<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.14 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-wiethuechter-drip-identity-claims-03" category="std">

  <front>
    <title abbrev="identity-claims">DRIP Identity Claims</title>

    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <code>NY 13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="S." surname="Card" fullname="Stuart Card">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <code>NY 13495</code>
          <country>USA</country>
        </postal>
        <email>stu.card@axenterprize.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park</city>
          <code>MI 48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>

    <date year="2020" month="November" day="02"/>

    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes the Identity Proofs (in the form of Claims, Certificates and Attestations) for use in various Drone Remote ID Protocols (DRIP) and the wider Unmanned Traffic Management (UTM) system.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>DRIP Proofs are the backbone of trust in DRIP UAS RID, consisting of a chain of special certificates/attestations that results in a something useful in Broadcast RID. Some of the certificates are stored in and are generated by the Registries (defined in <xref target="hhit-registries"/>) and allow a user to confirm the trustworthiness of an Unmanned Aircraft (herein referred to as Aircraft) even in the scenario that the Observer is disconnected from the Internet.</t>

<section anchor="claims-assertions-attestations-and-certificates" title="Claims, Assertions, Attestations, and Certificates">

<t>The authors wish to make a clear distinction on exactly what these terms mean in the context of DRIP.</t>

<t>This is due to the term “certificate” having significant technologic and legal baggage associated with it, specifically around X.509 certificates. These type of certificates and Public Key Infrastructure invokes more legal and public policy considerations than probably any other electronic communication sector. It emerged as a governmental platform for trusted identity management and was pursued in intergovernmental bodies with links into treaty instruments.</t>

<t>As such much discussion has been made around the terms being used.</t>

<section anchor="claims" title="Claims">

<t>For DRIP claims are used in the form of a predicate (X is Y, X has property Y, and most importantly X owns Y). The basic form of a claim is an entity using a HHIT as an identifier in the DRIP UAS system.</t>

</section>
<section anchor="assertions" title="Assertions">

<t>Assertions, under DRIP, are defined as being a set of one or more claims. This definition is borrowed from JWT/CWT. An HHIT in of itself is a set of assertions. First that the identifier is unique and is a handle to an asymmetric keypair owned by the entity and that it also is part of the given registry (specified by the HID).</t>

</section>
<section anchor="attestations" title="Attestations">

<t>An attestation is a signed claim. The signee may be the claimant themselves or a third party. Under DRIP this is normally used when a set of entities asserts a relationship between them along with other information.</t>

</section>
<section anchor="certificates" title="Certificates">

<t>Certificates in DRIP have a narrow definition of being signed exclusively by a third party and are only over identities.</t>

</section>
</section>
</section>
<section anchor="terminology" title="Terminology">

<section anchor="required-terminology" title="Required Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="definitions" title="Definitions">

<t>See <xref target="drip-requirements"/> for common DRIP terms.</t>

<t><list style="hanging">
  <t hangText='HDA:'>
  Hierarchial HIT Domain Authority. The 16 bit field identifying the HIT Domain Authority under a RAA.</t>
  <t hangText='HID:'>
  Hierarchy ID. The 32 bit field providing the HIT Hierarchy ID.</t>
  <t hangText='RAA:'>
  Registered Assigning Authority. The 16 bit field identifying the Hierarchical HIT Assigning Authority.</t>
</list></t>

</section>
</section>
<section anchor="drip-proofs" title="DRIP Proofs">

<t>The DRIP Proofs is a set of custom structures to be used in the USS/UTM system. They are created during the provision of an Aircraft and are tied to the UAS ID (expected to be a HHIT, see <xref target="drip-rid"/> for details).</t>

<t>These structures when chained together can create a root of trust all the way back to the manufacturer itself during the initial production of a given Aircraft. The chain can also be used by authorized entities to trace an Aircraft through all owners and flights in the Aircraft’s lifetime (something of interest to ICAO).</t>

<t>The rest of this section will define the formats of proofs in DRIP as forms of certificates and attestations and their common uses.</t>

<section anchor="certificate-x-on-x-cxx-form" title="Certificate: X on X (Cxx Form)">

<t>The Cxx Form of DRIP Proofs is a self-signed certificate (by an entity known as ‘X’) staking an unverified claim on a HHIT/HI pairing until an expiration date/time.</t>

<figure title="Certificate: X on X" anchor="cxx"><artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                          Hierarchical                         |
|                       Host Identity Tag                       |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                              Host                             |
|                            Identity                           |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Expiration Timestamp                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork></figure>

<t>Certificates of the Cxx Form are 116 bytes. The offset of the Expiration Timestamp SHOULD be of significant length (possibly years).</t>

<t>These are 5 (five) Cxx Certificates that can be created in a standard DRIP UAS RID system: Manufacturer on Manufacturer, RAA on RAA, HDA on HDA (Registry on Registry), Operator on Operator, and Aircraft on Aircraft. This is not an exhaustive list as any entity with the DRIP UAS system SHOULD have a Cxx for itself.</t>

<section anchor="certificate-x-on-x-short-form" title="Certificate: X on X (Short Form)">

<t>A smaller version of Certificate: X on X exists where the Host Identity is removed allowing a claim to be made in 84 bytes.</t>

<figure title="Certificate: X on X (Short Form)" anchor="cxx-short"><artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                          Hierarchical                         |
|                       Host Identity Tag                       |
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Expiration Timestamp                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork></figure>

</section>
</section>
<section anchor="attestation-x-on-y-axy-form" title="Attestation: X on Y (Axy Form)">

<t>This DRIP Proof is an attestation where Entity X asserts trust in the binding claimed by Entity Y (in Cyy) and signs this asserting with a timestamp and an expiration of when the binding is no longer asserted by Entity X.</t>

<figure title="Attestation: X on Y" anchor="axy"><artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              Cxx                              .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              Cyy                              .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                           Timestamp                           |
+---------------+---------------+---------------+---------------+
|                     Expiration Timestamp                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork></figure>

<t>Axy Form wraps both self-signed certificates of the entities and is signed by Entity X. Two timestamps, one taken at the time of signing and one as an expiration time are used to set boundaries to the assertion. Care should be given to how far into the future the Expiration Timestamp is set, but is left up to system policy.</t>

<t>Most attestations of this form have a length of 304 bytes. Attestation: Registry on Operator on Aircraft is unique in that is 680 bytes long, binding of two Axy forms (in this specific case Attestation: Registry on Operator with Attestation: Operator on Aircraft).</t>

<section anchor="attestation-x-on-y-short-form" title="Attestation: X on Y (Short Form)">

<figure title="Attestation: X on Y (Short Form)" anchor="axy-short"><artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                Hierarchical Host Identity Tag                 |
|                         of Entity X                           |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
.                                                               .
.                              Cyy                              .
.                                                               .
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Expiration Timestamp                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork></figure>

<t>The short form of the Axy this attestation is 200 bytes long and is designed to fit inside the framing of the ASTM F3411 Authentication Message. The HHIT of Entity X is used in place of the full Cxx (see <xref target="security-considerations"/> for comments). The timestamp is removed and only an expiration timestamp is present.</t>

<t>During creation the Expiration Timestamp MUST be no later than the Expiration Timestamp found in Cyy.</t>

</section>
<section anchor="attestation-x-on-y-offline-form" title="Attestation: X on Y (Offline Form)">

<t>A special attestation that is the basis for a certificate finalized onboard the aircraft during flight. It is used in Broadcast RID to provide the trustworthiness of the Aircraft without the need of the Observer to be connected to the Internet.</t>

<figure title="Attestation: X on Y (Offline Form)" anchor="ara"><artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|                                                               |
|                 Hierarchical Host Identity Tag                |
|                         of Entity X                           |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                 Hierarchical Host Identity Tag                |
|                         of Entity Y                           |
|                                                               |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                   Host Identity of Entity Y                   |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
|                     Expiration Timestamp                      |
+---------------+---------------+---------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Signature                          |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------+---------------+---------------+---------------+
]]></artwork></figure>

<t>The signature is generated using Entity X’s keypair.</t>

</section>
</section>
<section anchor="timestamps" title="Timestamps">

<t>Timestamps MAY be the standard UNIX time or a protocol specific timestamp, to avoid programming complexities. For example <xref target="F3411-19"/> uses a 00:00:00 01/01/2019 offset. When a Expiration Timestamp is required a desired offset is added, setting the timestamp into the future. The amount of offset for specific timestamps is left to best practice.</t>

</section>
<section anchor="signatures" title="Signatures">

<t>Signatures are ALWAYS taken over the preceding fields in the certificate/attestation. For DRIP the EdDSA25519 algorithm from <xref target="RFC8032"/> is used.</t>

</section>
</section>
<section anchor="provisioning" title="Provisioning">

<t>Under DRIP UAS RID a special provisioning procedure is required to properly generate and distribute the certificates and attestations to all parties in the USS/UTM ecosystem using DRIP RID.</t>

<t>Keypairs are expected to be generated on the device hardware it will be used on. Due to hardware limitations (see <xref target="security-considerations"/>) and connectivity it is acceptable under DRIP RID to generate keypairs for the Aircraft on Operator devices and later securely inject them into the Aircraft (as defined in <xref target="operator-assisted-provisioning"/>). The methods to securely inject and store keypair information in a “secure element” of the Aircraft is out of scope of this document.</t>

<section anchor="hhit-delegation" title="HHIT Delegation">

<t>Under the FAA <xref target="NPRM"/>, it is expecting that IDs for UAS are assigned by the UTM and are generally one-time use. The methods for this however are unspecified leaving two options.</t>

<t><list style="hanging">
  <t hangText='1'>
  The entity generates its own HHIT, discovering and using thr RAA and HDA for the target Registry. The method for discovering a Registry’s RAA and HDA is out of scope here. This allows for the device to generate an HHIT to send to the Registry to be accepted (thus generating the required Host Identity Claim) or denied.</t>
  <t hangText='2'>
  The entity sends to the Registry its HI for it to be hashed and result in the HHIT. The Registry would then either accept (returning the HHIT to the device) or deny this pairing.</t>
</list></t>

<t>In either case the Registry must decide on if the HI/HHIT pairing is valid. This in its simplest form is checking the current Registry for a collision on the HHIT.</t>

<t>Upon accepting a HI/HHIT pair the Registry MUST populate the required the DNS serving the HDA with the HIP RR and other relevant RR types (such as TXT and CERT). The Registry MUST also generate the appropriate Host Identity Claim for the given operation.</t>

<t>If the Registry denied the HI/HHIT pair, because there was a HHIT collision or any other reason, the Registry MUST signal back to the device being provisioned that a new HI needs to be generated.</t>

</section>
<section anchor="manufacturer" title="Manufacturer">

<figure><artwork><![CDATA[
            +--------------+      Ca0a0 +-----------------+
            | Manufacturer | <--------> | Manufacturer CA |
            +--------------+ Ama0       +-----------------+
               ^    |
               |    |
               |    |
       Ca0a0   |    |   Ama0
               |    |
               |    v
            +----------+
            | Aircraft |
            +----------+
]]></artwork></figure>

<t>During the initial configuration and production at the factory the Aircraft MUST be configured to have a serial number. ASTM defines this to be an ANSI/CTA-2063A. Under DRIP a HHIT can be encoded as such to be able to convert back and forth between them. This is out of scope for this document.</t>

<t>Under DRIP the Manufacturer SHOULD be using HHITs and have their own keypair and Cxx (Certificate: Manufacturer on Manufacturer). (Ed. Note: some words on aircraft keypair and certs here?).</t>

<t>Certificate: Aircraft 0 on Aircraft 0 (Ca0a0) is extracted by the manufacturer and send to their Certificate Authority (CA) to be verified and added. A resulting certificate (Attestation: Manufacturer on Aircraft 0) SHOULD be a DRIP Attestation in the Axy Form – however this could be a X.509 certificate binding the serial number to the manufacturer.</t>

</section>
<section anchor="registry" title="Registry">

<figure><artwork><![CDATA[
TODO
]]></artwork></figure>

<t>DRIP UAS RID defines two levels of hierarchy maintained by the Registration Assigning Authority (RAA) and HHIT Domain Authority (HDA). The authors anticipate that an RAA is owned and operated by a regional CAA (or a delegated party by an CAA in a specific airspace region) with HDAs being contracted out. As such a chain of trust for registries is required to ensure trustworthiness is not compromised. More information on the registries can be found in <xref target="hhit-registries"/>.</t>

<t>Both the RAA and HDA generate their own keypairs and self-signed certificates (Certificate: RAA on RAA and Certificate: HDA on HDA respectively). The HDA sends to the RAA its self-signed certificate to be added into the RAA DNS.</t>

<t>The RAA confirms the certificate received is valid and that no HHIT collisions occur before added a HIP RR to its DNS for the new HDA. An Attestation: RAA on HDA is sent as a confirmation that provisioning was successful.</t>

<t>The HDA is now a valid “Registry” and uses its keypair and Certificate: HDA on HDA with all provisioning requests from downstream.</t>

</section>
<section anchor="operator" title="Operator">

<figure><artwork><![CDATA[
            +----------+            +---------+
            | Registry | ---------> | HDA DNS |
            +----------+  [HIP RR]  +---------+
               ^    |
               |    |
               |    |
         Coo   |    |   Aro
               |    |
               |    v
            +----------+
            | Operator |
            +----------+
]]></artwork></figure>

<t>The Operator generates a keypair and HHIT as specified in DRIP UAS RID. A self-signed certificate (Certificate: Operator on Operator) is generated and sent to the desired Registry (HDA). Other relevant information and possibly personally identifiable information needed may also be required to be sent to the Registry (all over a secure channel – the method of which is out of scope for this document).</t>

<t>The Registry cross checks any personally identifiable information as required. Certificate: Operator on Operator is verified (both using the expiration timestamp and signature). The HHIT is searched in the Registries database to confirm that no collision occurs. A new attestation is generated (Attestation: Registry on Operator) and sent securely back to the Operator. Optionally the HHIT/HI pairing can be added to the Registries DNS in to form of a HIP Resource Record (RR). Other RRs, such as CERT and TXT, may also be used to hold public information.</t>

<t>With the receipt of Attestation: Registry on Operator the provisioning of an Operator is complete.</t>

</section>
<section anchor="aircraft" title="Aircraft">

<section anchor="standard-provisioning" title="Standard Provisioning">

<t>Under standard provisioning the Aircraft has its own connectivity to the Registry, the method which is out of scope for this document.</t>

<figure title="Standard Provision: Step 1"><artwork align="center"><![CDATA[
+----------+
| Registry |
+----------+
    ^
    |
    |
    |  Cro, CoaN
    |
    |
+----------+                        +----------+
| Operator | <--------------------- | Aircraft |
+----------+          Ca0aN         +----------+
]]></artwork></figure>

<t>Through mechanisms not specified in this document the Aircraft should have methods to instruct the Aircrafts onboard systems to generate a keypair and certificate. This certificate is chained to the factory provisioned certificate (Certificate: Aircraft 0 on Aircraft 0). This new attestation (Attestation: Aircraft 0 on Aircraft N) is securely extracted by the Operator.</t>

<t>With Attestation: Aircraft 0 on Aircraft N the sub certificate (Certificate: Aircraft N on Aircraft N) is used by the Operator to generate Attestation: Operator on Aircraft N. This along with Attestation: Registry on Operator is sent to the Registry.</t>

<figure title="Standard Provision: Step 2"><artwork align="center"><![CDATA[
+----------+
| Registry |
+----------+
    |
    |
    |
    |  Token
    |
    v
+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+        Token           +----------+
]]></artwork></figure>

<t>On the Registry, Attestation: Registry on Operator is verified and used as confirmation that the Operator is already registered. Attestation: Operator on Aircraft N also undergoes a validation check and used to generate a token to return to the Operator to continue provisioning.</t>

<t>Upon receipt of this token, the Operator injects it into the Aircraft and its used to form a secure connection to the Registry. The Aircraft then sends Attestation: Manufacturer on Aircraft 0 and Attestation: Aircraft 0 to Aircraft N.</t>

<figure title="Standard Provision: Step 3"><artwork align="center"><![CDATA[
+---------+
| HDA DNS |
+---------+
    ^
    |
    | HIP RR
    |
    |
    |
+----------+ <----------------------------+
| Registry |                              |
+----------+ ------------------------+    |
    |                                |    |
    |                                |    |  Token,
    |  CroaN                   CraN  |    |  Cma0, Ca0aN
    |                                |    |
    |                                |    |
    v                                v    |
+----------+                      +----------+
| Operator |                      | Aircraft |
+----------+                      +----------+
]]></artwork></figure>

<t>The Registry uses Attestation: Manufacturer on Aircraft 0 (with an external database if supported) to confirm the validity of the Aircraft. Attestation: Aircraft 0 on Aircraft N is correlated with Attestation: Operator on Aircraft N and Attestation: Manufacturer on Aircraft 0 to see the chain of ownership. The new HHIT tied to Aircraft N is then checked for collisions in the HDA. With the information the Registry generates two certificates: Attestation: Registry on Operator on Aircraft N and Attestation: Registry on Aircraft N (Offline Form). A HIP RR (and other RR types as needed) are generated and inserted into the HDA.</t>

<t>Attestation: Registry on Operator on Aircraft N is sent via a secure channel back to the Operator to be stored. Attestation: Registry on Aircraft N (Offline Form) is sent to the Aircraft to be used in Broadcast RID.</t>

</section>
<section anchor="operator-assisted-provisioning" title="Operator Assisted Provisioning">

<t>This provisioning scheme is for when the Aircraft is unable to connect to the Registry itself or does not have the hardware required to generate keypairs and certificates.</t>

<figure title="Operator Assisted Provision: Step 1"><artwork align="center"><![CDATA[
+----------+
| Registry |
+----------+






+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+       aN, CaNaN        +----------+
]]></artwork></figure>

<t>To start the Operator generates on behalf of the Aircraft a new keypair and Certificate: Aircraft N on Aircraft N. This keypair and certificate are injected into the Aircraft for it to generate Attestation: Aircraft 0 on Aircraft N. After injecting the keypair and certificate, the Operator MUST destroy all copies of the keypair.</t>

<figure title="Operator Assisted Provision: Step 2"><artwork align="center"><![CDATA[
+----------+
| Registry |
+----------+
    ^
    |
    |
    |  Cro, Cma0, Ca0aN, CoaN
    |
    |
+----------+                        +----------+
| Operator | <--------------------- | Aircraft |
+----------+        Cma0, Ca0aN     +----------+
]]></artwork></figure>

<t>Attestation: Manufacturer on Aircraft 0 and Attestation: Aircraft 0 on Aircraft N is extracted by the Operator and the following data items are sent to the Registry; Attestation: Registry on Operator, Attestation: Manufacturer on Aircraft 0, Attestation: Aircraft 0 on Aircraft N, Attestation: Operator on Aircraft N.</t>

<figure title="Operator Assisted Provision: Step 3"><artwork align="center"><![CDATA[
+----------+            +---------+
| Registry | ---------> | HDA DNS |
+----------+   HIP RR   +---------+
    |
    |
    |
    |  CroaN, CraN
    |
    v
+----------+                        +----------+
| Operator | ---------------------> | Aircraft |
+----------+          CraN          +----------+
]]></artwork></figure>

<t>On the Registry validation checks are done on all attestations as per the previous sections. Once complete then the Registry checks for a HHIT collision, adding to the HDA if clear and generates Attestation: Registry on Operator on Aircraft N and Attestation: Registry on Aircraft N (Offline Form). Both are sent back to the Operator.</t>

<t>The Operator securely inject Attestation: Registry on Aircraft N (Offline Form) and securely stores Attestation: Registry on Operator on Aircraft N.</t>

</section>
<section anchor="initial-provisioning" title="Initial Provisioning">

<t>A special form of provisioning is used when the Aircraft is first sold to an Operator. Instead of generating a new keypair, the built in keypair and certificate done by the Manufacturer is used to provision and register the aircraft to the owner.</t>

<t>For this either Standard or Operator Assisted methods can be used.</t>

</section>
</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>A major consideration is the optimization done in Attestation: X on Y (Short Form) to get its length down to 200 bytes. The truncation of Certificate: HDA on HDA down to just its HHIT is one that could be used against the system to act as a false Registry. For this to occur an attacker would need to find a hash collision on that Registry HHIT and then manage to spoof all of DNS being used in the system.</t>

<t>The authors believe that the probability of such an attack is low when Registry operators are using best practices in security. If such an attack can occur (especially in the time frame of “one-time use IDs”) then there are more serious issues present in the system.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

<reference anchor="F3411-19" >
  <front>
    <title>Standard Specification for Remote ID and Tracking</title>
    <author >
      <organization></organization>
    </author>
    <date year="2020" month="February"/>
  </front>
</reference>




<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference  anchor="RFC8032" target='https://www.rfc-editor.org/info/rfc8032'>
<front>
<title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
<author initials='S.' surname='Josefsson' fullname='S. Josefsson'><organization /></author>
<author initials='I.' surname='Liusvaara' fullname='I. Liusvaara'><organization /></author>
<date year='2017' month='January' />
<abstract><t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t></abstract>
</front>
<seriesInfo name='RFC' value='8032'/>
<seriesInfo name='DOI' value='10.17487/RFC8032'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor="drip-requirements">
<front>
<title>Drone Remote Identification Protocol (DRIP) Requirements</title>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='A' surname='Gurtov' fullname='Andrei Gurtov'>
    <organization />
</author>

<date month='November' day='1' year='2020' />

<abstract><t>This document defines terminology and requirements for Drone Remote Identification Protocol (DRIP) Working Group protocols to support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety and other purposes.  Complementing external technical standards as regulator-accepted means of compliance with UAS RID regulations, DRIP will:  facilitate use of existing Internet resources to support UAS RID and to enable enhanced related services;  enable online and offline verification that UAS RID information is trustworthy.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-drip-reqs-06' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-drip-reqs-06.txt' />
</reference>



<reference anchor="drip-rid">
<front>
<title>UAS Remote ID</title>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<author initials='A' surname='Gurtov' fullname='Andrei Gurtov'>
    <organization />
</author>

<date month='September' day='9' year='2020' />

<abstract><t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as a self-asserting and thereby trustable Identifier for use as the UAS Remote ID.  HHITs include explicit hierarchy to provide Registrar discovery for 3rd-party ID attestation.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-drip-uas-rid-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-drip-uas-rid-01.txt' />
</reference>



<reference anchor="hhit-registries">
<front>
<title>Hierarchical HIT Registries</title>

<author initials='R' surname='Moskowitz' fullname='Robert Moskowitz'>
    <organization />
</author>

<author initials='S' surname='Card' fullname='Stuart Card'>
    <organization />
</author>

<author initials='A' surname='Wiethuechter' fullname='Adam Wiethuechter'>
    <organization />
</author>

<date month='March' day='9' year='2020' />

<abstract><t>This document describes using the registration protocol and registries to support hierarchical HITs (HHITs).  New and existing HIP parameters are used to communicate Registry Policies and data about the HHIT device and the Registries.  Further Registries are expected to provide RVS services for registered HHIT devices.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-moskowitz-hip-hhit-registries-02' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-moskowitz-hip-hhit-registries-02.txt' />
</reference>


<reference anchor="NPRM" >
  <front>
    <title>Notice of Proposed Rule Making on Remote Identification of Unmanned Aircraft Systems</title>
    <author >
      <organization></organization>
    </author>
    <date year="2019" month="December"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source:
H4sIAC6RoF8AA+1dbXPbOJL+rl+B83xYqUZSbCfzEt/ti8ZONr6N7ZztVJLa
2r2CSEjimCK5BClHM5Or+Q/35a5q78/NL7l+AUCAkvwySWYyVVLtZiyKBBqN
RvfTjUZzMBh0ojxOsumBqKvJ4OtOp0qqVB2Io/PjF+I4Vhl8X4rDVCZz3ZHj
cakWByIx1wcRX4/zKJNzeCou5aQaXCeqmtUqmlWqHMRlUgxaDwx2H3YiWalp
Xi4PhK7iTicpygNRlbWu9nd3H+/ud2Sp5IE4zqCNTFWd6ym2nhTiVV5eAb3i
z2VeF52r6+aewRH2jg2bNnUls/g/ZZpnQNpS6U6RHIi/VnnUFzovq1JNNPy1
nPMfUT6fA5X6b52OrKtZXh50OgMhRJLpAzEailfeqDpwXfCQR7Gcr/6Wl0Dv
6LV4grQVZfKd6ovnzw/pNw09K6Dx0eNHX4lD7LWMEpmKozJZKLojAlYdiDcw
0kWSpuZaHkNvp2/E3sNHj78wl+qsQg6+vBjRBTWXSXogJJA09CfhT/KtcoQM
YaDNwC6G4lCWsTegi6qWZdVc/VWHoqt6GAElN4zgfChOcn2VXyfVd94wzvOx
gmGEP9FYnl1eAq2ZrtMKBCkYx86OR/SZvBIvZHnl0XxyLB59vf/wqxtpLqfz
P6VyrIezqhpE3BGR3Mnyci4rYM0B3f/04aO9vcHeY/6GH7P4di5QcmHY4qJQ
UTJJQKaTPBOTvBTnap5XShwfCbhFXJYywuWw45qwsmu/8/RdXJ6YdUItydT9
HsM6PBD7u/u7A1h1nSSbhETS+i3VP+qkVLQ+YMENjoYgXZOB/U17dyZx+4Za
arxM98xmSQVPTBPgeKJMW3M7R4MZ3N66pUPPnb44P1ll02leJZES+US8KPMi
1yoW53WqxIkkFQEcs9wi/eP4CA+8zOYyy+CBUVJGqDfExVJXaq5v4eTOyyyp
4DGYoUpp8VTFqgSBHy0SbnoUz5MMSeev3aejUW9nhdl7jwd7wOzBYCBAUODm
qOp0LmeJFqBKa2SziJWOymQMfVQz1WhiGGg+0aKbZHQdJwuHwwq6Lw5B5nmc
8CAKyKiCvyoiRvdIgGqtYOGIhSyTvNawVEE9elIFHYCGzFPoA21Aj1rBrq5B
iZcN30DyJtAR8DqTU5IM0X15edIDhYp8HPLo5kkcw6rvfIbSV+ZxHSElnQ6Z
FzMW0PTUwRhEeYzEwHjIEiCZdOPL0YU4Pz5CHZ1pYC5N7kRIEc1kQtOpcZ3A
PETe+B9Ib+zQg6xEqXAxamxYgg2Yg4rEtoAlkzrFq9+UuYwjCX1Df0NxAbcQ
OUBeFLAWaNZVXgIjsC1gEV6ZqgykAcVjvKRnzp0Yi26sJknG93///R9bUv7u
HTNapml+DbQBRaWochzwJIEpxsaIJ9dguIBmpTVxIFsjyN2ZKhX0AmZNlUgh
tCO1+70n1EJlwgiQjlSGksD8wStnY+h7Ad2jNCYaKMhUhGOalDkTYg0uzPFn
nznRG2mNHAJe9wOp69PAfMFEUVdmeWmQKz1DEufySuGUpkqW2DHMcsSrNRPq
LayQdCmuDZEgwkDCXIu5km4oQGml3lbIF5SaoVlROIxaYQ/ERHhM/PTjP73Z
/OnH/xMzuUBB0Mk0o6sgzRXYzixP8ykIOY4gVVMQsLGcTkHegaE6B4lDvoDm
momk6rMQ4tMpkCoBn8BTr4df7D4OZGcoLnkAy4JkK2ov2Rf1OIU+/6KWwOlJ
CcJYwrKpS1y2i/wK7pqD4Bl68IGCHyhy+HfJawS1kpP7TBRlPpZjpCpbihz4
UAqVwqzC2ocHEfnUmVWOGq7n5VAcV2DQVDmFEYL0SDHNQSgyXOjQbZHKinQP
ahQSTJRsq6TmjU5A+q7h+aIudc3Sn6D4BK2NAYIqzYxMk+wKFyjOF0BAaA2s
PPRAtgfmdKSFrqOZmOM/KJ+11kj2DDoZKxDsuYyV5b6dcfzJLPSYpNaKbafz
FAZASoahKa1jvE20NKwEJqqYpkl0X6NUvemL19QtcLeASVziFRwv2DPQXfMC
lioIEnD9tcivYSre9GjuQYY0cL1pmHrGFmGmDAdrjeRK8ezZ8SWxPzPcnSS4
Mpk0pxudysWBNesQmdWsSeCH4qH2aZBWH0nLHNCIilYP6eCSpYy5gnTjOsJH
EpIS+DbOyzK/torh319dPjh8dTkUo4ypZsWcVFqlExqcbV46oobiaVLqqtE9
/hg1UJz8A1YuspSeB0kGY0LqDHQuAHfQ3yVw8kotC5mUyORG9RpGsvWC5hOQ
xVTn2FKB+NZo9WmCytAo4qXomjXctPPs+KhnOetpNeAt0NBcMCME/QGPEtN4
rumKAqFcApdZTeGPpGBmADdUugDJB25L+J4A4kPilkNQ63a28DppMUKPqFpI
PK9nKmt4SqPFNcTMRVpKlTKpAKqg7+oaFwf2KdAjmvJqY13gQF+e2dURqOsA
VVijDCoT9TVYD5ACXzSAHBYoww31NkpBnhcKSAemBgN1pjPP4NeczE5sB4O0
iEtYvgnp4aX4/rOq+faOrM85I9PYv4/tC0iFAGsZa7Fz8vLicqfP/xWnZ/T3
+ZP/eHl8/uQI/754Nnr+3P1h77h4dvby+VHzV/Pk4dnJyZPTI34YrorWpZPR
mx1WBTtnLy6Pz05Hz3d40foIj3BPjmKRsGujKl6OFvqRDvrm8IXYewSQ4V/O
nx7u7+09fvfOfPl676tH8AUFgTsjHvJXmFbgbVGgLUWAkgI0kkUCyhbtMajQ
GSwWgUCBjfiRmz6Y7gsQWIAoK8gfOkN1j+YiN0JAyhWaeHY0AncZfCtYurKM
ZojFUAkc5XNEaCOy9QkKNk7N3pdiDOsRlllqrcZkiRLDC271MaO8pDgfjbC3
46OgNzCUR9zyw32vZdDLiyT22w0e6HSgNWqHYZpCMQKNiRgAnrkXzXbYkRn3
umZQmj3cy1LqA2FfSYJZq0CrOtuvjaj4punlxcUDgNxW/SOZS5KqCA0n3BfX
paWQeKHN8gT16dCiXYBVwkiRGgabAq5AV70tGPpx32yOAOf48pHERixiVYH7
q3uEuxDgeLSTsiKwTo1NFakdgFmGVFRXeV41yB8FlpwO1JvgF1jKQHHWE0mt
lta2eKMkGUZ44lwNtrCs5e2YeULZd0AayC5Y3qKG4in7DnWX1asER2SkAt5V
M4AZ0xlRi8anZAA3SZPpjL0MJMre/jsN4GaiqgR8im7jfKCRxPWv0BDm4vhw
dGZ4KOgaGSoQDcRlOKDrBHpj4+0AiqzIHSiMHJnFCescf9RrUWbgHBkfL3GL
G1ihDbxvHjxAIJPBP93Dt28FAKd5j+m0Xy30bgl0OhlYw9g0JrrIaQd4rjJU
SEDxTz/+z+uffvxf8CMr9uLhnjoDw8BWmbFSnhlhfPDsWKDtJ3AHLaXU5Nsi
Mf43OtwPkOMwmO8PJgl48GB2wCxcDSTMUvb7nYjiSjvvOv8Fn47YFaufvTXX
9tdce4iP78FPD8Uj8YX4UnwlvhaP73Ot8/kg/Nz7e+eHNYTd5/PDTS0Eeu7+
LTxDYOxCGZdy+nNouNPnh0+dk59KCzQl79GCm833oOHWz6fRwseSqCeNuroE
TQV6b1780jTchw/bFn4jLVyAgZMUOPr1aNi28Btr4f01DAEpAlviswiQIe3W
/H5nDZAE1BXGFkxQxuFJdEz20PNa2sAp3DIxLhLeuVZ3Gnd9TOFVP6Sbqmxa
zUS3yME9w3DoEvxjz2PB7r4Q3Ql4Cz0iIiCOwkjoL4wbD4s3Euxunb9ZYbyy
A9wgaVwWoNP/3keHlvapRqO+ACca/8b/dM9tRIo2sfjvXl+cFRjYzakh+zc7
/84pyUNHx8aOKkbGMwnuFYwPXBF0szRFhI0Jp4jQmsCiZaiJ+CBj0OFj92s1
YNS4CRfgRlXWURgJjeErYAKAeeuJrntMvQXSyGc0G0MhbITRlGqeL5TZLeHQ
JfsF7KdSBBhm5utHRnA6W3Bvl/cW3N/EyS0U27bwUVrYQrFtC/du4YNDsYEm
g7wZkAUme4d3WLxdL3PbG9EdvV02AUCwyE3Uz+xj+ltjbMmfsGF47baoXI4H
JX8kGUXqyY5zGNY88IaSXQ6XS86QQDynOSJqNhLtXpYUldPZFOEMIoFAGUWh
/c4IGAncDcPNBWot6Pr1Fjk00jh8zxaGt7WAuPL9WrgDDZ/CqvwtzMXypoje
XVq4Aw2f+lzcAgE/Mg1bLLpt4aO0sMWi2xbu3cKHxaIS4KNBoWvgJQJPCzDF
dSkLzDUDgLdhJ9mFDZskKM4YM7f6eE5cXucNTNR9ynWr5BXmUnEKGm3P27gh
bT/HdBMn4XmAkm502YJVTpkbY0w7lKXNGJipJtuNDloozLyp0xjDVJyUALfN
8msxoUQd88ykpuW5McBJ2QBVX4zrCv9O1aQSdUE0cMCOU0EBvZ5gUCbY6rfp
BJR+aCJ6Ji4KPz3ctTGzEPf74Ug/Bumijk26HgF6SVe+/HqXWyOM3Xe4G2mA
ecA55gSFrk2Osim0IpJa3YEEAv7BbeuoW5PA17gyQZByi/bNel9pIUxxujXW
d5POgel3zuC9aLjn59PARVusjp8tTrY0bFv4jbSwxcnbFu7dwgfHyWHM9jYE
g9CZjh3QJXvEhLJQEXJT1DQ8tLC/62M0C51jZcAzYMpJglFaPFPE4LSUcwvi
sF08WkonWSnVGSGBOUh0orSWU8Xb9nQkxDf8CBhNLnORysgds5vUaUqhwC6n
GWsV1SUdHQ/ONXm56Jiabk7WVD5EdrvENjV+Fb+7e4tSaWgHcOIRZxPTBj/d
tgmE02ECgPEYQQYvpOSTVhtvn9CBJI5k3wRHzyaTFFN7m11zc7TRnzcLsCtz
mojgPO6Ce/m1kySTKSUx59k4x/QEckcsYDdZ05yrTKe9vBkJjkGiDHAqvdp0
DtFPcyZMntfsTWUK+5+EBwt5l745WGi8Hu9Y4RaGG3Wy2sL9cPgWhm8excfg
5Jt70nC/z6fKyU+jhXAKb56TT3cUv3QLW7eMadi28BtpYeuWbVu4dwsf2C0r
5Y0OWYDhnUvm5BaAdlMphE/6WyD2O21Ps/PpO6c68bio+1ucjN7Y4+Qu+fjl
6fFrs3tRUrUCruPShNSdw9OnI/SLPKEjslPw58ihA1+qSNVbPnqNtGPZDbwE
XpgtVQRuFx4NhPZ3dw/of2J37wH8D2vamNzsoXjFZ9M37V2U9sy2JD+zJBeB
srrRPY1jFeMZ06qypzo9Ty3cIWGnT86xEBMVLuBW0BdaHbV2WyXkfwBWKLDu
ThKZI9BOr+AJaPc37fCMnr8avbkw+0R0SJ2P1KpI0X4GHQp25z09J8wvQcMs
NSf6wUmMjy5G+198AWyT6RRPCM/mXEnBnO7efbgP3DZOGR0efmHP8GLZqo5X
IcCmnEvnLBberfgFCDWS55jPXl2hSvCMrTiSrxxTTZpxXak1dW/aJ0dRksBh
x8P8idLtk8kqys2OFIs5UXtOZ6//wmLODG4dNG5Wh3HAY7XAQk8zkPNrvD+p
+BisPbSL3D3iIi/unjSZJ5bK22IJnFpmPNJkQWnmLI1RpIpKjmERNPUzrFPs
uHZlx0LVUHxf2N+r4kEwDzliQPRgWYQk+xY65uoMTsabgj5Si6B6UG6aHEiN
5ZBUPPDnG4bDCwNPGOex5r3JsCfKpMP6Ra54hlcDgk81/PTjP/kpLBWDQRas
k9P29YFF6OrjfmmUF8rtLtoiB7y0KPhzpLBiDZd/YtnFlp6ORjAgLO/17l3f
MJ2lgVe/BEh/xIxFKceJlbrZ2CVhA0ELKzBhkYw8UwPShiAgITt4kqCfWX6t
cDHTJm7WVP5IFVcDwj3KvOBKJZ3OXueAmjH+hZ18jecg8PS3ORxPJZPwuLIJ
prHgV7OSjnrgFTzfYQWlkuUUNJbd2/QJ5UP1fmvuNrASfmPtSaCyDnz0g05I
NHJp1pEvu9KUayEhyVwwxu22mqP/tA6AN91qVjvzZRW00ymhC0YldnqCRD9L
SInth0zEHvVKl8jQZ8fmjIkhYCb1zMTyuIiXVTVIPLPNPX9NO+wYixQqoUoD
TL7olgqUeuaqNphxN5yxxJpQqTlZDnQfu6ZoYzogd45prDEIT4xlTEQyMeUm
HlD79nQ6NLeQaRLbMzkZDVMnaGC1CdXC9WimqKAfq966LLFSiOvKRPnyNDW1
HDwewKoq8Fw8DdVUD/JoCGmm4GWRFzUqonAO6QDQ6YXAYJ3jFEiZOx30DDXg
OYdViSWgWNQCz1fBVaxqhfoWqzOB2rp8fcnlv56cX/Za00Q0UO0FJ4wUoSzQ
LJVYW2udPDlZ5vQJVoVcuOZ4Eg6SpW5lNvogT5GseRpLReWpTKUlj7OlVyur
VFLnXFWlRT6BujQoUWHWGJfAcXpZmTJEUmTqGqUbI6O6be9YXfonxGws1Pu0
sOnnfPVQ7srd9m+EXAMkHB5H+0H8m73vD+3fDkeAm2/sdzSXu+t/W+kXPn9n
JN6G5ne4ykOzV+H/2PE9GlpsGkabN86sbRy48QPsLoFfc4RK9U1rA3ipLltT
hcQkFyFz83IZ2lC7kWAbYBhkUnNgFWLjWT0fq3LIuy2MBUwSvNHPmRidXhw/
OLwcDfZ3v3w4CipIWenms4sqw2KmVGmIlqlpYcyltYCKBRZOJZGmaiYY6Q8K
SDXHCgOz4+yqZ/yDMlYqFLDmmCbbSKSR0RGNneuRoGG1EIUUCe4MBScXbjpf
CSqn+wRU7mmOd2LNFVMSCqfE8t9vPqKTCagW/ohJQ0FHbsJ2g8ynXaAHBbTH
0IWKeTbgJChYQ6irMbLQp9eBV+2oezjqmWlxhU8I4aBvBEJgTCA5bX5FlcAZ
bfOlIbjnsV7y5Iz8TcHMbRhSBt5PP/63g0o0v5HNYJOr5Q1djhf5pr7wrivh
MzQ1vFilGl13eXZ0ZpeZ7904sQdYBgZHpbT1NHMlnbBkVMUlhsLym6Yy62pJ
JtEFGMXY/9naslNdMHzGbNlylRI3OJOCrZWkU7WIxRJtys+RWSyaMqCSisth
yV3QqCPRJQseMxZWtgoal8LB3/lAsXVe0akocHOU2+ixEQaibM0+rHlpBA7W
IoiGWdNeaVQ+ZoOLsyk32nYEVaYp4bC1s2cODmNgABzTBP1QcZJTIcrGWTAY
xGvc6Bm347mu3CnM/De5ARQ+lvWhQLj8tVk+G3JAQ6XQHKtuVx898I9Zwzoi
VwNr05l5xsshLMVZQai2oY6RUZ+4NBvfDR8CEGXqOOE3U8lVt31qgVGEBPep
LUJsahZmeQuWgJBFAAqhwwlOA3cqLSKDvpFQBG8WJBHYOBpRVcYwm3LkmEDZ
pBkfBrdketvMQSjhmo0GuLF6UqdmeKaRjCrX8hDAebSrGt1GdoSMrxSo8w0T
wwe60lYgA0VW4dlwipPEWFQTa4Ry5UvnaN8MmT5ff70NBRzM+0G4exAiIXHI
4M0IQYi/8nz8bXP74n3gEACiPBc+HCrzj4GGXODiVjSEQuDubhxjGUy1LWXa
+Nmt8s5o2DYWCwsEZV0VhF4YVjWmtmpQOQca3bwa1X4WejC+YiMIZytFQC8a
lTiGUEyRUkJM/gMI6aELrPVpS8r5SnasAooaSqh8HAUiTJwGlXeWqZRMb9VE
BOgMYwLq/VboZSvIuU6iEkbC3iXXfLjLgGRjJYbi1hkgBWbhSpcy9m3wQ61P
vLHnOSnU2vMShUgloVVvih16pbRjWckxueF+gWzWl54Hh5oS89hJCbaynhpB
6d6aZN5rhMmF0XyHz94HwlRwcf106dxyv0CdsYustUMpwGGhWknoQEBTGpg0
idJ5XUZ4bwTgFUDLuRPc83N8hYVxttHJ5rcCvL7sB2JojyjM8tSViw6Lvr6y
3j2Zo4Jk6/b0+8qvLGmrsocSwbsKlQmyWxDKCVDuNQfrIttuYyPoIPCcsPiy
jb4FwdvWEuv7i+iOK8hmIQXqzrcLnRXV+fdOo3XNv6Cry7wPClueBj9uMkgb
Fa2vjhunPfiEDuz6HtBTOb1BlfMGl9nbWp0efDuIKsQe72lx8cu5Qm2V6DmD
xUC9hwVvg7kz52DI1fMC1VzsOwpv1i6FjXcTdBjBXPHgjJoyfqpvRyjCZsuQ
Bi65H6nZbHk2+YA901db1YTaZcPTpz1WeEa3rPiQTsGYZXqnNtkBq8d3Gczp
GnJsMVSfgIDtt566EacuCO3qTd+uUiwabS3hn7Ecf1i3HC/zK5V5lxbvuRTX
rsQ/3L4UiY4bUdXdluI+LsWzrKXu7sTmILRA0y31GvwfCADNJkDueGkcPkXY
4A6ywLaINtGmOYFD8hS4I8IlDR3h6q6IVXCNo/dts2tQQJVkdWiMbETcs2gm
YnZlSmR746JtMU0bUCv7b5QTXWlHG5nnBqsZw5NnKzJLgMarFqwy41reMVDT
foNLsNqhM3+liZUFgpLauCttVyQwVsaDXLNsAtldb3fWLsdNK4k/rXY3Nhks
3VuavPe9ZhH2PUvt2cbmc1jiZfvM4Vzu9tmOfizCWDHddu+C771dfW1WXhto
uBVFbGz9Horroc2LcTJDAYK7rowuRwgwo5/eapU2XkECmK4u8O0bKu61X6JD
Ssfkh/qLfHhHq0qItqR3K9hXv9xJ+bUX8g1Do51Yk3thg3hcXXyWFKxTKKxD
u5emantIYcXl1kGnqtgck3ABJLttekSvtDOg33f6At+0ceYx6uoH3A7ueUB4
DQ/8Z7z7wvQpdOBMfKvbbDm6nUapjdvda72BiZR2Zkr6OJ2Ow+507ku5xSSL
RK766OtcQevu0xuibjhKvXHUbRjUGJHgLQDh66rYqXI0jExySMu7IkgW+FQa
RGVO2BhlxVVJCs92e/tDGeWqrG7aYzF+3D9H846ugN3GaXJy/HDIavZMC77r
e2I+/vwqcE6eokk4bczHLVrxhjkKXKwcveCyhcGaNZljPGEmke2tvBzeZt4Y
ad2E/A1g3+BP0QpjpOSvKfd4k7Cx3knYpFRhgUwqZUGY9fI3ENECbrR5GkMf
Zb7k15zkRdKUhGiSKT+gM98ggE/Gs/do+jDyR37Fh4CpK5p0o3vr3jQ4yW1d
V7TpIFLKvJdrnWP4r7fbof5dTW//bqPo38n3XSNy62WgBZwDtbMOv1M7xiSu
bjGs9XoJ2vYJyX4Cvq+F1B9MWT5c4wSvuJcsQjG93IzfiBS+AkVjSNwm9i7o
3ZjmlSt6KM6ySLlQJuOroDPTA+dnhXt2fQz4klJzEAQhKr/nEEW+0ee/FKKi
nVe3oNbGslubOu380Z+BaDiIbpohZHTvARuEc2wybkJc05yUteHzAOTYkNZa
eDOh19BpjI7z2+WamP5xBiInae/Fy3oM7CubpHGdcFbiJutJomd0XqCDkia0
0LymiTMdOcTCeXEeBMTv5BIM+QWGFNcwCYrO44Lrq0vHhlrNXoTLLb8wqdH0
ZuQmNRrZOpffkgvhXbdnjzE7dp58Z961g+NLslur7DBAqCikYioP4VYuXnaH
0c1x7rLOmlf2btortg9/S+VEMXfUbCFRbScq2m4TVjjKNZUYZeYAKWen46RH
Zgd8IlPtx3Acf+Em3n3n8qawaoDbnGtKx5zpqDxm6VCyajtLU3ppnLwVmpkc
VX5bJrl9BRZQpe3ACan95q2V7n2t9lWPfk7KWKWJWqgmXsfv+0xS4+jyBpGl
ms5B5Ne8EppFZ0TFvgETOw5OSZDraDPoYV2sNIsixQzqKrMUSWFwojOmYmPp
AMoR3/GzszHBe6fnlGrJOJPePokJRKiIE61r5U7pt3nx/0yQiWjGfgAA

-->

</rfc>

