<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.14 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-wiethuechter-drip-identity-claims-02" category="std">

  <front>
    <title abbrev="identity-claims">DRIP Identity Claims</title>

    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="S." surname="Card" fullname="Stuart Card">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park</city>
          <region>MI</region>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>

    <date year="2020" month="October" day="26"/>

    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes the Identity Claims or Certificates for use in various Drone Remote ID Protocols (DRIP) and the wider Unmanned Traffic Management (UTM) system.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>DRIP Certificates are the backbone of trust in DRIP UAS RID, consisting of a chain of special certificates that results in a compact certificate that is used in Broadcast RID. Some of the certificates are stored in and are generated by the Registries (defined in <xref target="registry"/>) and allow a user to confirm the trustworthiness of an Unmanned Aircraft (herein referred to as Aircraft) even in the scenario that the Observer is disconnected from the Internet.</t>

<section anchor="use-of-the-word-certificate" title="Use of the word Certificate">

<t>The certificates defined in the document were originally referred to as Host Identity Claims as early in the documents inception the authors felt that a distinction should have been drawn between certificates and what was being defined here.</t>

<t>This was due to the term “certificate” having significant technologic and legal baggage associated with it, specifically around X.509 certificates. These type of certificates and Public Key Infrastructure invokes more legal and public policy considerations than probably any other electronic communication sector. It emerged as a governmental/business platform for trusted identity management and was pursued in international bodies with links into treaty instruments.</t>

</section>
</section>
<section anchor="terminology" title="Terminology">

<section anchor="required-terminology" title="Required Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="definitions" title="Definitions">

<t>See <xref target="drip-requirements"/> for common DRIP terms.</t>

<t><list style="hanging">
  <t hangText='HDA:'>
  Hierarchial HIT Domain Authority. The 16 bit field identifying the HIT Domain Authority under a RAA.</t>
  <t hangText='HID:'>
  Hierarchy ID. The 32 bit field providing the HIT Hierarchy ID (i.e. RAA + HDA).</t>
  <t hangText='RAA:'>
  Registered Assigning Authority. The 16 bit field identifying the Hierarchical HIT Assigning Authority.</t>
</list></t>

</section>
</section>
<section anchor="drip-certificates" title="DRIP Certificates">

<t>The DRIP Certificates is a set of custom certificates to be used in the USS/UTM system. They are created during the provision of an Aircraft and are tied to the UAS ID <xref target="drip-rid"/>.</t>

<t>These certificates when chained together can create a chain of trust back to the manufacturer itself during the initial production of a given Aircraft.  The chain can also be used by authorized entities to trace an Aircraft through all owners and flights in the Aircraft’s lifetime (ICAO practice on manned aircraft).</t>

<t>The rest of this section will define the formats of certificates in DRIP and their common uses.</t>

<section anchor="certificate-x-on-x-cxx-form" title="Certificate: X on X (Cxx Form)">

<t>The Cxx Form of DRIP Certificates is a self-signed certificate (by an entity known as ‘x’) staking an unverified claim on a HHIT/HI pairing until an expiration date/time.</t>

<figure title="Certificate: X on X" anchor="cxx"><artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                          Hierarchical                         |
|                       Host Identity Tag                       |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                              Host                             |
|                            Identity                           |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Expiration Timestamp                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork></figure>

<t>Certificates of the Cxx Form are 116 bytes. The offset of the Expiration Timestamp SHOULD be of significant length (possibly years).</t>

<t>These are 5 (five) Cxx Certificates that can be created in a standard DRIP UAS RID system: Manufacturer on Manufacturer, RAA on RAA, HDA on HDA (Registry on Registry), Operator on Operator, and Aircraft on Aircraft. This is not an exhaustive list as any entity with the DRIP UAS system SHOULD have a Cxx for itself.</t>

<section anchor="certificate-x-on-x-short-form" title="Certificate: X on X (Short Form)">

<t>A smaller version of Certificate: X on X exists where the Host Identity is removed allowing a claim to be made in 84 bytes.</t>

<t>The Host Identity is expected to be looked up via <xref target="hhit-registries"/> when connected to the Internet. The smaller size of this certificate has the downside of not allowing for signature verification when Internet connectivity is unavailible to retreive the Host Identity.</t>

<figure title="Certificate: X on X (Short Form)" anchor="cxx-short"><artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                          Hierarchical                         |
|                       Host Identity Tag                       |
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Expiration Timestamp                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork></figure>

</section>
</section>
<section anchor="certificate-x-on-y-cxy-form" title="Certificate: X on Y (Cxy Form)">

<t>The Cxy Form of DRIP Certificates is a certificate where Entity x asserts trust in the binding claimed by Entity y (in Cyy) and signs this asserting with a timestamp and an expiration of when the binding is no longer asserted by Entity x.</t>

<figure title="Certificate: X on Y" anchor="cxy"><artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              Cxx                              .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              Cyy                              .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                           Timestamp                           |
+---------------+---------------+---------------+---------------+
|                     Expiration Timestamp                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork></figure>

<t>Cxy Form wraps both self-signed certificates of the entities and is signed by Entity x. Two timestamps, one taken at the time of signing and one as an expiration time are used to set boundaries to the assertion. Care should be given to how far into the future the Expiration Timestamp is set, but is left up to system policy.</t>

<t>Most certificates of this form have a length of 304 bytes. Certificate: Registry on Operator on Aircraft is unique in that is 680 bytes long, binding of two Cxy forms (in this specific case Certificate: Registry on Operator with Certificate: Operator on Aircraft).</t>

<section anchor="certificate-x-on-y-short-form" title="Certificate: X on Y (Short Form)">

<t>This certificate is a special certificate that is the ultimate certificate of the DRIP UAS system. It is used in Broadcast RID to provide the trustworthiness of the Aircraft without the need of the Observer to be connected to the Internet.</t>

<figure title="Certificate: X on Y (Short Form)" anchor="cxy-short"><artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                Hierarchical Host Identity Tag                 |
|                         of Entity X                           |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              Cyy                              .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Expiration Timestamp                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork></figure>

<t>The short form of the Cxy this certificate is 200 bytes long and is designed to fit inside the framing of the ASTM F3411 Authentication Message. The HHIT of Entity X is used in place of the full Cxx (see <xref target="security-considerations"/> for comments). The timestamp is removed and only an expiration timestamp is present.</t>

<t>During creation the Expiration Timestamp MUST be no later than the Expiration Timestamp found in Cyy.</t>

<t>Certificate: Registry on Aircraft is the main certificate in this class that is used in Broadcast RID using the HDAs HHIT and the Certificate: Aircraft on Aircraft for the current UAS ID.</t>

</section>
</section>
<section anchor="timestamps" title="Timestamps">

<t>Timestamps MAY be the standard UNIX time or a protocol specific timestamp, to avoid programming complexities. For example <xref target="F3411-19"/> uses a 00:00:00 01/01/2019 offset. When a Expiration Timestamp is required a desired offset is added, setting the timestamp into the future. The amount of offset for specific timestamps is left to best practice.</t>

</section>
<section anchor="signatures" title="Signatures">

<t>Signatures are ALWAYS taken over the preceding fields in the certificate. For DRIP the EdDSA25519 algorithm from <xref target="RFC8032"/> is used.</t>

</section>
</section>
<section anchor="provisioning" title="Provisioning">

<t>Under DRIP UAS RID a special provisioning procedure is required to properly generate and distribute the certificates to all parties in the USS/UTM ecosystem using DRIP RID.</t>

<t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations (see Security Considerations) and connectivity it is acceptable under DRIP RID to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft. The methods to securely inject and store keypair information in a “secure element” of the Aircraft is out of scope of this document.</t>

<section anchor="hhit-delegation" title="HHIT Delegation">

<t>Under the FAA <xref target="NPRM"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>

<t><list style="hanging">
  <t hangText='1'>
  The entity generates its own HHIT, discovering and using the RAA and HDA for the target Registry. The method for discovering a Registry’s RAA and HDA is out of scope here. This allows for the device to generate an HHIT to send to the Registry to be accepted (thus generating the required Host Identity Claim) or denied.</t>
  <t hangText='2'>
  The entity sends to the Registry its HI for it to be hashed and result in the HHIT. The Registry would then either accept (returning the HHIT to the device) or deny this pairing.</t>
</list></t>

<t>In either case the Registry must decide if the HI/HHIT pairing is valid. This in its simplest form is checking the current Registry for a collision on the HHIT.</t>

<t>Upon accepting a HI/HHIT pair the Registry MUST populate the required DNS serving the HDA with the HIP RR and other relevant RR types (such as TXT and CERT). The Registry MUST also generate the appropriate DRIP Certificates for the given operation.</t>

<t>If the Registry denied the HI/HHIT pair, because there was a HHIT collision or any other reason, the Registry MUST signal back to the device being provisioned that a new HI and HHIT needs to be generated.</t>

</section>
<section anchor="manufacturer" title="Manufacturer">

<figure><artwork><![CDATA[
            +--------------+      Ca0a0 +-----------------+
            | Manufacturer | <--------> | Manufacturer CA |
            +--------------+ Cma0       +-----------------+
               ^    |
               |    |
               |    |
       Ca0a0   |    |   Cma0
               |    |
               |    v
            +----------+
            | Aircraft |
            +----------+
]]></artwork></figure>

<t>During the initial configuration and production at the factory the Aircraft MUST be configured to have a serial number. ASTM defines this to be an ANSI/CTA-2063A. Under DRIP a HHIT can be encoded as such to be able to convert back and forth between them. This is out of scope for this document.</t>

<t>Under DRIP the Manufacturer SHOULD be using HHITs and have their own keypair and Cxx (Certificate: Manufacturer on Manufacturer). [Ed. Note: Some words on aircraft keypair and certs here].</t>

<t>Certificate: Aircraft 0 on Aircraft 0 (Ca0a0) is extracted by the manufacturer and send to their Certificate Authority (CA) to be verified and added. A resulting certificate (Certificate: Manufacturer on Aircraft 0) SHOULD be a DRIP Certificate in the Cxy Form – however this certificate could be a X.509 certificate binding the serial number to the manufacturer.</t>

</section>
<section anchor="registry" title="Registry">

<figure><artwork><![CDATA[
TODO
]]></artwork></figure>

<t>DRIP UAS RID defines two levels of hierarchy maintained by the Registration Assigning Authority (RAA) and HHIT Domain Authority (HDA). The authors anticipate that an RAA is owned and operated by a regional CAA (or a delegated party by an CAA in a specific airspace region) with HDAs being contracted out. As such a chain of trust for registries is required to ensure trustworthiness is not compromised. More information on the registries can be found in <xref target="hhit-registries"/>.</t>

<t>Both the RAA and HDA generate their own keypairs and self-signed certificates (Certificate: RAA on RAA and Certificate: HDA on HDA respectively). The HDA sends to the RAA its self-signed certificate to be added into the RAA DNS.</t>

<t>The RAA confirms the certificate received is valid and that no HHIT collisions occur before added a HIP RR to its DNS for the new HDA. A Certificate: RAA on HDA is sent as a confirmation that provisioning was successful.</t>

<t>The HDA is now a valid “Registry” and uses its keypair and Certificate: HDA on HDA with all provisioning requests from downstream.</t>

</section>
<section anchor="operator" title="Operator">

<figure><artwork><![CDATA[
            +----------+            +---------+
            | Registry | ---------> | HDA DNS |
            +----------+  [HIP RR]  +---------+
               ^    |
               |    |
               |    |
         Coo   |    |   Cro
               |    |
               |    v
            +----------+
            | Operator |
            +----------+
]]></artwork></figure>

<t>The Operator generates a keypair and HHIT as specified in DRIP UAS RID. A self-signed certificate (Certificate: Operator on Operator) is generated and sent to the desired Registry (HDA). Other relevant information and possibly personally identifiable information needed may also be required to be sent to the Registry (all over a secure channel – the method of which is out of scope for this document).</t>

<t>The Registry cross checks any personally identifiable information as required. Certificate: Operator on Operator is verified (both using the expiration timestamp and signature). The HHIT is searched in the Registries database to confirm that no collision occurs. A new certificate is generated (Certificate: Registry on Operator) and sent securely back to the Operator. Optionally the HHIT/HI pairing can be added to the Registries DNS in to form of a HIP Resource Record (RR). Other RRs, such as CERT and TXT, may also be used to hold public information.</t>

<t>With the receipt of Certificate: Registry on Operator the provisioning of an Operator is complete.</t>

</section>
<section anchor="aircraft" title="Aircraft">

<section anchor="standard-provisioning" title="Standard Provisioning">

<t>Under standard provisioning the Aircraft has its own connectivity to the Registry, the method which is out of scope for this document.</t>

<figure title="Standard Provision: Step 1"><artwork align="center"><![CDATA[
+----------+
| Registry |
+----------+
    ^
    |
    |
    |  Cro, CoaN
    |
    |
+----------+                        +----------+
| Operator | <--------------------- | Aircraft |
+----------+          Ca0aN         +----------+
]]></artwork></figure>

<t>Through mechanisms not specified in this document the Aircraft should have methods to instruct the Aircrafts onboard systems to generate a keypair and certificate. This certificate is chained to the factory provisioned certificate (Certificate: Aircraft 0 on Aircraft 0). This new certificate (Certificate: Aircraft 0 on Aircraft N) is securely extracted by the Operator.</t>

<t>With Certificate: Aircraft 0 on Aircraft N the sub certificate (Certificate: Aircraft N on Aircraft N) is used by the Operator to generate Certificate: Operator on Aircraft N. This certificate along with Certificate: Registry on Operator is sent to the Registry.</t>

<figure title="Standard Provision: Step 2"><artwork align="center"><![CDATA[
+----------+
| Registry |
+----------+
    |
    |
    |
    |  Token
    |
    v
+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+        Token           +----------+
]]></artwork></figure>

<t>On the Registry Certificate: Registry on Operator is verified and used as confirmation that the Operator is already registered. Certificate: Operator on Aircraft N also undergoes a validation check and used to generate a token to return to the Operator to continue provisioning.</t>

<t>Upon receipt of this token, the Operator injects it into the Aircraft and its used to form a secure connection to the Registry. The Aircraft then sends Certificate: Manufacturer on Aircraft 0 and Certificate: Aircraft 0 to Aircraft N.</t>

<figure title="Standard Provision: Step 3"><artwork align="center"><![CDATA[
+---------+
| HDA DNS |
+---------+
    ^
    |
    | HIP RR
    |
    |
    |
+----------+ <----------------------------+
| Registry |                              |
+----------+ ------------------------+    |
    |                                |    |
    |                                |    |  Token,
    |  CroaN                   CraN  |    |  Cma0, Ca0aN
    |                                |    |
    |                                |    |
    v                                v    |
+----------+                      +----------+
| Operator |                      | Aircraft |
+----------+                      +----------+
]]></artwork></figure>

<t>The Registry uses Certificate: Manufacturer on Aircraft 0 (with an external database if supported) to confirm the validity of the Aircraft. Certificate: Aircraft 0 on Aircraft N is correlated with Certificate: Operator on Aircraft N and Certificate: Manufacturer on Aircraft 0 to see the chain of ownership. The new HHIT tied to Aircraft N is then checked for collisions in the HDA. With the information the Registry generates two certificates: Certificate: Registry on Operator on Aircraft N and Certificate: Registry on Aircraft N. A HIP RR (and other RR types as needed) are generated and inserted into the HDA.</t>

<t>Certificate: Registry on Operator on Aircraft N is sent via a secure channel back to the Operator to be stored. Certificate: Registry on Aircraft N is sent to the Aircraft to be used in Broadcast RID.</t>

</section>
<section anchor="operator-assisted-provisioning" title="Operator Assisted Provisioning">

<t>This provisioning scheme is for when the Aircraft is unable to connect to the Registry itself or does not have the hardware required to generate keypairs and certificates.</t>

<figure title="Operator Assisted Provision: Step 1"><artwork align="center"><![CDATA[
+----------+
| Registry |
+----------+






+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+       aN, CaNaN        +----------+
]]></artwork></figure>

<t>To start the Operator generates on behalf of the Aircraft a new keypair and Certificate: Aircraft N on Aircraft N. This keypair and certificate are injected into the Aircraft for it to generate Certificate: Aircraft 0 on Aircraft N. After injecting the keypair and certificate, the Operator MUST destroy all copies of the keypair.</t>

<figure title="Operator Assisted Provision: Step 2"><artwork align="center"><![CDATA[
+----------+
| Registry |
+----------+
    ^
    |
    |
    |  Cro, Cma0, Ca0aN, CoaN
    |
    |
+----------+                        +----------+
| Operator | <--------------------- | Aircraft |
+----------+        Cma0, Ca0aN     +----------+
]]></artwork></figure>

<t>Certificate: Manufacturer on Aircraft 0 and Certificate: Aircraft 0 on Aircraft N is extracted by the Operator and the following data items are sent to the Registry; Certificate: Registry on Operator, Certificate: Manufacturer on Aircraft 0, Certificate: Aircraft 0 on Aircraft N, Certificate: Operator on Aircraft N.</t>

<figure title="Operator Assisted Provision: Step 3"><artwork align="center"><![CDATA[
+----------+            +---------+
| Registry | ---------> | HDA DNS |
+----------+   HIP RR   +---------+
    |
    |
    |
    |  CroaN, CraN
    |
    v
+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+          CraN          +----------+
]]></artwork></figure>

<t>On the Registry validation checks are done on all certificates as per the previous sections. Once complete then the Registry checks for a HHIT collision, adding to the HDA if clear and generates Certificate: Registry on Operator on Aircraft N and Certificate: Registry on Aircraft N. Both are sent back to the Operator.</t>

<t>The Operator securely inject Certificate: Registry on Aircraft N and securely stores Certificate: Registry on Operator on Aircraft N.</t>

</section>
<section anchor="initial-provisioning" title="Initial Provisioning">

<t>A special form of provisioning is used when the Aircraft is first sold to an Operator. Instead of generating a new keypair, the built in keypair and certificate done by the Manufacturer is used to provision and register the aircraft to the owner.</t>

<t>For this either Standard or Operator Assisted methods can be used.</t>

</section>
</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>A major consideration is the optimization done in Certificate: Registry on Aircraft to get its length down to 200 bytes. The truncation of Certificate: HDA on HDA down to just its HHIT is one that could be used against the system to act as a false Registry. For this to occur an attacker would need to find a hash collision on that Registry HHIT and then manage to spoof all of DNS being used in the system.</t>

<t>The authors believe that the probability of such an attack is low when Registry operators are using best practices in security. If such an attack can occur (especially in the time frame of “one-time use IDs”) then there are more serious issues present in the system.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

<reference anchor="F3411-19" >
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization></organization>
    </author>
    <date year="2020" month="February"/>
  </front>
</reference>




<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference  anchor="RFC8032" target='https://www.rfc-editor.org/info/rfc8032'>
<front>
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
<author initials='S.' surname='Josefsson' fullname='S. Josefsson'><organization /></author>
<author initials='I.' surname='Liusvaara' fullname='I. Liusvaara'><organization /></author>
<date year='2017' month='January' />
<abstract><t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t></abstract>
</front>
<seriesInfo name='RFC' value='8032'/>
<seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor="drip-requirements">
<front>
<title>Drone Remote Identification Protocol (DRIP) Requirements</title>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='A' surname='Gurtov' fullname='Andrei Gurtov'>
    <organization />
</author>

<date month='October' day='16' year='2020' />

<abstract><t>This document defines terminology and requirements for Drone Remote Identification Protocol (DRIP) Working Group protocols to support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety and other purposes.  Complementing external technical standards as regulator-accepted means of compliance with UAS RID regulations, DRIP will:  facilitate use of existing Internet resources to support UAS RID and to enable enhanced related services;  enable online and offline verification that UAS RID information is trustworthy.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-drip-reqs-05' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-drip-reqs-05.txt' />
</reference>



<reference anchor="drip-rid">
<front>
<title>UAS Remote ID</title>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<author initials='A' surname='Gurtov' fullname='Andrei Gurtov'>
    <organization />
</author>

<date month='September' day='9' year='2020' />

<abstract><t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as a self-asserting and thereby trustable Identifier for use as the UAS Remote ID.  HHITs include explicit hierarchy to provide Registrar discovery for 3rd-party ID attestation.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-drip-uas-rid-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-drip-uas-rid-01.txt' />
</reference>



<reference anchor="hhit-registries">
<front>
<title>Hierarchical HIT Registries</title>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<date month='March' day='9' year='2020' />

<abstract><t>This document describes using the registration protocol and registries to support hierarchical HITs (HHITs).  New and existing HIP parameters are used to communicate Registry Policies and data about the HHIT device and the Registries.  Further Registries are expected to provide RVS services for registered HHIT devices.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-moskowitz-hip-hhit-registries-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-moskowitz-hip-hhit-registries-02.txt' />
</reference>


<reference anchor="NPRM" >
  <front>
    <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
    <author >
      <organization></organization>
    </author>
    <date year="2019" month="December"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

