
        "vnb": 0,
        "vna": 0
    }
    "signature": {
        "sig_b16": "base16 Signature"
    }
}
]]></artwork>
        </figure>
        <t>In a Self-Endorsement the <tt>identity</tt> is a Base16 HHIT/DET, the <tt>evidence</tt> is a single element array containing the Base16 HI, and the signature is in Base16.</t>
      </section>
      <section anchor="endorsement" numbered="true" toc="default">
        <name>Endorsement (E-x.y)</name>
        <figure anchor="e-xy">
          <name>Endorsement JSON Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
endorsement = {
    "identity": {
        "hhit": "base16 HHIT/DET of X",
        "hi_b16": "base16 HI of X"
    },
    "evidence": [
        self_endorsement
    ],
    "scope": {
        "vnb": 0,
        "vna": 0
    }
    "signature": {
        "sig_b16": "base16 Signature of X"
    }
}
]]></artwork>
        </figure>
      </section>
      <section anchor="concise-endorsement" numbered="true" toc="default">
        <name>Concise Endorsement (CE-x.y)</name>
        <t>In constrained environments and when there is the guarantee of being able to lookup the DETs to obtain HIs this endorsement can be used.</t>
        <figure anchor="ce-xy">
          <name>Concise Endorsement JSON Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
concise_endorsement = {
    "identity": {
        "hhit": "base16 HHIT/DET of X",
    },
    "evidence": [
        "base16 HHIT/DET of Y"
    ],
    "scope": {
        "vnb": 0,
        "vna": 0
    }
    "signature": {
        "sig_b16": "base16 Signature of X"
    }
}
]]></artwork>
        </figure>
      </section>
      <section anchor="mutual-endorsement" numbered="true" toc="default">
        <name>Mutual Endorsement (ME-x.y)</name>
        <t>An endorsement that perform a sign over an existing Endorsement where the signer is the second party of the embedded endorsement. The DET of party Y is used as the <tt>identity</tt>.</t>
        <figure anchor="me-xy">
          <name>Mutual Endorsement JSON Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
mutual_endorsement = {
    "identity": {
        "hhit": "base16 HHIT/DET of Y",
    },
    "evidence": [
        endorsement
    ],
    "scope": {
        "vnb": 0,
        "vna": 0
    }
    "signature": {
        "sig_b16": "base16 Signature of Y"
    }
}
]]></artwork>
        </figure>
      </section>
      <section anchor="link-endorsement" numbered="true" toc="default">
        <name>Link Endorsement (LE-x.y)</name>
        <t>An endorsement that perform a sign over an existing Concise Endorsement where the signer is the second party of the embedded endorsement. The DET of party Y is used as the <tt>identity</tt>.</t>
        <figure anchor="le-xy">
          <name>Link Endorsement JSON Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
link_endorsement = {
    "identity": {
        "hhit": "base16 HHIT/DET of Y",
    },
    "evidence": [
        concise_endorsement
    ],
    "scope": {
        "vnb": 0,
        "vna": 0
    }
    "signature": {
        "sig_b16": "base16 Signature of Y"
    }
}
]]></artwork>
        </figure>
      </section>
      <section anchor="broadcast-endorsement" numbered="true" toc="default">
        <name>Broadcast Endorsement (BE-x.y)</name>
        <figure anchor="be-xy">
          <name>Broadcast Endorsement JSON Structure</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
broadcast_endorsement = {
    "identity": {
        "hhit": "base16 HHIT/DET of X",
    },
    "evidence": [
        "base16 HHIT/DET of Y",
        "base16 HI of Y
    ],
    "scope": {
        "vnb": 0,
        "vna": 0
    }
    "signature": {
        "sig_b16": "base16 Signature of X"
    }
}
]]></artwork>
        </figure>
        <t>This endorsement is required by DRIP Authentication Formats &amp; Protocols for Broadcast RID (<xref target="drip-auth" format="default"/>) to satisfy <xref target="RFC9153" format="default"/> GEN-1 and GEN-3 and is sent in its binary form (<xref target="bin-be" format="default"/>).</t>
      </section>
      <section anchor="abbreviations-file-naming-conventions" numbered="true" toc="default">
        <name>Abbreviations &amp; File Naming Conventions</name>
        <t>The names of endorsements can become quite long and tedious to write out. As such this section provides a guide to a somewhat standardized way they are written in text.</t>
        <section anchor="in-text-abbreviation" numbered="true" toc="default">
          <name>In Text Abbreviation</name>
          <t>In a long form the name of a particular endorsement can be written as follows:</t>
          <ul spacing="normal">
            <li>
              <tt>Self-Endorsement: Unmanned Aircraft</tt></li>
            <li>
              <tt>Endorsement: Operator on Aircraft</tt> or <tt>Endorsement: Operator, Aircraft</tt></li>
          </ul>
          <t>When multiple entities are listed they can be separated by either <tt>on</tt> or by <tt>,</tt>. These long forms can be shortened:</t>
          <ul spacing="normal">
            <li>
              <tt>SE(Unmanned Aircraft)</tt> or <tt>SE-ua</tt></li>
            <li>
              <tt>E(Operator, Unmanned Aircraft)</tt> or <tt>E-op.ua</tt></li>
          </ul>
          <t>Typical abbreviations for the entity can be used such as <tt>Unmanned Aircraft</tt> being shorthanded to <tt>ua</tt>.</t>
        </section>
        <section anchor="file-naming" numbered="true" toc="default">
          <name>File Naming</name>
          <t>For file naming of various endorsements a similar format to the short form is used:</t>
          <ul spacing="normal">
            <li>
              <tt>se-{hash of entity}</tt></li>
            <li>
              <tt>e-{hash of entity x}_{hash of entity y}</tt></li>
          </ul>
          <t>Some examples of file names:</t>
          <ul spacing="normal">
            <li>
              <tt>se-79d8a404d48f2ef9.cert</tt></li>
            <li>
              <tt>e-120b8f25b198c1e1_79d8a404d48f2ef9.cert</tt></li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="x509-certificates" numbered="true" toc="default">
      <name>X.509 Certificates</name>
      <section anchor="certificate-policy-and-certificate-stores" numbered="true" toc="default">
        <name>Certificate Policy and Certificate Stores</name>
        <t>X.509 certificates are optional for the DRIP entities covered in this document.  DRIP endpoint entities (EE) (i.e., UA, GCS, and Operators) may benefit from having X.509 certificates.  Most of these certificates will be for their DET and some will be for other UAS identities.  To provide for these certificates, some of the other entities covered in this document will also have certificates to create and manage the necessary PKI structure.</t>
        <t>Any Certificate Authority (CA) supporting DRIP entities SHOULD adhere to the ICAO's International Aviation Trust Framework (IATF) Certificate Policy [ICAO-IATF-CP-draft].  The CA(s) supporting this CP MUST either be a part of the IATF Bridge PKI or part of the IATF CA Trust List.</t>
        <t>EEs may use their X.509 certificates, rather than their rawPublicKey (i.e. HI) in authentication protocols (as not all may support rawPublicKey identities).  Some EE HI may not be 'worth' supporting the overhead of X.509.  Short lived DETs like those used for a single operation or even for a day's operations may not benefit from X.509. Creating then almost immediately revoking these certificates is a considerable burden on all parts of the system.  Even using a short not AfterDate will completely mitigate the burden of managing these certificates.  That said, many EEs will benefit to offset the effort. It may also be a regulator requirement to have these certificates.</t>
        <t>Typically an HDA either does or does not issue a certificate for all its DETs. An RAA may specifically have some HDAs for DETs that do not want/need certificates and other HDAs for DETs that do need them. These types of HDAs could be managed by a single entity thus providing both environments for its customers.</t>
        <t>It is recommended that DRIP X.509 certificates be stored as DNS TLSA Resource Records.  This not only generally improves certificate lookups, but also enables use of DANE <xref target="RFC6698" format="default"/> for the various servers in the UTM and particularly DRIP registry environment and DANCE <xref target="dane-clients" format="default"/> for EEs (e.g. <xref target="drip-secure-nrid-c2" format="default"/>). All DRIP certificates MUST be available via RDAP. LDAP/OCSP access for other UTM and ICAO uses SHOULD also be provided.</t>
      </section>
      <section anchor="certificate-management" numbered="true" toc="default">
        <name>Certificate Management</name>
        <t>(mostly TBD still)</t>
        <t>PKIX standard X.509 issuance practices should be used. The certificate request SHOULD be included in the DET registration request. A successful DET registration then MUST include certificate creation, store, and return to the DET registrant.</t>
        <t>Certificate revocation will parallel DET revocation. TLSA RR MUST be deleted from DNS and RDAP, LDAP, and OCSP return revoked responses. CRLs SHOULD be maintained per the CP.</t>
        <t>Details of this are left out, as there are a number of approaches and further research and experience will be needed.</t>
      </section>
      <section anchor="examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>TBD</t>
      </section>
      <section anchor="alternative-certificate-encoding" numbered="true" toc="default">
        <name>Alternative Certificate Encoding</name>
        <t>(CBOR encoded certs here.  TBD)</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>TODO: requesting <tt>hhit.arpa</tt></t>
      <section anchor="iana-drip-registry" numbered="true" toc="default">
        <name>IANA DRIP Registry</name>
        <t>This document requests a two new subregistries for Endorsement Type and Entity Type under the <eref target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-rid-28#section-8.2">DRIP registry</eref>.</t>
        <dl newline="false" spacing="normal">
          <dt>DRIP Endorsement Type:</dt>
          <dd>
  This 8-bit valued subregistry is for Endorsement Types to be used in OID's for CERT Resource Records. Future additions to this subregistry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
        </dl>
        <artwork name="" type="" align="left" alt=""><![CDATA[
| Endorsement Type        | Value     |
| ----------------------- | --------- |
| Self-Endorsement        | 1         |
| Endorsement             | 2         |
| Concise Endorsement     | 3         |
| Mutual Endorsement      | 4         |
| Link Endorsement        | 5         |
| Broadcast Endorsement   | 6         |
]]></artwork>
        <dl newline="false" spacing="normal">
          <dt>DRIP Entity Type:</dt>
          <dd>
  This 8-bit valued subregistry is for Entity Types to be used in OID's for CERT Resource Records. Future additions to this subregistry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126" format="default"/>). The following values are defined:</dd>
        </dl>
        <artwork name="" type="" align="left" alt=""><![CDATA[
| Entity Type                  | Value     |
| ---------------------------- | --------- |
| Unmanned Aircraft (UA)       | 1         |
| Ground Control Station (GCS) | 2         |
| Operator (OP)                | 3         |
| HDA                          | 4         |
| RAA                          | 5         |
| Root                         | 6         |
]]></artwork>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="key-rollover-federation" numbered="true" toc="default">
        <name>Key Rollover &amp; Federation</name>
        <t>During key rollover the DIME MUST inform all children and parents of the change - using best standard practices of a key rollover. At time of writing this is signing over the new key with the previous key in a secure fashion and it being validated by others before changing any links (in DRIPs case the NS RRs in the parent registry).</t>
        <t>A DET has a natural ability for a single DIME to hold different cryptographic identities under the same HID values. This is due to the lower 64-bits of the DET being a hash of the public key and the HID of the DET being generated. As such during key rollover, only the lower 64-bits would change and a check for a collision would be required.</t>
        <t>This attribute of the DET to have different identities could also allow for a single registry to be "federated" across them if they share the same HID value. This method of deployment has not been thoroughly studied at this time.</t>
      </section>
      <section anchor="det-gen-concern" numbered="true" toc="default">
        <name>DET Generation</name>
        <t>Under the FAA <xref target="NPRM" format="default"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>
        <t>Option 1:</t>
        <ul empty="true" spacing="normal">
          <li>The entity generates its own DET, discovering and using the RAA and HDA for the target registry. The method for discovering a registry's RAA and HDA is out of scope here. This allows for the device to generate an DET to send to the registry to be accepted (thus generating the required Self-Endorsement) or denied.</li>
        </ul>
        <t>Option 2:</t>
        <ul empty="true" spacing="normal">
          <li>The entity sends to the registry its HI for it to be hashed and result in the DET. The registry would then either accept (returning the DET to the device) or deny this pairing.</li>
        </ul>
        <t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations and connectivity it is acceptable, though not recommended, under DRIP to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft. The methods to securely inject and store keypair information in a "secure element" of the Aircraft is out of scope of this document.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9153" target="https://www.rfc-editor.org/info/rfc9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card">
              <organization/>
            </author>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter">
              <organization/>
            </author>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz">
              <organization/>
            </author>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="drip-arch" target="https://www.ietf.org/archive/id/draft-ietf-drip-arch-29.txt">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Shuai Zhao" initials="S." surname="Zhao">
              <organization>Intel</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="16" month="August" year="2022"/>
            <abstract>
              <t>   This document describes an architecture for protocols and services to
   support Unmanned Aircraft System (UAS) Remote Identification (RID)
   and tracking, plus UAS RID-related communications.  This architecture
   adheres to the requirements listed in the DRIP Requirements document
   (RFC9153).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-arch-29"/>
        </reference>
        <reference anchor="drip-rid" target="https://www.ietf.org/archive/id/draft-ietf-drip-uas-rid-01.txt">
          <front>
            <title>UAS Remote ID</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="9" month="September" year="2020"/>
            <abstract>
              <t>   This document describes the use of Hierarchical Host Identity Tags
   (HHITs) as a self-asserting and thereby trustable Identifier for use
   as the UAS Remote ID.  HHITs include explicit hierarchy to provide
   Registrar discovery for 3rd-party ID attestation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-uas-rid-01"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC4398" target="https://www.rfc-editor.org/info/rfc4398">
          <front>
            <title>Storing Certificates in the Domain Name System (DNS)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <date month="March" year="2006"/>
            <abstract>
              <t>Cryptographic public keys are frequently published, and their authenticity is demonstrated by certificates.  A CERT resource record (RR) is defined so that such certificates and related certificate revocation lists can be stored in the Domain Name System (DNS).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4398"/>
          <seriesInfo name="DOI" value="10.17487/RFC4398"/>
        </reference>
        <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository.  Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects.  This document includes a protocol specification, an object mapping template, and an XML media type registration.  This document obsoletes RFC 4930.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC6698" target="https://www.rfc-editor.org/info/rfc6698">
          <front>
            <title>The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schlyter" initials="J." surname="Schlyter">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>Encrypted communication on the Internet often uses Transport Layer Security (TLS), which depends on third parties to certify the keys used.  This document improves on that situation by enabling the administrators of domain names to specify the keys used in that domain's TLS servers.  This requires matching improvements in TLS client software, but no change in TLS server software.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6698"/>
          <seriesInfo name="DOI" value="10.17487/RFC6698"/>
        </reference>
        <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
          <front>
            <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <author fullname="B. Ellacott" initials="B." surname="Ellacott">
              <organization/>
            </author>
            <author fullname="N. Kong" initials="N." surname="Kong">
              <organization/>
            </author>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP).  It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP).  RDAP is a successor protocol to the very old WHOIS protocol.  The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="7480"/>
          <seriesInfo name="DOI" value="10.17487/RFC7480"/>
        </reference>
        <reference anchor="RFC8005" target="https://www.rfc-editor.org/info/rfc8005">
          <front>
            <title>Host Identity Protocol (HIP) Domain Name System (DNS) Extension</title>
            <author fullname="J. Laganier" initials="J." surname="Laganier">
              <organization/>
            </author>
            <date month="October" year="2016"/>
            <abstract>
              <t>This document specifies a resource record (RR) for the Domain Name System (DNS) and how to use it with the Host Identity Protocol (HIP). This RR allows a HIP node to store in the DNS its Host Identity (HI), the public component of the node public-private key pair; its Host Identity Tag (HIT), a truncated hash of its public key (PK); and the domain names of its rendezvous servers (RVSs).  This document obsoletes RFC 5205.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8005"/>
          <seriesInfo name="DOI" value="10.17487/RFC8005"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <author fullname="T. Narten" initials="T." surname="Narten">
              <organization/>
            </author>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
          <front>
            <title>Registration Data Access Protocol (RDAP) Query Format</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns.  These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9082"/>
          <seriesInfo name="DOI" value="10.17487/RFC9082"/>
        </reference>
        <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
          <front>
            <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <author fullname="A. Newton" initials="A." surname="Newton">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs).  These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9083"/>
          <seriesInfo name="DOI" value="10.17487/RFC9083"/>
        </reference>
        <reference anchor="CTA2063A" target="https://shop.cta.tech/products/small-unmanned-aerial-systems-serial-numbers">
          <front>
            <title>ANSI/CTA 2063-A Small Unmanned Aerial Systems Numbers</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="September"/>
          </front>
        </reference>
        <reference anchor="drip-auth" target="https://www.ietf.org/archive/id/draft-ietf-drip-auth-21.txt">
          <front>
            <title>DRIP Entity Tag Authentication Formats &amp; Protocols for Broadcast Remote ID</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <date day="1" month="September" year="2022"/>
            <abstract>
              <t>   This document describes how to add trust into the Broadcast Remote ID
   (RID) specification discussed in the DRIP Architecture; first trust
   in the RID ownership and second in the source of the RID messages.
   It defines message types and associated formats (sent within the
   Authentication Message) that can be used to authenticate past
   messages sent by an unmanned aircraft (UA) and provide proof of UA
   trustworthiness even in the absence of Internet connectivity at the
   receiving node.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-auth-21"/>
        </reference>
        <reference anchor="drip-secure-nrid-c2" target="https://www.ietf.org/archive/id/draft-moskowitz-drip-secure-nrid-c2-11.txt">
          <front>
            <title>Secure UAS Network RID and C2 Transport</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize</organization>
            </author>
            <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
              <organization>Linköping University</organization>
            </author>
            <date day="23" month="July" year="2022"/>
            <abstract>
              <t>   This document defines a transport mechanism for Unmanned Aircraft
   System (UAS) Network Remote ID (Net-RID).  The Broadcast Remote ID
   (B-RID) messages can be sent directly over UDP or via a more
   functional protocol using CoAP/CBOR for the Net-RID messaging.  This
   is secured via either HIP/ESP or DTLS.  HIP/ESP or DTLS secure
   messaging Command-and-Control (C2) for is also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-secure-nrid-c2-11"/>
        </reference>
        <reference anchor="dane-clients" target="https://www.ietf.org/archive/id/draft-ietf-dance-client-auth-00.txt">
          <front>
            <title>TLS Client Authentication via DANE TLSA records</title>
            <author fullname="Shumon Huque" initials="S." surname="Huque">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Viktor Dukhovni" initials="V." surname="Dukhovni">
              <organization>Two Sigma</organization>
            </author>
            <author fullname="Ash Wilson" initials="A." surname="Wilson">
              <organization>Valimail</organization>
            </author>
            <date day="24" month="March" year="2022"/>
            <abstract>
              <t>   The DANE TLSA protocol [RFC6698] [RFC7671] describes how to publish
   Transport Layer Security (TLS) server certificates or public keys in
   the DNS.  This document updates RFC 6698 and RFC 7671.  It describes
   how to additionally use the TLSA record to publish client
   certificates or public keys, and also the rules and considerations
   for using them with TLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dance-client-auth-00"/>
        </reference>
        <reference anchor="NPRM">
          <front>
            <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="bin-examples" numbered="true" toc="default">
      <name>Binary Endorsements</name>
      <section anchor="bin-se" numbered="true" toc="default">
        <name>Self-Endorsement (SE-x)</name>
        <figure anchor="bin-se-x">
          <name>Binary Self-Endorsement (Length: 120-bytes)</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                              DRIP                             |
|                           Entity Tag                          |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                          Host Identity                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                        Valid Not Before                       |
+---------------+---------------+---------------+---------------+
|                        Valid Not After                        |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="bin-e" numbered="true" toc="default">
        <name>Endorsement (E-x.y)</name>
        <figure anchor="bin-e-xy">
          <name>Binary Endorsement (Length: 240-bytes</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                       Host Identity of X                      |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             SE-y                              .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Valid Not Before by X                     |
+---------------+---------------+---------------+---------------+
|                     Valid Not After by X                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="bin-ce" numbered="true" toc="default">
        <name>Concise Endorsement (CE-x.y)</name>
        <figure anchor="bin-ce-xy">
          <name>Binary Concise Endorsement (Length: 104-bytes</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Valid Not Before by X                     |
+---------------+---------------+---------------+---------------+
|                     Valid Not After by X                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="bin-me" numbered="true" toc="default">
        <name>Mutual Endorsement (ME-x.y)</name>
        <figure anchor="bin-m-xy">
          <name>Binary Mutual Endorsement (Length: 328-bytes</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              E-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Valid Not Before by Y                     |
+---------------+---------------+---------------+---------------+
|                     Valid Not After by Y                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Y                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="bin-le" numbered="true" toc="default">
        <name>Link Endorsement (LE-x.y)</name>
        <figure anchor="bin-le-xy">
          <name>DRIP Link Endorsement (Length: 192-bytes)</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                             CA-xy                             .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Valid Not Before by Y                     |
+---------------+---------------+---------------+---------------+
|                     Valid Not After by Y                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by Y                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="bin-be" numbered="true" toc="default">
        <name>Broadcast Endorsement (BE-x.y)</name>
        <figure anchor="bin-be-xy">
          <name>DRIP Broadcast Endorsement (Length: 136-bytes)</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of X                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                             DRIP                              |
|                        Entity Tag of Y                        |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                       Host Identity of Y                      |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Valid Not Before by X                     |
+---------------+---------------+---------------+---------------+
|                     Valid Not After by X                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Signature by X                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork>
        </figure>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
