<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wiethuechter-drip-det-registration-coap-cwt-00" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="det-registration-coap-cwt">DRIP Entity Tag (DET) Registration using CoAP &amp; CWTs</title>
    <seriesInfo name="Internet-Draft" value="draft-wiethuechter-drip-det-registration-coap-cwt-00"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <date year="2024" month="September" day="27"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies a registration interaction model and interfaces for DRIP Entity Tags to a DRIP Identity Management Entity using the Constrained Application Protocol and CBOR Web Tokens.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>To properly use a DRIP Entity Tag (DET) it SHOULD be registered to a DRIP Identity Management Entity (DIME). Due to the various components of Unmanned Aircraft System (UAS), typically an Unmanned Aircraft (UA) and Ground Control Station (GCS), sharing similar properties to Internet of Thing (IoT) devices the Constrained Application Protocol (CoAP) <xref target="RFC7252" format="default"/> is a good choice for registration interactions between the UAS and DIME.</t>
      <t>This document specifies registration interactions using CoAP as the transport and CBOR Web Tokens (CWTs) <xref target="RFC8392" format="default"/> as the optional secure container. This document only specifies the minimum data models for registration of a DET. Other elements that MAY be required by policy are out of scope for this document.</t>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="interaction-model" numbered="true" toc="default">
      <name>Interaction Model</name>
      <t>A general interaction model (<xref target="simple-z" format="default"/>) is used for all DET based registrations.</t>
      <figure anchor="simple-z">
        <name>Simplified DET Registration Z-Diagram</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
            registrant             dime
                |                   |
(0) GEN_DET/HI  |                   |
(1) GEN_CSR     |                   |
                |----(2) INPUT----->|
                |                   | (3) VALID_INPUT?
                |<-------FAIL-------|
                |                   | (4) DUPE_HI?
                |<-------FAIL-------|
                |                   | (5) DUPE_DET?
                |<-------FAIL-------|
                |                   | (6) GEN_CERTS
                |                   | (7) UPDATE_DATABASE
                |                   | (8) UPDATE_NS
                |<----(9) OUTPUT----|
]]></artwork>
      </figure>
      <dl newline="false" spacing="normal">
        <dt>(0) GEN_DET/HI:</dt>
        <dd>
  The registrant that plans to use the identity and its cryptographic properties SHOULD generate the asymmetric key-pair of their choosing and MUST protect the private key with best common practices. The registrant MAY derive the corresponding DET. How the registrant obtains the desired HID for DET generation is out of scope for this document.</dd>
        <dt>(1) GEN_CSR:</dt>
        <dd>
  The registrant MUST generate a CSR for their HI/DET. See <xref target="csr" format="default"/> for more details.</dd>
        <dt>(2) INPUT:</dt>
        <dd>
  The registrant MUST format and send the required information for a given service registration as specified by the DIME.</dd>
        <dt>(3) VALID_INPUT?:</dt>
        <dd>
  The DIME, upon receipt of service registration inputs, MUST validate the input data. This may be simply performing syntax checks to ensure the data is properly formatted all the way to full semantic validation. Signed data MUST have their signatures verified before further processing. Failure of input validation SHOULD return errors to the registrant.</dd>
        <dt>(4) DUPE_HI?:</dt>
        <dd>
  The DIME MUST check that the proposed HI is not a duplicate already in use. The registrant SHOULD be notified with an error if duplication is detected.</dd>
        <dt>(5) DUPE_DET?:</dt>
        <dd>
  The DIME MUST check that the proposed DET, derived from the HI, is not a duplicate already in use. If the registrant proposed a DET with HID outside that of the DIME, it MUST be rejected. If the registrant only provided the HI, the DIME MUST generate the DET using its HID. The registrant SHOULD be notified with an error if duplication is detected.</dd>
        <dt>(6) GEN_CERTS:</dt>
        <dd>
  The DIME, after all the above validation, MUST generate a Broadcast Endorsement using the provided HI and DET from the registrant as the evidence. This Endorsement is used in <xref target="RFC9575" format="default"/>. An associated X.509 is also generated which signifies the DIME accepts the DET/HI pairing from the registrant</dd>
        <dt>(7) UPDATE_DATABASE:</dt>
        <dd>
  The DIME MUST update the Private Information Registry with any PII that was part of the registration. It MAY include additional metadata or public information. How the Private Information Registry is updated is out of scope for this document.</dd>
        <dt>(8) UPDATE_NS:</dt>
        <dd>
  The DIME MUST update the Authoritative Name Server with any public information that was part of the registration. This information MUST be stored as described in <xref target="DET-DNS" format="default"/>.</dd>
        <dt>(9) OUTPUT:</dt>
        <dd>
  The DIME, upon successful updates of the Private Information Registry and Authoritative Name Server, transmits to the registrant the list of Broadcast Endorsements that make up the trust chain for use in <xref target="RFC9575" format="default"/>.</dd>
      </dl>
    </section>
    <section anchor="csr" numbered="true" toc="default">
      <name>X.509 Certification Signing Request</name>
      <t>CSRs MUST be used to convey the various cryptographic and identity properties of a DET during a registration. The <tt>subjectName</tt> of the CSR is used to determine the type of registration the DET is to be used for. When the <tt>subjectName</tt> of the CSR is set to <tt>SERIAL_NUMBER</tt> then the CSR is related to the UA for use as a Session ID and/or an Authentication Key ID. Any other <tt>subjectName</tt> indicates some other entity using a DET as their identifier and are not in scope for this document. <xref target="minimal-csr" format="default"/> is an example CSR.</t>
      <figure anchor="minimal-csr">
        <name>Broadcast RID Session CSR without subjectAltName</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
-----BEGIN CERTIFICATE REQUEST-----
MIGaME4CAQAwGzEZMBcGA1UEBRMQMTY0OEJHRU4zVE1SMDAwMDAqMAUGAytlcAMh
AEV/gIxyi4tbRobDCu0zleb9gmQD4teLQt5FfkCey/XxoAAwBQYDK2VwA0EA3vxm
sCGt+qK39V9cfit4UptfqTd+wct7dxOgdmlYL+dTmC4HU1UaM21l0YnDP9CzoH93
4c2wzRrlB/J5BW35DQ==
-----END CERTIFICATE REQUEST-----

Certificate Request:
    Data:
        Version: 1 (0x0)
        Subject: serialNumber = 1648BGEN3TMR0000
        Subject Public Key Info:
            Public Key Algorithm: ED25519
                ED25519 Public-Key:
                pub:
                    45:7f:80:8c:72:8b:8b:5b:46:86:c3:0a:ed:33:95:
                    e6:fd:82:64:03:e2:d7:8b:42:de:45:7e:40:9e:cb:
                    f5:f1
        Attributes:
            a0:00
    Signature Algorithm: ED25519
         de:fc:66:b0:21:ad:fa:a2:b7:f5:5f:5c:7e:2b:78:52:9b:5f:
         a9:37:7e:c1:cb:7b:77:13:a0:76:69:58:2f:e7:53:98:2e:07:
         53:55:1a:33:6d:65:d1:89:c3:3f:d0:b3:a0:7f:77:e1:cd:b0:
         cd:1a:e5:07:f2:79:05:6d:f9:0d
]]></artwork>
      </figure>
      <t>A CSR without a <tt>subjectAltName</tt> is indicating to the DIME that they do not know or care which HID and OGA ID they are registered with. In this scenario the DIME MUST generate the DET for the registrant and return it. If the registrant does known which HID and/or OGA ID they want the CSR SHOULD contain the <tt>subjectAltName</tt> containing the DET they wish to register with. <xref target="explicit-csr" format="default"/> is an example CSR with the <tt>subjectAltName</tt>.</t>
      <figure anchor="explicit-csr">
        <name>Broadcast RID Session CSR with subjectAltName</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
-----BEGIN CERTIFICATE REQUEST-----
MIHLMH8CAQAwGzEZMBcGA1UEBRMQMTY0OEJHRU4zVE1SMDAwMDAqMAUGAytlcAMh
AEV/gIxyi4tbRobDCu0zleb9gmQD4teLQt5FfkCey/XxoDEwLwYJKoZIhvcNAQkO
MSIwIDAeBgNVHREBAf8EFDAShxAgAQA//gABBS9EvMRvcVpCMAUGAytlcANBAD1O
ZBD16dCvhryQ1qIh5oh60ellac0gymi0dXt9QNZFrAEh3GoJrbpQKNcHc3SArCzJ
AgtxkmVaUz7wJ78LXgc=
-----END CERTIFICATE REQUEST-----

Certificate Request:
    Data:
        Version: 1 (0x0)
        Subject: serialNumber = 1648BGEN3TMR0000
        Subject Public Key Info:
            Public Key Algorithm: ED25519
                ED25519 Public-Key:
                pub:
                    45:7f:80:8c:72:8b:8b:5b:46:86:c3:0a:ed:33:95:
                    e6:fd:82:64:03:e2:d7:8b:42:de:45:7e:40:9e:cb:
                    f5:f1
        Attributes:
        Requested Extensions:
            X509v3 Subject Alternative Name: critical
                IP Address:2001:3F:FE00:105:2F44:BCC4:6F71:5A42
    Signature Algorithm: ED25519
         3d:4e:64:10:f5:e9:d0:af:86:bc:90:d6:a2:21:e6:88:7a:d1:
         e9:65:69:cd:20:ca:68:b4:75:7b:7d:40:d6:45:ac:01:21:dc:
         6a:09:ad:ba:50:28:d7:07:73:74:80:ac:2c:c9:02:0b:71:92:
         65:5a:53:3e:f0:27:bf:0b:5e:07
]]></artwork>
      </figure>
    </section>
    <section anchor="models" numbered="true" toc="default">
      <name>Models</name>
      <section anchor="registration-model" numbered="true" toc="default">
        <name>Registration Model</name>
        <figure anchor="registration-model-fig">
          <name>Registration Model CDDL</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
registration-model = {
    csrs: [+ csr: csr-data],
    ? f3411: {
        ? uas_type: nibble-field,
        ? uas_ids: uas-id-map,
        ? self-grp,
        ? area-grp,
        ? classification-grp,
        ? operator-grp,
    },
    ? utm: {
        operational_intent: #6.37(bstr),
        uss_uri: #6.32(tstr) / tstr
    },
    * tstr => any
    
}
csr-data = [
    csr: bstr
    ? vnb: time, 
    ? vna_offset: uint,
]
uas-id-map = {
    &uas-id-types: [+ uas-id]
}
uas-id-types = (none: 0, serial: 1, caa_id: 2, utm_id: 3, session_id: 4)
uas-id: tstr .size(1..20) / bstr .size(1..20)
area-grp = (
    area_count: 1..255,
    area_radius: float,
    area_floor: float,
    area_ceiling: float
)
classification-grp = (
    ua_class: 0..8,
    eu_class: nibble-field,
    eu_category: nibble-field
)
self-grp = (
    desc_type: nibble-field,
    description: tstr .size(23)
)
operator-grp = (
    operator_id_type: nibble-field,
    operator_id: bstr .size(20)
)
nibble-field = 0..15
]]></artwork>
        </figure>
        <t>The <tt>csr-data</tt> model allows flexibility of the registrant to specify the time bounds for a given key. Exclusion of either the <tt>vnb</tt> and/or <tt>vna_offset</tt> indicates to the DIME to use the defaults of the jurisdiction for the missing datum.</t>
        <t>Other keys MAY be provided and specified to carry specific data required for the registration to the DIME. Such data can include operator/organizational information. The details of such extension are out of scope for this document.</t>
      </section>
      <section anchor="response-model" numbered="true" toc="default">
        <name>Response Model</name>
        <figure anchor="response-model-fig">
          <name>Response Model CDDL</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
response-model = {
    registration_cert: bstr / #6.TBD,
    ? be_chain: [+ be: bstr .size(136)]
}
]]></artwork>
        </figure>
        <t><tt>registration_cert</tt> MUST be the Canonical Public Registration Certificate defined in <xref target="DET-DNS" format="default"/> in a DER (X.509) or CBOR (C.509) encoding. The <tt>be_chain</tt> contains the Broadcast Endorsement structures required for <xref target="RFC9575" format="default"/> and MUST be sent in responses for a Broadcast RID Session.</t>
      </section>
      <section anchor="model-use" numbered="true" toc="default">
        <name>Model Use</name>
        <t>Below are overviews of variants of the above data models for supported registrations in this document. Other registration types that are defined by RAA and/or HDA policy are out of scope for this document.</t>
        <dl newline="false" spacing="normal">
          <dt>Broadcast RID Session:</dt>
          <dd>
  Registrations from UA for either Session IDs, Authentication Key IDs or both. It MAY use the <tt>f3411</tt> key to provide static F3411 Broadcast RID information. MUST use the <tt>be_chain</tt> key to return Broadcast Endorsements for <xref target="RFC9575" format="default"/>.</dd>
          <dt>Operator:</dt>
          <dd>
  MUST NOT use the <tt>f3411</tt> key. MUST NOT use the <tt>be_chain</tt> key.</dd>
          <dt>DIME:</dt>
          <dd>
  MUST NOT use the <tt>f3411</tt> key. MUST use the <tt>be_chain</tt> key to return Broadcast Endorsements for <xref target="RFC9575" format="default"/>.</dd>
        </dl>
      </section>
    </section>
    <section anchor="coap" numbered="true" toc="default">
      <name>CoAP</name>
      <t>CoAP SHOULD be used using DTLS when possible and MUST send the data model encoded as CBOR. When DTLS is not possible, and CoAP is instead used with UDP, the payload MUST be in a CWT as defined in <xref target="cwt" format="default"/>.</t>
      <section anchor="endpoints" numbered="true" toc="default">
        <name>Endpoints</name>
        <t>The base URL of a given URI is out of scope for this document, however the path of such SHOULD be <tt>/operator</tt>, <tt>/aircraft</tt> or <tt>/broadcast_session</tt> per the class of registration. These URIs SHOULD be publicly accessible and discoverable via some mechanism (such as <tt>/.well-known/</tt>).</t>
      </section>
    </section>
    <section anchor="cwt" numbered="true" toc="default">
      <name>CWT</name>
      <t>When a CWT is to be used it SHOULD be encrypted. The CWT is signed by the registrant. For a Broadcast Session the registrant usually is the Operator (or a proxy for the Operator such as the GCS) but MAY be the UA directly if the UA has a long term cryptographic identity.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>Cryptographic materials (key-pairs, CSRs, etc.) SHOULD be generated on the device they are intended to be used. There may be scenarios where other parts of the UAS MAY generate the cryptographic materials and provision them as needed during an operation. Any such system SHOULD ensure security of the cryptographic material is guaranteed.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="DET-DNS" target="https://datatracker.ietf.org/doc/html/draft-ietf-drip-registries-18">
          <front>
            <title>DRIP Entity Tags (DET) in the Domain Name System (DNS)</title>
            <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <author fullname="Jim Reid" initials="J." surname="Reid">
              <organization>RTFM llp</organization>
            </author>
            <date day="27" month="September" year="2024"/>
            <abstract>
              <t>   This document describes the discovery and management of DRIP Entity
   Tags (DETs) in DNS.  Authoritative Name Servers, with DRIP specific
   DNS structures and standard DNS methods, are the Public Information
   Registries for DETs and their related metadata.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-18"/>
        </reference>
        <reference anchor="RFC7252" target="https://www.rfc-editor.org/info/rfc7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9374" target="https://www.rfc-editor.org/info/rfc9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC9434" target="https://www.rfc-editor.org/info/rfc9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC9575" target="https://www.rfc-editor.org/info/rfc9575">
          <front>
            <title>DRIP Entity Tag (DET) Authentication Formats and Protocols for Broadcast Remote Identification (RID)</title>
            <author fullname="A. Wiethuechter" initials="A." role="editor" surname="Wiethuechter"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>The Drone Remote Identification Protocol (DRIP), plus trust policies and periodic access to registries, augments Unmanned Aircraft System (UAS) Remote Identification (RID), enabling local real-time assessment of trustworthiness of received RID messages and observed UAS, even by Observers lacking Internet access. This document defines DRIP message types and formats to be sent in Broadcast RID Authentication Messages to verify that attached and recently detached messages were signed by the registered owner of the DRIP Entity Tag (DET) claimed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9575"/>
          <seriesInfo name="DOI" value="10.17487/RFC9575"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
