<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
 <?rfc toc="yes" ?>
 <?rfc symrefs="yes" ?>
 <?rfc sortrefs="yes"?> 
 <?rfc compact="yes" ?>
 <?rfc subcompact="no" ?>  
 <?rfc iprnotified="no" ?>
 <?rfc strict="no" ?>

<rfc category="std" docName="draft-wiethuechter-tmrid-auth-01" ipr="trust200902">

<front>
    <title abbrev="TM-RID Auth Formats">TM-RID Authentication Formats</title>

    <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
        <organization>AX Enterprize</organization>
        <address>
            <postal>
            <street>4947 Commercial Drive</street>
            <city>Yorkville</city>
            <region>NY</region>
            <code>13495</code>
            <country>USA</country>
            </postal>
            <email>adam.wiethuechter@axenterprize.com</email>
        </address>
    </author>

    <author fullname="Stuart W. Card" initials="S." surname="Card">
        <organization>AX Enterprize</organization>
        <address>
            <postal>
            <street>4947 Commercial Drive</street>
            <city>Yorkville</city>
            <region>NY</region>
            <code>13495</code>
            <country>USA</country>
            </postal>
            <email>stu.card@axenterprize.com</email>
        </address>
    </author>

    <author fullname="Robert Moskowitz" initials="R" surname="Moskowitz">
        <organization>HTT Consulting</organization>
        <address>
            <postal> 
            <street>0000</street>
            <city>Oak Park</city>
            <region>MI</region>
            <code>48237</code>
            <country>USA</country>
            </postal>
            <email>rgm@labs.htt-consult.com</email>
        </address>
    </author>

    <date year="2019" />
    <area>Internet</area>
    <workgroup>TMRID</workgroup>
    <keyword>RFC</keyword>
    <keyword>Request for Comments</keyword>
    <keyword>I-D</keyword>
    <keyword>Internet-Draft</keyword>
    <keyword>HIP</keyword>
    <keyword>TMRID</keyword>

    <abstract>
    <t>
        This document describes how to include trust into the proposed ASTM Remote ID specification defined in WK65041 by the F38 Committee under a Broadcast Remote ID (RID) scenario. It defines a few different message schemes (based on the authentication message) that can be used to assure past messages sent by a UA and also act as a assurance for UA trustworthiness in the absence of Internet connectivity at the receiving node.
    </t>
    </abstract>
</front>

<middle>   

<section title="Introduction">
<t>
    UA Systems (UAS) are usually in a volatile environment when it comes to communication. UA are generally small with little computational (or flying)  horsepower to carry standard communication equipment. This limits  the mediums of communication to few viable options.
</t>
<t>
    The ASTM standard focuses on two ways of communicating to a UAS for RID: Broadcast and Network. <!-- <xref target="I-D.card-tmrid-uas" /> -->
</t>
<t>
    This document will focus on adding trust to Broadcast RID in the current authentication message format, using the 
    Host Identity Protocol Version 2 (HIPv2) <xref target="RFC7401" /> Hierarchical HIT (HHIT) <xref target="I-D.moskowitz-hip-hierarchical-hit" />.
</t>
</section>

<section anchor="terms" title="Terms and Definitions">
    <section title="Requirements Terminology">
    <t>
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL 
        NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", 
        "MAY", and "OPTIONAL" in this document are to be interpreted as 
        described in BCP 14 <xref target="RFC2119" /> <xref 
        target="RFC8174" /> when, and only when, they appear in all 
        capitals, as shown here.
    </t>
    </section>
    <section title="Definitions">
    <t>
        <list style="hanging">
        <t hangText="CAA">
          Civil Aeronautics Administration. An example is the Federal Aviation Administration; (FAA) in the United States of America.
        </t>
        <t hangText="C2">
          Command and Control.
        </t>
        <t hangText="RID">
          Remote ID. 
        </t>
        <t hangText="HI">
          Host Identity. The public key portion of an assymetric keypair from HIP. In this document it is assume that the HI is a EdDSA25519 keypair. This is supported by new crypto defined in <xref target="I-D.moskowitz-hip-new-crypto" />.
        </t>
        <t hangText="HIT">
          Host Identity Tag. Defined in HIPv2 <xref target="RFC7401" />.
        </t>
        <t hangText="HHIT">
          Hierarchical Host Identity Tag. Defined in <xref target="I-D.moskowitz-hip-hierarchical-hit" />.
        </t>
        <t hangText="UA">
          Unmanned Aircraft. In this document UAs are typically though of as drones of commerical or military variety. This is a very strict definition which can be relaxed to include any and all aircraft that are unmanned.
        </t>
        <t hangText="UAS (Unmanned Aircraft System)">
          Composed of Unmanned Aircraft and all required on-board subsystems, payload, control station, other required off-board subsystems, any required launch and recovery equipment, all required crew members, and command and control (C2) links between UA and the control station.
        </t>
        <t hangText="USS (UAS Service Supplier)">
          USSs provide UTM services to support the UAS community, to connect Operators and other entities to enable information flow across the USS network, and to promote shared situational awareness among UTM participants. (From FAA UTM ConOps V1, May 2018).
        </t>
        </list>
    </t>
    </section>
</section>

<section title="Background">

<section title="Problem Space And Document Focus">
<t>
    The current draft standard for Remote ID (RID) does not, in any meaningful capacity, address the concerns of trust in the UA space with communication in the Broadcast RID environment. This is a requirement that will need to be addressed eventually for various different parties that have a stake in the UA industry.
</t>
<t>
    The following subsections will provide reference to the ASTM standard for authentication messages and how their current limitations effect trust in the Broadcast RID envirorment.
</t>
</section> <!-- END PROBLEM SPACE AND FOCUS -->

<section title="Notation in the ASTM Remote ID Standard">
<t>
    As per the ASTM drafts <xref target="WK65041" />:
</t>
<t>
    "Non-magnitude values, strings, or IDs that may be or may not be numerical (such as the Unique ID) shall be expressed in Network Byte Order which reads in a left to right, most significant byte (MSB) to least significant byte (LSB) order. Magnitude values expressed as 16 or 32 bit integers (such as Latitude, Longitude, Altitude, etc.) shall be expressed as “little endian”, where the LSB is on the left and the MSB is on the right."
</t>
<t>
    In short; representation is network byte order but values are encoded little-endian.
</t>
</section>

<section title="ASTM Authentication Message">
<figure>
    <artwork align="left">
Page 0:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|  Msg. Header  |   Page Count  |     Length    |               /
+---------------+---------------+---------------+---------------+
/                   Timestamp                   |               |
+-----------------------------------------------+               |
|                                                               |
|                                                               |
|                                                               |
|                Authentication Data / Signature                |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+

Page 1 - 4:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-----------------------------------------------+
|  Msg. Header  |                                               |
+---------------+                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                 Authentication Data / Signature               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+

Msg. Header: (1 byte)
    On all pages. Contains two subfields.

       0     1     2     3     4     5     6     7
    +-----+-----+-----+-----+-----+-----+-----+-----+
    |      Page Number      |  Authentication Type  |
    +-----+-----+-----+-----+-----+-----+-----+-----+

    Authentication Type: (4 bits)
        Field denoting authentication message type based 
        on the following table.

        Number   Type
        ------   ----
        0        None
        1        UAS ID Signature
        2        Operator ID Signature
        3        Message Set Signature
        4        Authentication Provided by Network RID
        5-9      Reserved for Specification
        A-F      Avalible for Private Use

    Page Number: (4 bits)
        Sequence number of current page in authentication 
        message.

Page Count: (1 byte) 
    Only on page 0. 
    Total number of pages this authentication message has. 
    Max value of 5.

       0     1     2     3     4     5     6     7
    +-----+-----+-----+-----+-----+-----+-----+-----+
    |       Page Count      |        RESERVED       |
    +-----+-----+-----+-----+-----+-----+-----+-----+

Length: (1 byte)              
    Only on page 0. 
    Total length of Authentication Data / Signature in bytes. 
    Value of 0 - 109.

Timestamp: (4 bytes)           
    Only on page 0. 
    32 bit Unix timestamp in seconds since 00:00:00 01/01/2019.
    To relate back to standard Unix timestamp, add 1546300800 to
    base it on 00:00:00 01/01/1970.
    Max of 01/19/2087 @ 3:14am (UTC).

Authentication Data / Signature: (109 bytes: 17+23*4)
    Opaque authentication data.
    </artwork>
</figure>
</section> <!-- END ASTM AUTH FORMAT -->

<section title="Thoughts on ASTM Authentication Message">
<t>
    The format proposed by the ASTM is designed with a few major considerations in mind, which the authors feel put significant limitations on the standard.
</t>
<t>
    The primary consideration (in this context) is the use of the Bluetooth 5.X Extended Frame format. This method allows for a 255 byte payload to be sent in what the ASTM refers to as an "atomic message".
</t>
<t>
    The idea in the ASTM is to include up to five standard ASTM Broadcast RID messages (each of which are 25 bytes) plus a single authentication message (5 pages of 25 bytes each) in an atomic message. The reasoning is then the authentication message is for the entire atomic message pack.
</t>
<t>
    The authors have no issues with this proposed approach; given the restraints and current technologies the ASTM did a good job. However, by limiting the authentication message to ONLY five pages in the standard it ignores the possibility of other formatting options to be created and used.
</t>
</section> <!-- END LIMITATIONS -->

<section title="TM-RID Supporting Levels">
<t>
    This document is assuming that the first two levels of TM-RID (Identification and Authentication) are implemented. This document serves as a expansion to these two levels, leveraging the abilities of the HHIT Registries <xref target="I-D.moskowitz-hip-hhit-registries" /> to its fullest potenional.
</t>
</section>
</section> <!-- END BACKGROUND -->

<section title="HIP Based Extensions to the ASTM Authentication Message">
<t>
    The following section describes various methods that HIP can help enable more trustworthy communication using the Authentication Message as the base. Each diagram will show all 5 pages of the format filled out.
</t>

<section title="HIP Based Authentication Wrapper">
<figure>
    <artwork align="left">
Page 0:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|  Msg. Header  |   Page Count  |     Length    |               /
+---------------+---------------+---------------+---------------+
/                   Timestamp                   |    RESERVED   |
+-----------------------------------------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                             HHIT                              |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+

Page 1:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-----------------------------------------------+
|  Msg. Header  |                 Trust Timestamp               /
+---------------+---------------+-------------------------------+
/               |    RESERVED   |                               |
+---------------+---------------+                               |
|                                                               |
|                                                               |
|                                                               |
|                         HHIT Signature                        |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+

Page 2:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-----------------------------------------------+
|  Msg. Header  |                                               |
+---------------+                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         HHIT Signature                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+

Page 3:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-----------------------------------------------+
|  Msg. Header  |                                               |
+---------------+                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         HHIT Signature                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+

Page 4:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-----------------------------------------------+
|  Msg. Header  |                                               |
+---------------+                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                            Payload                            |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+

HHIT: (16 bytes)                
    HHIT using the EdDSA25519 HI.

Trust Timestamp: (4 bytes)     
    Timestamp denoting a future time to trust message to.

HHIT Signature: (64 bytes)      
    Signature of payload using the EdDSA25519 keypair.
    Spread across 3 pages.

Payload: (0 to 23/25 bytes)             
    Opaque payload data that has been used in signing.
    This can be increased to 25 by removing padding RESERVED
    sections.
    </artwork>
</figure>

<t>
    This format is a way to authenticate a given UA using Level 1 and Level 2 of the TM-RID architecture. <!-- <xref target="I-D.card-tmrid-uas" /> -->
</t>

</section> <!-- END AUTH 1 -->

<section title="Signed Hash Lists">
<figure>
    <artwork align="left">
Page 0:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|  Msg. Header  |   Page Count  |     Length    |               /
+---------------+---------------+---------------+---------------+
/                   Timestamp                   | H-Alg | H-Len |
+---------------------------------------------------------------+
|                Hash of Previous Auth. Message                 |
+---------------------------------------------------------------+
|                Hash of Current Auth. Message                  |
+---------------------------------------------------------------+
|                          Message Hash                         |
+---------------------------------------------------------------+
|                          Message Hash                         |
+---------------------------------------------------------------+

DataPage 1:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+-------------------------------+
|  Msg. Header  | H-Alg | H-Len |            RESERVED           |
+---------------+---------------+-------------------------------+
|                          Message Hash                         |
+---------------------------------------------------------------+
|                          Message Hash                         |
+---------------------------------------------------------------+
|                          Message Hash                         |
+---------------------------------------------------------------+
|                          Message Hash                         |
+---------------------------------------------------------------+
|                          Message Hash                         |
+---------------------------------------------------------------+

Page 2:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+-------------------------------+
|  Msg. Header  |    RESERVED   |       Signature Length        |
+---------------+---------------+-------------------------------+
|       Signature Algorithm     |                               |
+-------------------------------+                               |
|                                                               |
|                                                               |
|                                                               |
|                         HHIT Signature                        |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+

Page 3:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-----------------------------------------------+
|  Msg. Header  |                                               |
+---------------+                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         HHIT Signature                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+

Page 4:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-----------------------------------------------+
|  Msg. Header  |                                               |
+---------------+                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         HHIT Signature                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+

H-Alg, H-Len: (4 bits), (4 bits)
    These are fields for relaying information of the Hash 
    algorithm used for the messages and the Hash length (in octets).
    For this example of the format a length of 4 bytes is
    used.

Hash of Previous Auth. Message: (4 bytes)
    A hash of the previously sent Authentication message. 

Hash of Current Auth. Message: (4 bytes)
    A hash of the current Authentication message. 

Message Hash: (4 bytes)
    A hash of a previously sent message.

Signature Length: (2 bytes)
    Length of signature in octets, excluding Length, and Padding

Signature Algorithm: (2 bytes)
    Self explanatory.

HHIT Signature: (64 bytes)
    EdDSA25519 signature using an EdDSA25519-based HHIT from HIP. 
    Spread across 3 pages.
    </artwork>
</figure>

<t>
    This format is designed to provide provenance to Broadcast RID messages sent by a give UAS. It should be noted that the HHIT is not provided in the format like others - instead it must be obtained via the  Basic ID Message.
</t>
<t>
    By hashing previously sent messages and signing them we gain trust in the UAS's previous reports. An observer who has been listening for any length of time can hash received messages and cross check against listed hashes. The signature is signed across the list of hashes.
</t>

<section title="Pseudo-blockchain Hashes">
<t>
    Two special hashes are included; a previous authentication hash, which links to the previous signed hash list message, as well as a current hash. This gives a pseudo-blockchain provenance to the authentication message that could be traced back if the observer was present for extended periods of time.
</t>
<t>
    In regards to the creation and use of the current authentication hash field:
</t>
<t>
    <list>
    <t>
        During creation and signing of this message format this field MUST be set to 0. So the signature will be based on this field being 0, as well as its own hash. It is an open question of if we compute the hash, then sign or sign then compute.
    </t>
    <t>    
        There a few different ways to cycle this message. We can "roll up" the hash of 'current' to 'previous' when needed or to completely recompute the hash. This mostly depends on the previous note.
    </t>
    </list>
</t>
</section>

<section title="Limitations">
<t>
    With the current format defined by ASTM only 7 messages can be hashed reasonably in the above format. RESERVED padding, the Signature Algorithm, Signature Length and redundant H-Alg, H-Len fields (of page 1) could be removed. This would increase the total list of hashes to 9 while losing word alignment of the hashes in each page.
</t>
<t>
    To address this problem properly the authors feel that the Authentication Messages needs to have a max bound of 10 pages, instead of 5.
</t>
</section>
</section> <!-- END SIGNED HASH LISTS -->

<section title="HIP Based Offline Authentication">
<figure>
    <artwork align="left">
 0                   1                     2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|                            DEV HHIT                           |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                            TIMESTAMP                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|                            DEV HHIT                           |
|                              SIG                              |
.                                                               .
.                                                               .
.                                                               .
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|                              DEV HI                           |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                         AUTH TIMESTAMP                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|                           AUTH HHIT                           |
|                                                               |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|                            AUTH                               |
|                              SIG                              |
.                                                               .
.                                                               .
.                                                               .
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
/                            PAYLOAD                            /
/                                                               /
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

DEV HHIT       16 byte Dev HHIT of EdDSA25519 HI
TIMESTAMP      4 byte packet trust until timestamp
DEV HHIT SIG   64 byte Signature of whole packet
DEV HI         32 byte Device HI of EdDSA25519 HI
AUTH TIMESTAMP 4 byte Dev HHIT trust until timestamp
AUTH HHIT      16 byte Authorizer's HHIT of EdDSA25519 HI
AUTH SIG       64 byte Signature of Device HHIT-HI
PAYLOAD        0 to n bytes of payload
Length         200 + n bytes
    </artwork>
</figure>

<t>
    This specific format does not currently fit within the ASTM specification. Requiring a minimum of 200 bytes, this would require the Authentication Message to have 10 pages, instead of the current 5 page limit.
</t>
<t>
    What this will grant, if attainable in future revisions of the ASTM specification, is the ability to authenticate UA information when the receiving device of the observer (e.g. a smartphone with a dedicated RID application) has no Internet service (e.g. LTE signal).
</t>
<t>
    By including the device HI along with a signature from the registry the UA is under, we can assert trust of a given drone without requiring the need for immediate reverse lookups online.
</t>
</section>
</section> <!-- END AUTH 2 -->

<section title="Example Use Cases">
<t>
    This section introduces potentional use cases of the HIP based extensions to the ASTM standard authentication message.
</t>

<section title="Trusted Messages">
<t>
    Using the HIP Based Authentication Wrapper any single Broadcast RID message defined by ASTM can become what the authors refer to as a "Trusted Message".
</t>
<t>
    One specific use case that is useful in the UAS RID space is the creation of a "Trusted Vector Message". By placing a previous [or new] vector message into the Payload section of this format a verifiable broadcast can be created. 
</t>
<t>
    Due to being signed this creates an authentic vector that is hard to spoof, which can confirm flight paths in near real time.
</t>
<t>
    The figure below is a example of a "Trusted Vector Message". Note that the padding (RESERVED) byte are now gone. The "Trust Timestamp" and "Vector Message" fields now span multiple pages instead of being aligned to pages. 
</t>

<figure>
    <artwork align="left">
Page 0:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|  Msg. Header  |   Page Count  |     Length    |               /
+---------------+---------------+---------------+---------------+
/                   Timestamp                   |               |
+-----------------------------------------------+               |
|                                                               |
|                                                               |
|                                                               |
|                             HHIT                              |
|                                                               |
|                                               +---------------+
|                                               |               /
+-----------------------------------------------+---------------+

Page 1:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-----------------------------------------------+
|  Msg. Header  /                 Trust Timestamp               |
+---------------+-----------------------------------------------+
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         HHIT Signature                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+

Page 2:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-----------------------------------------------+
|  Msg. Header  |                                               |
+---------------+                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         HHIT Signature                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+

Page 3:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-----------------------------------------------+
|  Msg. Header  |                                               |
+---------------+                                               |
|                                                               |
|                                                               |
|                                                               |
|                         HHIT Signature                        |
|                                                               |
|                                                               |
|                                                               |
|                               +-------------------------------+
|                               |        Vector Message         |
+-------------------------------+-------------------------------+

Page 4:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-----------------------------------------------+
|  Msg. Header  |                                               |
+---------------+                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         Vector Message                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+
    </artwork>
</figure>
</section> <!-- END TRUSTED MESSAGE -->

<section title="Wrapped Signed Hashes">
<t>
    Using the HIP Based Authentication Wrapper a [short] list of hashes can be signed. These hashes are of previous individual RID messages.
</t>
<t>
    This follows the format of the Signed Hash List, excluding the psuedo-blockchain hashes and various other fields enabling it to fit within the 23 byte limit of the final page.
</t>
<t>
    To the authors, this format has limited use due to numerous concerns of replay attacks. It is suggested to instead use the full Signed Hash List format.
</t>

<figure>
    <artwork align="left">
Page 0:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|  Msg. Header  |   Page Count  |     Length    |               /
+---------------+---------------+---------------+---------------+
/                   Timestamp                   |    RESERVED   |
+-----------------------------------------------+---------------+
|                                                               |
|                                                               |
|                                                               |
|                             HHIT                              |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+

Page 1:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-----------------------------------------------+
|  Msg. Header  |                 Trust Timestamp               /
+---------------+---------------+-------------------------------+
/               |    RESERVED   |                               |
+---------------+---------------+                               |
|                                                               |
|                                                               |
|                                                               |
|                         HHIT Signature                        |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+

Page 2:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-----------------------------------------------+
|  Msg. Header  |                                               |
+---------------+                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         HHIT Signature                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+

Page 3:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+-----------------------------------------------+
|  Msg. Header  |                                               |
+---------------+                                               |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
|                         HHIT Signature                        |
|                                                               |
|                                                               |
|                                                               |
|                                                               |
+---------------------------------------------------------------+

Page 4:
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+-------------------------------+
|  Msg. Header  | H-Alg | H-Len |            RESERVED           |
+---------------+---------------+-------------------------------+
|                          Message Hash                         |
+---------------------------------------------------------------+
|                          Message Hash                         |
+---------------------------------------------------------------+
|                          Message Hash                         |
+---------------------------------------------------------------+
|                          Message Hash                         |
+---------------------------------------------------------------+
|                          Message Hash                         |
+---------------------------------------------------------------+
    </artwork>
</figure>
</section> <!-- END SIGNED HASHES SHORT -->
</section> <!-- END EXAMPLES -->

<section anchor="IANA" title="IANA Considerations">
<t>
    TBD
</t>
</section>

<section title="Security Considerations">
<t>
    TBD
</t>
</section>

<section title="Acknowledgments">
<t>
    TBD
</t>
</section>

</middle>

<back>
<references title="Normative References">
    <?rfc include="reference.RFC.2119.xml"?>
    <?rfc include="reference.RFC.8174.xml"?>
</references>
<references title="Informative References">
    <?rfc include="reference.RFC.7401.xml"?>
    <?rfc include="reference.I-D.moskowitz-hip-hierarchical-hit.xml"?>
    <?rfc include="reference.I-D.moskowitz-hip-hhit-registries.xml"?>
    <?rfc include="reference.I-D.moskowitz-hip-new-crypto.xml"?>
    <!-- <?rfc include="reference.I-D.card-tmrid-uas.xml"?> -->
    <reference anchor="WK65041" target="">
        <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author><organization>ASTM</organization></author>
            <date month="09" year="2019" />
        </front>
    </reference>
</references>
</back>
</rfc>
