<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-23" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="DET in DNS">DRIP Entity Tags (DET) in the Domain Name System (DNS)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-23"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter" role="editor">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2025" month="February" day="06"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 86?>

<t>This document describes the discovery and management of DRIP Entity Tags (DETs) in DNS. Authoritative Name Servers, with DRIP specific DNS structures and standard DNS methods, are the Public Information Registries for DETs and their related metadata.</t>
    </abstract>
  </front>
  <middle>
    <?line 90?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Registries are fundamental to Unmanned Aircraft System (UAS) Remote Identification (RID). Only very limited operational information can be sent via Broadcast RID, but extended information is sometimes needed. The most essential element of information from RID is the UAS ID, the unique key for lookup of extended information in relevant registries (see Figure 4 of <xref target="RFC9434"/>).</t>
      <t>When a DRIP Entity Tag (DET) <xref target="RFC9374"/> is used as the UAS ID in RID, extended information can be retrieved from a DRIP Identity Management Entity (DIME) which manages registration of and associated lookups from DETs. In this document we assume the DIME is a function of UAS Service Suppliers (USS) (Appendix A.2 of <xref target="RFC9434"/>) but a DIME can be independent or handled by another entity as well.</t>
      <section anchor="general-concept">
        <name>General Concept</name>
        <t>DRIP Entity Tags (DETs) embedded a hierarchy scheme which is mapped onto the Domain Name System (DNS). DIME's enforce registration and information access of data associated with a DET while also providing the trust inherited from being a member of the hierarchy. Other identifiers and their methods are out of scope for this document.</t>
        <t>Authoritative Name Servers of the Domain Name System (DNS) provide the Public Information such as the cryptographic keys, endorsements and certificates of DETs and pointers to Private Information resources. Cryptographic (public) keys are used to authenticate anything signed by a DET, such as in the Authentication defined in <xref target="RFC9575"/> for Broadcast RID. Endorsements and certificates are used to endorse the claim of being part of the hierarchy.</t>
        <t>Aspects of Private Information Registries to store and protect, through AAA mechanisms, Personally Identifiable Information (PII) are not described in this document.</t>
      </section>
      <section anchor="use-of-existing-dns-models">
        <name>Use of Existing DNS Models</name>
        <t>DRIP relies on the DNS and as such roughly follows the registrant-registrar-registry model. In DRIP, the registrant would be the end user who owns/controls the Unmanned Aircraft. They are ultimately responsible for the DET and any other information that gets published in the DNS. Registrants use agents known as registrars to manage their interactions with the registry. Registrars typically provide optional additional services such as DNS hosting.</t>
        <t>The registry maintains a database of the registered domain names and their related metadata such as the contact details for domain name holder and the relevant registrar. The registry provides DNS service for the zone apex which contains delegation information for domain names. Registries generally provide services such as WHOIS or RDAP to publish metadata about the registered domain names and their registrants and registrars.</t>
        <t>Registrants have contracts with registrars who in turn have contracts with registries. Payments follow this model too: the registrant buys services from a registrar who pays for services provided by the registry.</t>
        <t>By definition, there can only be one registry for a domain name. Since that registry is a de facto monopoly, the scope of its activities are usually kept to a minimum to reduce the potential for market distortions or anti-competitive practices. A registry can have an arbitrary number of registrars who compete with each other on price, service and customer support.</t>
        <t>While the registrant-registrar-registry model is mature and well understood, it may not be appropriate for DRIP registrations in some circumstances. It could add costs and complexity: developing policies and contracts as outlined above. On the other hand, registries and registrars offer customer service/support and can provide the supporting infrastructure for reliable DNS and WHOIS or RDAP service.</t>
        <t>Another approach could be to handle DRIP registrations in a comparable way to how IP address space gets provisioned. Here, blocks of addresses get delegated to a "trusted" third party, typically an ISP, who then issues IP addresses to its customers. For DRIP, blocks of IP addresses could be delegated from the <tt>3.0.0.1.0.0.2.ip6.arpa</tt> domain to an entity chosen by the appropriate CAA. This third party would be responsible for the corresponding DNS and WHOIS or RDAP infrastructure for these IP address blocks. They would also provision the HHIT records for these IP addresses. In principle a manufacturer or vendor of UAS devices could provide that role.</t>
        <t>Dynamic DRIP registration is another possible solution, for example when the operator of a UAS device registers its corresponding HHIT record and other resources before a flight and deletes them afterwards. This may be feasible in controlled environments with well-behaved actors. However this approach may not scale since each device is likely to need a unique authentication token for updating the IT infrastructure which provisions the DNS.</t>
        <t>Registration policies - pricing, renewals, registrar and registrant agreements, etc. - will need to be developed. These considerations should be determined by the CAA, perhaps in consultation with local stakeholders to assess the cost-benefits of these approaches (and others). All of these are out of scope for this document. The specifics for the UAS RID use case are detailed in the rest of document.</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>The scope of this document is the DNS registration of DETs with the DNS delegation of the reverse domain of IPv6 Prefix, assigned by IANA for DETs <tt>2001:30::/28</tt> and RRsets used to handle DETs.</t>
        <t>Other sectors may adopt this technology. It is recommended that a global Apex (i.e. IPv6 prefix) and international Apex manager be designated for each sector.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <section anchor="required-terminology">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions">
        <name>Additional Definitions</name>
        <t>This document makes use of the terms (PII, USS, etc.) defined in <xref target="RFC9153"/>. Other terms (DIME, Endorsement, etc.) are from <xref target="RFC9434"/>, while others (RAA, HDA, etc.) are from <xref target="RFC9374"/>.</t>
      </section>
    </section>
    <section anchor="det-hierarchy-in-dns">
      <name>DET Hierarchy in DNS</name>
      <t><xref target="RFC9374"/> defines the Hierarchical Host Identity Tag (HHIT) and further specifies an instance of them used for UAS RID called DETs. The HHIT is a 128-bit value that is as an IPv6 address intended primarily as an identifier rather than locator. It's format is in <xref target="hhit-fig"/>, shown here for reference, and further information is in <xref target="RFC9374"/>.</t>
      <figure anchor="hhit-fig">
        <name>DRIP Entity Tag Breakdown</name>
        <artwork align="center"><![CDATA[
+-------------+--------------+---------------+-------------+
| IPv6 Prefix | Hierarchy ID | HHIT Suite ID | ORCHID Hash |
| (28-bits)   | (28-bits)    | (8-bits)      | (64-bits)   |
+-------------+--------------+---------------+-------------+
             /                \
            /                  \
           /                    \-----------------------------\
          /                                                    \
         /                                                      \
        +--------------------------------+-----------------------+
        | Registered Assigning Authority | HHIT Domain Authority |
        | (14-bits)                      | (14-bits)             |
        +--------------------------------+-----------------------+
]]></artwork>
      </figure>
      <t>The IPv6 Prefix, assigned by IANA for DETs is <tt>2001:30::/28</tt>. The corresponding domain (nibble reversed as <tt>3.0.0.1.0.0.2.ip6.arpa</tt>) is owned by the IAB.</t>
      <t>Due to the nature of the hierarchy split and its relationship to nibble reversing of the IPv6 address, the upper level of hierarchy (i.e. RAAs) "borrows" the upper two bits of their respective HDA space for DNS delegation. As such the IPv6 prefix of RAAs are <tt>2001:3x:xxx::/44</tt> and HDAs are <tt>2001:3x:xxxy:yy::/56</tt> with respective nibble reverse domains of <tt>x.x.x.x.3.0.0.1.0.0.2.ip6.arpa</tt> and <tt>y.y.y.x.x.x.x.3.0.0.1.0.0.2.ip6.arpa</tt>.</t>
      <t>A subset of RAAs have preallocations based on the ISO 3166-1 Numeric Nation Code <xref target="ISO3166-1"/>. This is to support the initial use case of DETs in UAS RID on an international level. See <xref target="iana-raa"/> for the RAA allocations.</t>
      <t>The HDA values of 0, 4096, 8192 and 12288 are reserved for operational use of an RAA (a by-product of the above mentioned borrowing of bits), specifically when to register with the Apex and endorse delegations of HDAs in their namespace.</t>
      <t>The administration, management and policy for operation a DIME at any level in the hierarchy (Apex, RAA or HDA), be it external or from a parent level, is out of scope for this document. In some cases, such as the RAAs and HDAs of a nation, these are National Matters which are to be dealt with by those parties accordingly.</t>
    </section>
    <section anchor="dns">
      <name>Public Information Registry</name>
      <t>Per <xref target="RFC9434"/> all information classified, by all parties involved, as public is stored in the DNS, specifically Authoritative Name Servers, to satisfy REG-1 from <xref target="RFC9153"/>.</t>
      <t>Authoritative Name Servers use domain names as handles and data is stored in Resource Records (RR) with associated RRTypes. This document defines two new RRTypes, one for HHIT metadata (HHIT, <xref target="hhit-rr"/>) and another for UAS Broadcast RID information (BRID, <xref target="bcast-rr"/>). The former RRType is particularly important as it contains a URI (as part of the certificate) that point to Private Information resources.</t>
      <t>DETs, being IPv6 addresses, are to be under <tt>ip6.arpa</tt> (nibble reversed per convention) and MUST ultimately resolve, at minimum, to an HHIT RRType. Depending on local circumstances or additional use cases other RRTypes MAY be present. For UAS RID the BRID RRType MUST be present to provide the Broadcast Endorsements defined in <xref target="RFC9575"/>.</t>
      <t>DNSSEC is strongly RECOMMENDED (especially for RAA-level and higher zones). When a DIME decides to use DNSSEC they SHOULD define a framework for cryptographic algorithms and key management <xref target="RFC6841"/>. This may be influenced by frequency of updates, size of the zone, and policies.</t>
      <t>UAS specific information, such as physical characteristics, MAY also be stored in DNS but is out of scope for this document.</t>
      <t>Lookups of the above RRTypes are performed with the standard DNS methodology using the nibble reversed DET as the query name affixed to the <tt>ip6.arpa</tt> domain apex and asking for the specific RRType. The HHIT RRType provides the public key for signature verification and URIs via the certificate. The BRID RRType provides static Broadcast RID information such as the Broadcast Endorsements sent following <xref target="RFC9575"/>.</t>
    </section>
    <section anchor="resource-records">
      <name>Resource Records</name>
      <section anchor="hhit-rr">
        <name>HHIT Resource Record</name>
        <t>The HHIT Resource Record is a metadata record for various bits of HHIT specific information that isn't available in the pre-existing HIP RRType. It does not replace the HIP RRType. The primary advantage of this RRType over the existing RRType is the inclusion a certificate containing an entity's public key signed by the registrar, or other trust anchor, to confirm registration.</t>
        <figure anchor="hhit-wire">
          <name>HHIT Wire Format</name>
          <artwork align="center"><![CDATA[
                     1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
.                                                               .
.                   HHIT Data (CBOR Encoded)                    .
.                                                               .
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The HHIT Data field MUST be encoded in CBOR bytes. The CDDL of the HHIT Data is provided in <xref target="hhit-wire-cddl"/>.</t>
        <section anchor="hhit-rr-text">
          <name>Text Representation</name>
          <t>The HHIT Data is represented in base64 and may be divided into any number of white-space-separated substrings, down to single base64 digits, which are concatenated to obtain the full object. These substrings can span lines using the standard parenthesis. Note that the HHIT Data portion has internal subfields, but these do not appear in the master file representation only a single logical base64 string will appear.</t>
          <section anchor="hhit-rr-presentation">
            <name>Presentation Representation</name>
            <t>The HHIT Data portion MAY, for display purposes only, be represented using the Extended Diagnostic Notation as defined in Appendix G of <xref target="RFC8610"/>.</t>
          </section>
        </section>
        <section anchor="hhit-rr-fields">
          <name>Field Descriptions</name>
          <figure anchor="hhit-wire-cddl">
            <name>HHIT Wire Format CDDL</name>
            <artwork><![CDATA[
hhit-rr = [
    type: uint .size(2) , 
    abbreviation: tstr .size(15), 
    registration-cert: bstr
]
]]></artwork>
          </figure>
          <dl>
            <dt>HHIT Entity Type:</dt>
            <dd>
              <t>This field is a number with values defined in <xref target="iana-hhit-type"/>. It is envisioned that there may be many types of HHITs in use. In some cases it may be helpful to understand the HHITs role in the ecosystem like described in <xref target="drip-dki"/>. This field provides such context. This field MAY provide a signal of additional information and/or different handling of the data beyond what is defined in this document.</t>
            </dd>
            <dt>HID Abbreviation:</dt>
            <dd>
              <t>This field is a string meant to provide an abbreviation to the HID structure for display devices. The specific contents of this field are not defined here.</t>
            </dd>
            <dt>Canonical Registration Certificate:</dt>
            <dd>
              <t>This field is reserved for any certificate to endorse registration that contains the DET. It MUST be encoded as X.509 DER. This certificate MAY be self-signed when the entity is acting as a root of trust (i.e. an apex). Such self-signed behavior is defined by policy, such as in <xref target="drip-dki"/>, and is out of scope for this document.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="bcast-rr">
        <name>UAS Broadcast RID Resource Record</name>
        <t>The UAS Broadcast RID Resource Record type (BRID) is a format to hold public information typically sent of the UAS Broadcast RID that is static. It can act as a data source if information is not received over Broadcast RID or for cross validation. The primary function for DRIP is the inclusion of one or more Broadcast Endorsements as defined in <xref target="RFC9575"/> in the <tt>auth</tt> field. These Endorsements are generated by the registrar upon successful registration and broadcast by the entity.</t>
        <figure anchor="bcast-wire">
          <name>BRID Wire Format</name>
          <artwork align="center"><![CDATA[
                     1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
.                                                               .
.                   BRID Data (CBOR Encoded)                    .
.                                                               .
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The BRID Data field MUST be encoded in CBOR bytes. The CDDL of the BRID Data is provided in <xref target="bcast-wire-cddl"/>.</t>
        <section anchor="bcast-rr-text">
          <name>Text Representation</name>
          <t>The BRID Data is represented in base64 and may be divided into any number of white-space-separated substrings, down to single base64 digits, which are concatenated to obtain the full object. These substrings can span lines using the standard parenthesis. Note that the BRID Data portion has internal subfields, but these do not appear in the master file representation only a single logical base64 string will appear.</t>
          <section anchor="bcast-rr-presentation">
            <name>Presentation Representation</name>
            <t>The BRID Data portion MAY, for display purposes only, be represented using the Extended Diagnostic Notation as defined in Appendix G of <xref target="RFC8610"/>. All byte strings longer than a length of 20 SHOULD be displayed as base64 when possible.</t>
          </section>
        </section>
        <section anchor="bcast-rr-fields">
          <name>Field Descriptions</name>
          <figure anchor="bcast-wire-cddl">
            <name>BRID Wire Format CDDL</name>
            <artwork><![CDATA[
bcast-rr = {
    uas_type: nibble-field,
    uas_ids: [+ uas-id-grp],
    ? auth: [+ auth-grp],
    ? self-grp,
    ? op_type: 0..3,
    ? area-grp,
    ? classification-grp,
    ? operator-grp
}
uas-id-grp = (
    id_type: &uas-id-types, 
    uas_id: bstr .size(20)
)
uas-id-types = (none: 0, serial: 1, caa_id: 2, utm_id: 3, session_id: 4)
auth-grp = (
    a_type: nibble-field,
    a_data: bstr .size(1..362)
)
area-grp = (
    area_count: 1..255,
    area_radius: float,
    area_floor: float,
    area_ceiling: float
)
classification-grp = (
    ua_class: 0..8,
    eu_class: nibble-field,
    eu_category: nibble-field
)
self-grp = (
    desc_type: nibble-field,
    description: tstr .size(23)
)
operator-grp = (
    operator_id_type: nibble-field,
    operator_id: bstr .size(20)
)
nibble-field = 0..15
]]></artwork>
          </figure>
          <t>The field names and their general typing are borrowed from the ASTM <xref target="F3411"/> data dictionary. See that document for additional information on fields semantics and units.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="drip-prefix-delegation">
        <name>DRIP Prefix Delegation</name>
        <t>This document requests that the IANA delegate the <tt>3.0.0.1.0.0.2.ip6.arpa</tt> domain. IANA will be responsible for processing requests under the guidance of the Designated Expert.</t>
      </section>
      <section anchor="iana-drip-registry">
        <name>IANA DRIP Registry</name>
        <section anchor="iana-raa">
          <name>DRIP RAA Allocations</name>
          <t>This document requests a new registry for RAA Allocations under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref> to be managed by IANA.</t>
          <dl>
            <dt>RAA Allocations:</dt>
            <dd>
              <t>a 14-bit value used to represent RAAs. Future additions to this registry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126"/>). The following values/ranges are defined:</t>
            </dd>
          </dl>
          <table>
            <thead>
              <tr>
                <th align="left">RAA Value(s)</th>
                <th align="left">Status</th>
                <th align="left">Allocation</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0 - 3</td>
                <td align="left">Reserved</td>
                <td align="left">N/A</td>
                <td align="left">N/A</td>
              </tr>
              <tr>
                <td align="left">4 - 3999</td>
                <td align="left">Allocated</td>
                <td align="left">ISO 3166-1 Countries</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">4000 - 16375</td>
                <td align="left">Reserved</td>
                <td align="left">N/A</td>
                <td align="left">N/A</td>
              </tr>
              <tr>
                <td align="left">16376 - 16383</td>
                <td align="left">Allocated</td>
                <td align="left">DRIP WG (Experimental Use)</td>
                <td align="left">This RFC</td>
              </tr>
            </tbody>
          </table>
          <t>To support DNS delegation in <tt>ip6.arpa</tt> a single RAA is given 4 delegations by borrowing the upper two bits of HDA space. This enables a clean nibble boundary in DNS to delegate from (i.e. the prefix <tt>2001:3x:xxx0::/44</tt>). These HDAs (0, 4096, 8192 and 12288) are reserved for the RAA.</t>
          <t>The mapping between ISO 3166-1 Numeric Numbers and RAAs can be found as a CSV file on <eref target="https://github.com/ietf-wg-drip/draft-ietf-drip-registries/blob/main/iso3166-raa.csv">GitHub</eref>. Each Nation is assigned four RAAs that are left to the national authority for their purpose. For RAAs under this range, a shorter prefix of <tt>2001:3x:xx00::/40</tt> MAY be delegated to each CAA, which covers all 4 RAAs (and reserved HDAs) assigned to them.</t>
          <t>Requests in the DRIP WG allocation block MUST be forwarded to the contact point in the DRIP WG to evaluate the request and MUST contain a desired/proposed length of time for the allocation. Allocations in the block are not permanent and have a limited time the delegation is to be supported. The length of the time proposed is evaluated on a case-by-case basis by the DRIP WG.</t>
        </section>
        <section anchor="iana-hhit-type">
          <name>HHIT Entity Type</name>
          <t>This document requests a new registry for HHIT Entity Type under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl>
            <dt>HHIT Entity Type:</dt>
            <dd>
              <t>numeric, field of the HHIT RRType to encode the HHIT Entity Type. Future additions to this registry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126"/>). The following values are defined:</t>
            </dd>
          </dl>
          <table>
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">Type</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Not Defined</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">DRIP Identity Management Entity (DIME)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">2 - 4</td>
                <td align="left">Reserved</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">5</td>
                <td align="left">Apex</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">6 - 8</td>
                <td align="left">Reserved</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">9</td>
                <td align="left">Registered Assigning Authority (RAA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">10 - 12</td>
                <td align="left">Reserved</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">13</td>
                <td align="left">HHIT Domain Authority (HDA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">14 - 15</td>
                <td align="left">Reserved</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">16</td>
                <td align="left">Uncrewed Aircraft (UA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">17</td>
                <td align="left">Ground Control Station (GCS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">18</td>
                <td align="left">Uncrewed Aircraft System (UAS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">19</td>
                <td align="left">Remote Identification (RID) Module</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">20</td>
                <td align="left">Pilot</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">21</td>
                <td align="left">Operator</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">22</td>
                <td align="left">Discovery &amp; Synchronization Service (DSS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">23</td>
                <td align="left">UAS Service Supplier (USS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">24</td>
                <td align="left">Network RID Service Provider (SP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">25</td>
                <td align="left">Network RID Display Provider (DP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">26</td>
                <td align="left">Supplemental Data Service Provider (SDSP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">27 - 65535</td>
                <td align="left">Reserved</td>
                <td align="left">N/A</td>
              </tr>
            </tbody>
          </table>
          <t>Future additions to this registry MUST NOT be allowed if they can be covered under an existing registration.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="dns-operational-considerations">
        <name>DNS Operational Considerations</name>
        <t>The Registrar and Registry are commonly used concepts in the DNS. These components interface the DIME into the DNS hierarchy and thus operation SHOULD follow best common practices, specifically in security (such as running DNSSEC) as appropriate. The following RFC provide suitable guidance: <xref target="RFC7720"/>, <xref target="RFC4033"/>, <xref target="RFC4034"/>, <xref target="RFC4035"/>, <xref target="RFC5155"/>, <xref target="RFC8945"/>, <xref target="RFC2182"/>, <xref target="RFC4786"/>, <xref target="RFC3007"/>.</t>
        <t>If DNSSEC is used, a DNSSEC Practice Statement (DPS) SHOULD be developed and published. It SHOULD explain how DNSSEC has been deployed and what security measures are in place. <xref target="RFC6841"/> documents a Framework for DNSSEC Policies and DNSSEC Practice Statements.</t>
        <t>The interfaces and protocol specifications for registry-registrar interactions are intentionally not specified in this document. These will depend on nationally defined policy and prevailing local circumstances. It is expected registry-registrar activity will use the Extensible Provisioning Protocol (EPP) <xref target="RFC5730"/>. The registry SHOULD provide a lookup service such as WHOIS <xref target="RFC3912"/> or RDAP <xref target="RFC9082"/> to provide public information about registered domain names.</t>
        <t>Decisions about DNS or registry best practices and other operational matters SHOULD be made by the CAA, ideally in consultation with local stakeholders. This document RECOMMENDS that DNSSEC SHOULD be used by both Apex (to control RAA levels) and RAA (to control HDA level) zones.</t>
      </section>
      <section anchor="public-key-exposure">
        <name>Public Key Exposure</name>
        <t>DETs are built upon asymmetric keys. As such the public key must be revealed to enable clients to perform signature verifications. <xref target="RFC9374"/> security considerations cover various attacks on such keys.</t>
        <t>While unlikely the forging of a corresponding private key is possible if given enough time (and computational power). As such it is RECOMMENDED that the public key for any DET not be exposed in DNS (under any RRType) until it is required.</t>
        <t>Optimally this requires the UAS somehow signal the DIME that a flight using a Specific Session ID will soon be underway or complete. It may also be facilitated under UTM if the USS (which may or may not be a DIME) signals when a given operation using a Session ID goes active.</t>
      </section>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT Consulting, LLC) for their early work on the DRIP registries concept. Their early contributions laid the foundations for the content and processes of this architecture and document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="drip-dki">
          <front>
            <title>The DRIP DET public Key Infrastructure</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   The DRIP Entity Tag (DET) public Key Infrastructure (DKI) is a
   specific variant of classic Public Key Infrastructures (PKI) where
   the organization is around the DET, in place of X.520 Distinguished
   Names.  Further, the DKI uses DRIP Endorsements in place of X.509
   certificates for establishing trust within the DKI.

   There are two X.509 profiles for shadow PKI behind the DKI, with many
   of their X.509 fields mirroring content in the DRIP Endorsements.
   This PKI can at times be used where X.509 is expected and non-
   constrained communication links are available that can handle their
   larger size.

   C509 (CBOR) encoding of all X.509 certificates are also provided as
   an alternative for where there are gains in reduced object size.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-dki-09"/>
        </reference>
        <reference anchor="RFC5730">
          <front>
            <title>Extensible Provisioning Protocol (EPP)</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="69"/>
          <seriesInfo name="RFC" value="5730"/>
          <seriesInfo name="DOI" value="10.17487/RFC5730"/>
        </reference>
        <reference anchor="RFC6841">
          <front>
            <title>A Framework for DNSSEC Policies and DNSSEC Practice Statements</title>
            <author fullname="F. Ljunggren" initials="F." surname="Ljunggren"/>
            <author fullname="AM. Eklund Lowinder" initials="AM." surname="Eklund Lowinder"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document presents a framework to assist writers of DNS Security Extensions (DNSSEC) Policies and DNSSEC Practice Statements, such as domain managers and zone operators on both the top level and secondary level, who are managing and operating a DNS zone with Security Extensions implemented.</t>
              <t>In particular, the framework provides a comprehensive list of topics that should be considered for inclusion into a DNSSEC Policy definition and Practice Statement. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6841"/>
          <seriesInfo name="DOI" value="10.17487/RFC6841"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9082">
          <front>
            <title>Registration Data Access Protocol (RDAP) Query Format</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
            <author fullname="A. Newton" initials="A." surname="Newton"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="95"/>
          <seriesInfo name="RFC" value="9082"/>
          <seriesInfo name="DOI" value="10.17487/RFC9082"/>
        </reference>
        <reference anchor="RFC9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC9575">
          <front>
            <title>DRIP Entity Tag (DET) Authentication Formats and Protocols for Broadcast Remote Identification (RID)</title>
            <author fullname="A. Wiethuechter" initials="A." role="editor" surname="Wiethuechter"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>The Drone Remote Identification Protocol (DRIP), plus trust policies and periodic access to registries, augments Unmanned Aircraft System (UAS) Remote Identification (RID), enabling local real-time assessment of trustworthiness of received RID messages and observed UAS, even by Observers lacking Internet access. This document defines DRIP message types and formats to be sent in Broadcast RID Authentication Messages to verify that attached and recently detached messages were signed by the registered owner of the DRIP Entity Tag (DET) claimed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9575"/>
          <seriesInfo name="DOI" value="10.17487/RFC9575"/>
        </reference>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC5155">
          <front>
            <title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="G. Sisson" initials="G." surname="Sisson"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="D. Blacka" initials="D." surname="Blacka"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence. However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5155"/>
          <seriesInfo name="DOI" value="10.17487/RFC5155"/>
        </reference>
        <reference anchor="RFC8945">
          <front>
            <title>Secret Key Transaction Authentication for DNS (TSIG)</title>
            <author fullname="F. Dupont" initials="F." surname="Dupont"/>
            <author fullname="S. Morris" initials="S." surname="Morris"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="B. Wellington" initials="B." surname="Wellington"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a protocol for transaction-level authentication using shared secrets and one-way hashing. It can be used to authenticate dynamic updates to a DNS zone as coming from an approved client or to authenticate responses as coming from an approved name server.</t>
              <t>No recommendation is made here for distributing the shared secrets; it is expected that a network administrator will statically configure name servers and clients using some out-of-band mechanism.</t>
              <t>This document obsoletes RFCs 2845 and 4635.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="93"/>
          <seriesInfo name="RFC" value="8945"/>
          <seriesInfo name="DOI" value="10.17487/RFC8945"/>
        </reference>
        <reference anchor="RFC4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC4035">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
        <reference anchor="RFC3007">
          <front>
            <title>Secure Domain Name System (DNS) Dynamic Update</title>
            <author fullname="B. Wellington" initials="B." surname="Wellington"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This document proposes a method for performing secure Domain Name System (DNS) dynamic updates. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3007"/>
          <seriesInfo name="DOI" value="10.17487/RFC3007"/>
        </reference>
        <reference anchor="RFC2182">
          <front>
            <title>Selection and Operation of Secondary DNS Servers</title>
            <author fullname="R. Elz" initials="R." surname="Elz"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <author fullname="M. Patton" initials="M." surname="Patton"/>
            <date month="July" year="1997"/>
            <abstract>
              <t>This document discusses the selection of secondary servers for DNS zones.The number of servers appropriate for a zone is also discussed, and some general secondary server maintenance issues considered. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="16"/>
          <seriesInfo name="RFC" value="2182"/>
          <seriesInfo name="DOI" value="10.17487/RFC2182"/>
        </reference>
        <reference anchor="RFC7720">
          <front>
            <title>DNS Root Name Service Protocol and Deployment Requirements</title>
            <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
            <author fullname="L-J. Liman" surname="L-J. Liman"/>
            <date month="December" year="2015"/>
            <abstract>
              <t>The DNS root name service is a critical part of the Internet architecture. The protocol and deployment requirements for the DNS root name service are defined in this document. Operational requirements are out of scope.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="40"/>
          <seriesInfo name="RFC" value="7720"/>
          <seriesInfo name="DOI" value="10.17487/RFC7720"/>
        </reference>
        <reference anchor="RFC3912">
          <front>
            <title>WHOIS Protocol Specification</title>
            <author fullname="L. Daigle" initials="L." surname="Daigle"/>
            <date month="September" year="2004"/>
            <abstract>
              <t>This document updates the specification of the WHOIS protocol, thereby obsoleting RFC 954. The update is intended to remove the material from RFC 954 that does not have to do with the on-the-wire protocol, and is no longer applicable in today's Internet. This document does not attempt to change or update the protocol per se, or document other uses of the protocol that have come into existence since the publication of RFC 954. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3912"/>
          <seriesInfo name="DOI" value="10.17487/RFC3912"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="F3411" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3411-22A"/>
          <seriesInfo name="DOI" value="10.1520/F3411-22A"/>
        </reference>
        <reference anchor="ISO3166-1" target="https://www.iso.org/iso-3166-country-codes.html">
          <front>
            <title>Codes for the representation of names of countries and their subdivisions</title>
            <author>
              <organization>International Standards Organization (ISO)</organization>
            </author>
            <date year="2020" month="August"/>
          </front>
          <seriesInfo name="ISO" value="3166-1:2020"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
