<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-24" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="DET in DNS">DRIP Entity Tags (DET) in the Domain Name System (DNS)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-24"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter" role="editor">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 88?>

<t>This document describes the discovery and management of DRIP Entity Tags (DETs) in DNS. Authoritative Name Servers, with DRIP specific DNS structures and standard DNS methods, are the Public Information Registries for DETs and their related metadata.</t>
    </abstract>
  </front>
  <middle>
    <?line 92?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Registries are fundamental to Unmanned Aircraft System (UAS) Remote Identification (RID). Only very limited operational information can be sent via Broadcast RID, but extended information is sometimes needed. The most essential element of information from RID is the UAS ID, the unique key for lookup of extended information in relevant registries (see <xref target="rfc9434-fig4"/>; Figure 4 of <xref target="RFC9434"/>).</t>
      <figure anchor="rfc9434-fig4">
        <name>Global UAS RID Usage Scenario (Figure 4 of RFC9434)</name>
        <artwork align="center"><![CDATA[
***************                                        ***************
*    UAS1     *                                        *     UAS2    *
*             *                                        *             *
* +--------+  *                 DAA/V2V                *  +--------+ *
* |   UA   o--*----------------------------------------*--o   UA   | *
* +--o--o--+  *                                        *  +--o--o--+ *
*    |  |     *   +------+      Lookups     +------+   *     |  |    *
*    |  |     *   | GPOD o------.    .------o PSOD |   *     |  |    *
*    |  |     *   +------+      |    |      +------+   *     |  |    *
*    |  |     *                 |    |                 *     |  |    *
* C2 |  |     *     V2I      ************     V2I      *     |  | C2 *
*    |  '-----*--------------*          *--------------*-----'  |    *
*    |        *              *          *              *        |    *
*    |        o====Net-RID===*          *====Net-RID===o        |    *
* +--o--+     *              * Internet *              *     +--o--+ *
* | GCS o-----*--------------*          *--------------*-----o GCS | *
* +-----+     * Registration *          * Registration *     +-----+ *
*             * (and UTM)    *          * (and UTM)    *             *
***************              ************              ***************
                               |  |  |
                +----------+   |  |  |   +----------+
                | Public   o---'  |  '---o Private  |
                | Registry |      |      | Registry |
                +----------+      |      +----------+
                               +--o--+
                               | DNS |
                               +-----+

DAA:  Detect And Avoid
GPOD: General Public Observer Device
PSOD: Public Safety Observer Device
V2I:  Vehicle-to-Infrastructure
V2V:  Vehicle-to-Vehicle
]]></artwork>
      </figure>
      <t>When a DRIP Entity Tag (DET) <xref target="RFC9374"/> is used as the UAS ID in RID, extended information can be retrieved from a DRIP Identity Management Entity (DIME), which manages registration of and associated lookups from DETs. In this document it is assumed the DIME is a function of UAS Service Suppliers (USS) (Appendix A.2 of <xref target="RFC9434"/>) but a DIME can be independent or handled by another entity as well.</t>
      <section anchor="general-concept">
        <name>General Concept</name>
        <t>DRIP Entity Tags (DETs) embedded a hierarchy scheme which is mapped onto the Domain Name System (DNS) <xref target="STD13"/>. DIMEs enforce registration and information access of data associated with a DET while also providing the trust inherited from being a member of the hierarchy. Other identifiers and their methods are out of scope for this document.</t>
        <t>Authoritative Name Servers of the DNS provide the public information such as the cryptographic keys, endorsements and certificates of DETs and pointers to private information resources. Cryptographic (public) keys are used to authenticate anything signed by a DET, such as in the Authentication defined in <xref target="RFC9575"/> for Broadcast RID. Endorsements and certificates are used to endorse the claim of being part of the hierarchy.</t>
        <t>This document does not specify AAA mechanisms used by Private Information Registries to store and protect Personally Identifiable Information (PII).</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>The scope of this document is the DNS registration of DETs with the DNS delegation of the reverse domain of IPv6 Prefix, assigned by IANA for DETs <tt>2001:30::/28</tt> and RRsets used to handle DETs.</t>
        <t>Other sectors may adopt this technology. It is recommended that a global apex (i.e., IPv6 prefix) and international apex manager be designated for each sector.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <section anchor="required-terminology">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions">
        <name>Additional Definitions</name>
        <t>This document makes use of the terms (USS, etc.) defined in <xref target="RFC9153"/>. Other terms (DIME, Endorsement, etc.) are from <xref target="RFC9434"/>, while others (RAA, HDA, etc.) are from <xref target="RFC9374"/>.</t>
      </section>
    </section>
    <section anchor="det-hierarchy-in-dns">
      <name>DET Hierarchy in DNS</name>
      <t><xref target="RFC9374"/> defines the HHIT and further specifies an instance of them used for UAS RID called DETs. The HHIT is a 128-bit value that is as an IPv6 address intended primarily as an identifier rather than locator. Its format is in <xref target="hhit-fig"/>, shown here for reference, and further information is in <xref target="RFC9374"/>.</t>
      <figure anchor="hhit-fig">
        <name>DRIP Entity Tag Breakdown</name>
        <artwork align="center"><![CDATA[
+-------------+--------------+---------------+-------------+
| IPv6 Prefix | Hierarchy ID | HHIT Suite ID | ORCHID Hash |
| (28 bits)   | (28 bits)    | (8 bits)      | (64 bits)   |
+-------------+--------------+---------------+-------------+
             /                \
            /                  \
           /                    \-----------------------------\
          /                                                    \
         /                                                      \
        +--------------------------------+-----------------------+
        | Registered Assigning Authority | HHIT Domain Authority |
        | (14 bits)                      | (14 bits)             |
        +--------------------------------+-----------------------+
]]></artwork>
      </figure>
      <t>The IPv6 Prefix, assigned by IANA for DETs is <tt>2001:30::/28</tt>. The corresponding domain (nibble reversed as <tt>3.0.0.1.0.0.2.ip6.arpa</tt>) is owned by the IAB.</t>
      <t>Due to the nature of the hierarchy split and its relationship to nibble reversing of the IPv6 address, the upper level of hierarchy (i.e., Registered Assigning Authority (RAA)) "borrows" the upper two bits of their respective HHIT Domain Authority (HDA) space for DNS delegation. As such the IPv6 prefix of RAAs are <tt>2001:3x:xxx::/44</tt> and HDAs are <tt>2001:3x:xxxy:yy::/56</tt> with respective nibble reverse domains of <tt>x.x.x.x.3.0.0.1.0.0.2.ip6.arpa</tt> and <tt>y.y.y.x.x.x.x.3.0.0.1.0.0.2.ip6.arpa</tt>.</t>
      <t>This document preallocates a subset of RAAs based on the ISO 3166-1 Numeric Nation Code <xref target="ISO3166-1"/>. This is to support the initial use case of DETs in UAS RID on an international level. See <xref target="iana-raa"/> for the RAA allocations.</t>
      <t>The HDA values of 0, 4096, 8192 and 12288 are reserved for operational use of an RAA (a by-product of the above mentioned borrowing of bits), specifically when to register with the apex and endorse delegations of HDAs in their namespace.</t>
      <t>The administration, management and policy for operation a DIME at any level in the hierarchy (Apex, RAA or HDA), be it external or from a parent level, is out of scope for this document. In some cases, such as the RAAs and HDAs of a nation, these are national matters which are to be dealt with by those parties accordingly.</t>
      <section anchor="use-of-existing-dns-models">
        <name>Use of Existing DNS Models</name>
        <t>DRIP relies on the DNS and as such roughly follows the registrant-registrar-registry model. In the UAS ecosystem, the registrant would be the end user who owns/controls the Unmanned Aircraft. They are ultimately responsible for the DET and any other information that gets published in the DNS. Registrants use agents known as registrars to manage their interactions with the registry. Registrars typically provide optional additional services such as DNS hosting.</t>
        <t>The registry maintains a database of the registered domain names and their related metadata such as the contact details for domain name holder and the relevant registrar. The registry provides DNS service for the zone apex which contains delegation information for domain names. Registries generally provide services such as WHOIS <xref target="RFC3912"/> or RDAP <xref target="STD95"/> to publish metadata about the registered domain names and their registrants and registrars.</t>
        <t>Registrants have contracts with registrars who in turn have contracts with registries. Payments follow this model too: the registrant buys services from a registrar who pays for services provided by the registry.</t>
        <t>By definition, there can only be one registry for a domain name. Since that registry is a de facto monopoly, the scope of its activities is usually kept to a minimum to reduce the potential for market distortions or anti-competitive practices. A registry can have an arbitrary number of registrars who compete with each other on price, service and customer support.</t>
        <section anchor="dns-model-considerations-for-dimes">
          <name>DNS Model Considerations for DIMEs</name>
          <figure anchor="dns-model-fig">
            <name>Example DRIP DNS Model</name>
            <artwork align="center"><![CDATA[
Apex
Registry/Registrar
(IANA)
                         +=========================+
                         | 3.0.0.1.0.0.2.ip6.arpa. |
                         +============o============+
                                      |
--------------------------------------|-------------------------
National                              |
Registries/Registrars                 |
(RAA)                                 |
                                      |
        +--------------+--------------o-+---------------+
        |              |                |               |
  +=====o====+    +====o=====+    +=====o====+    +=====o====+
  | 0.0.0.0. |    | 1.0.0.0. |    | 2.0.0.0. |    | 3.0.0.0. |
  +====o=====+    +====o=====+    +====o=====+    +====o=====+
                                       |
---------------------------------------|------------------------
Local                                  |
Registries/Registrars                  |
(HDA)                                  |
                                       |
        +--------------+---------------o--------...-----+
        |              |               |                |
  +=====o====+    +====o=====+    +====o=====+    +=====o====+
  |  1.0.0.  |    |  2.0.0.  |    |  3.0.0.  |    |  f.f.f.  |
  +====o=====+    +=====o====+    +====o=====+    +====o=====+
                                       |
---------------------------------------|------------------------
Local                                  |
Registrants                            |
                 +=====================o================+
                 | x.x.x.x.x.x.x.x.x.x.x.x.x.x.x.x.5.0. |
                 +======================================+
]]></artwork>
          </figure>
          <t>While the registrant-registrar-registry model is mature and well understood, it may not be appropriate for DRIP registrations in some circumstances. It could add costs and complexity: developing policies and contracts as outlined above. On the other hand, registries and registrars offer customer service/support and can provide the supporting infrastructure for reliable DNS and WHOIS or RDAP service.</t>
          <t>Another approach could be to handle DRIP registrations in a comparable way to how IP address space gets provisioned. Here, blocks of addresses get delegated to a "trusted" third party, typically an ISP, who then issues IP addresses to its customers. For DRIP, blocks of IP addresses could be delegated from the <tt>3.0.0.1.0.0.2.ip6.arpa</tt> domain (reverse domain of prefix allocated by <xref target="RFC9374"/>) to an entity chosen by the appropriate Civil Aviation Authority (CAA). This third party would be responsible for the corresponding DNS and WHOIS or RDAP infrastructure for these IP address blocks. They would also provision the Hierarchial Host Identity Tag (HHIT, <xref target="RFC9374"/>) records for these IP addresses. In principle a manufacturer or vendor of UAS devices could provide that role. This is shown as an example in <xref target="dns-model-fig"/>.</t>
          <t>Dynamic DRIP registration is another possible solution, for example when the operator of a UAS device registers its corresponding HHIT record and other resources before a flight and deletes them afterwards. This may be feasible in controlled environments with well-behaved actors. However, this approach may not scale since each device is likely to need credentials for updating the IT infrastructure which provisions the DNS.</t>
          <t>Registration policies - pricing, renewals, registrar and registrant agreements, etc. - will need to be developed. These considerations should be determined by the CAA, perhaps in consultation with local stakeholders to assess the cost-benefits of these approaches (and others). All of these are out of scope for this document. The specifics for the UAS RID use case are detailed in the rest of document.</t>
        </section>
      </section>
    </section>
    <section anchor="dns">
      <name>Public Information Registry</name>
      <t>Per <xref target="RFC9434"/> all information classified, by all parties involved, as public is stored in the DNS, specifically Authoritative Name Servers, to satisfy REG-1 from <xref target="RFC9153"/>.</t>
      <t>Authoritative Name Servers use domain names as handles and data is stored in Resource Records (RR) with associated RRTypes. This document defines two new RRTypes, one for HHIT metadata (HHIT, <xref target="hhit-rr"/>) and another for UAS Broadcast RID information (BRID, <xref target="bcast-rr"/>). The former RRType is particularly important as it contains a URI (as part of the certificate) that point to Private Information resources.</t>
      <t>DETs, being IPv6 addresses, are to be under <tt>ip6.arpa</tt> (nibble reversed per convention) and MUST ultimately resolve, at minimum, to an HHIT RRType. Depending on local circumstances or additional use cases other RRTypes MAY be present. For UAS RID the BRID RRType MUST be present to provide the Broadcast Endorsements defined in <xref target="RFC9575"/>.</t>
      <t>DNSSEC is strongly RECOMMENDED (especially for RAA-level and higher zones). When a DIME decides to use DNSSEC they SHOULD define a framework for cryptographic algorithms and key management <xref target="RFC6841"/>. This may be influenced by frequency of updates, size of the zone, and policies.</t>
      <t>UAS specific information, such as physical characteristics, MAY also be stored in DNS but is out of scope for this document.</t>
      <t>Lookups of the above RRTypes are performed with the standard DNS methodology using the nibble reversed DET as the query name affixed to the <tt>ip6.arpa</tt> domain apex and asking for the specific RRType. The HHIT RRType provides the public key for signature verification and URIs via the certificate. The BRID RRType provides static Broadcast RID information such as the Broadcast Endorsements sent following <xref target="RFC9575"/>.</t>
    </section>
    <section anchor="resource-records">
      <name>Resource Records</name>
      <section anchor="hhit-rr">
        <name>HHIT Resource Record</name>
        <t>The HHIT Resource Record is a metadata record for various bits of HHIT specific information that isn't available in the pre-existing HIP RRType. It does not replace the HIP RRType. The primary advantage of this RRType over the existing RRType is the inclusion a certificate containing an entity's public key signed by the registrar, or other trust anchor, to confirm registration.</t>
        <t>The data MUST be encoded in CBOR <xref target="RFC8949"/> bytes. The CDDL <xref target="RFC8610"/> of the data is provided in <xref target="hhit-wire-cddl"/>.</t>
        <section anchor="hhit-rr-text">
          <name>Text Representation</name>
          <t>The data is represented in base64 <xref target="RFC4648"/> and may be divided into any number of white-space-separated substrings, down to single base64 digits, which are concatenated to obtain the full object. These substrings can span lines using the standard parenthesis. Note that the data has internal subfields, but these do not appear in the master file representation only a single logical base64 string will appear.</t>
          <section anchor="hhit-rr-presentation">
            <name>Presentation Representation</name>
            <t>The data MAY, for display purposes only, be represented using the Extended Diagnostic Notation as defined in Appendix G of <xref target="RFC8610"/>.</t>
          </section>
        </section>
        <section anchor="hhit-rr-fields">
          <name>Field Descriptions</name>
          <figure anchor="hhit-wire-cddl">
            <name>HHIT Wire Format CDDL</name>
            <artwork><![CDATA[
hhit-rr = [
    hhit-entity-type: uint,
    abbreviation: tstr .size(15), 
    registration-cert: bstr
]
]]></artwork>
          </figure>
          <dl>
            <dt>HHIT Entity Type:</dt>
            <dd>
              <t>This field is a number with values defined in <xref target="iana-hhit-type"/>. It is envisioned that there may be many types of HHITs in use. In some cases, it may be helpful to understand the HHITs role in the ecosystem like described in <xref target="drip-dki"/>. This field provides such context. This field MAY provide a signal of additional information and/or different handling of the data beyond what is defined in this document.</t>
            </dd>
            <dt>HID Abbreviation:</dt>
            <dd>
              <t>This field is a string meant to provide an abbreviation to the HID structure for display devices. The convention for such abbreviations is a matter of local policy. Absent of such a policy, this field MUST be filled with the four chracter hexadecimal representations of the RAA and HDA (in that order) with a seperator character such as a space. For example a DET with an RAA value of 10 and HDA value of 20 would be abbreviated as: <tt>000A 0014</tt>.</t>
            </dd>
            <dt>Canonical Registration Certificate:</dt>
            <dd>
              <t>This field is reserved for any certificate to endorse registration that contains the DET. It MUST be encoded as X.509 DER. This certificate MAY be self-signed when the entity is acting as a root of trust (i.e., an apex). Such self-signed behavior is defined by policy, such as in <xref target="drip-dki"/>, and is out of scope for this document.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="bcast-rr">
        <name>UAS Broadcast RID Resource Record</name>
        <t>The UAS Broadcast RID Resource Record type (BRID) is a format to hold public information typically sent of the UAS Broadcast RID that is static. It can act as a data source if information is not received over Broadcast RID or for cross validation. The primary function for DRIP is the inclusion of one or more Broadcast Endorsements as defined in <xref target="RFC9575"/> in the <tt>auth</tt> field. These Endorsements are generated by the registrar upon successful registration and broadcast by the entity.</t>
        <t>The data MUST be encoded in CBOR <xref target="RFC8949"/> bytes. The CDDL <xref target="RFC8610"/> of the data is provided in <xref target="bcast-wire-cddl"/>.</t>
        <section anchor="bcast-rr-text">
          <name>Text Representation</name>
          <t>The data is represented in base64 <xref target="RFC4648"/> and may be divided into any number of white-space-separated substrings, down to single base64 digits, which are concatenated to obtain the full object. These substrings can span lines using the standard parenthesis. Note that the data has internal subfields, but these do not appear in the master file representation only a single logical base64 string will appear.</t>
          <section anchor="bcast-rr-presentation">
            <name>Presentation Representation</name>
            <t>The data MAY, for display purposes only, be represented using the Extended Diagnostic Notation as defined in Appendix G of <xref target="RFC8610"/>. All byte strings longer than a length of 20 SHOULD be displayed as base64 when possible.</t>
          </section>
        </section>
        <section anchor="bcast-rr-fields">
          <name>Field Descriptions</name>
          <figure anchor="bcast-wire-cddl">
            <name>BRID Wire Format CDDL</name>
            <artwork><![CDATA[
bcast-rr = {
    uas_type => nibble-field,
    uas_ids => [+ uas-id-grp],
    ? auth => [+ auth-grp],
    ? self_id => self-grp,
    ? area => area-grp,
    ? classification => classification-grp,
    ? operator_id => operator-grp
}
uas-id-grp = (
    id_type: &uas-id-types, 
    uas_id: bstr .size(20)
)
auth-grp = (
    a_type: &auth-types,
    a_data: bstr .size(1..362)
)
area-grp = [
    area_count: 1..255,
    area_radius: float,  # in decameters
    area_floor: float,   # wgs84-hae in meters
    area_ceiling: float  # wgs84-hae in meters
]
classification-grp = [
    class_type: 0..8,
    class: nibble-field,
    category: nibble-field
]
self-grp = [
    desc_type: 0..255,
    description: tstr .size(23)
]
operator-grp = [
    operator_id_type: 0..255,
    operator_id: bstr .size(20)
]
uas-id-types = (none: 0, serial: 1, session_id: 4)
auth-types = (none: 0, specific_method: 5)
nibble-field = 0..15
uas_type = 0
uas_ids = 1
auth = 2
self_id = 3
area = 4
classification = 5
operator_id = 6
]]></artwork>
          </figure>
          <t>The field names and their general typing are borrowed from the ASTM <xref target="F3411"/> data dictionary (Table 1 and Table 2). See that document for additional context and background information on aviation application-specific interperation of the field semantics. The excplicitly enumerated values included in the CDDL above are relevant to DRIP for its operation. Other values may be valid but are outside the scope of DRIP operation. Application-specific fields, such as UAS Typeare transported and authenticated by DRIP but are regarded as opaque user data to DRIP.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="det-prefix-delegation">
        <name>DET Prefix Delegation</name>
        <t>This document requests that IANA manage delegations in the <tt>3.0.0.1.0.0.2.ip6.arpa</tt> domain. Delegations will typically be to sector governing bodies, e.g., for aviation, ICAO. IANA will be responsible for processing requests under the guidance of the Designated Experts.</t>
      </section>
      <section anchor="iana-drip-registry">
        <name>IANA DRIP Registry</name>
        <section anchor="iana-raa">
          <name>DRIP RAA Allocations</name>
          <t>This document requests a new registry for RAA Allocations under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref> to be managed by IANA.</t>
          <dl>
            <dt>RAA Allocations:</dt>
            <dd>
              <t>a 14-bit value used to represent RAAs. Future additions to this registry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126"/>). The following values/ranges are defined:</t>
            </dd>
          </dl>
          <table>
            <thead>
              <tr>
                <th align="left">RAA Value(s)</th>
                <th align="left">Status</th>
                <th align="left">Allocation</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0 - 3</td>
                <td align="left">Reserved</td>
                <td align="left">N/A</td>
                <td align="left">N/A</td>
              </tr>
              <tr>
                <td align="left">4 - 3999</td>
                <td align="left">Allocated</td>
                <td align="left">ISO 3166-1 Countries</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">4000 - 15359</td>
                <td align="left">Reserved</td>
                <td align="left">N/A</td>
                <td align="left">N/A</td>
              </tr>
              <tr>
                <td align="left">15360 - 16383</td>
                <td align="left">Allocated</td>
                <td align="left">Experimental Use</td>
                <td align="left">This RFC</td>
              </tr>
            </tbody>
          </table>
          <t>To support DNS delegation in <tt>ip6.arpa</tt> a single RAA is given 4 delegations by borrowing the upper two bits of HDA space. This enables a clean nibble boundary in DNS to delegate from (i.e., the prefix <tt>2001:3x:xxx0::/44</tt>). These HDAs (0, 4096, 8192 and 12288) are reserved for the RAA.</t>
          <t>The mapping between ISO 3166-1 Numeric Numbers and RAAs can be found as a CSV file on <eref target="https://github.com/ietf-wg-drip/draft-ietf-drip-registries/blob/main/iso3166-raa.csv">GitHub</eref>. Each Nation is assigned four RAAs that are left to the national authority for their purpose. For RAAs under this range, a shorter prefix of <tt>2001:3x:xx00::/40</tt> MAY be delegated to each CAA, which covers all 4 RAAs (and reserved HDAs) assigned to them.</t>
          <section anchor="raa-guidance">
            <name>Expert Guidance</name>
            <t>A request for a value and/or range is judged on the specific application of its use (i.e. like the ISO 3166 range for UAS). Common applications should reuse exsiting allocated space if possible before allocation of a new value/range.</t>
            <t>Single point allocations are allowed to individual entities but it is recommended that allocations are made in groupings of 4 to maintain a cleaner nibble boundry.</t>
          </section>
          <section anchor="raa-form">
            <name>Registration Form</name>
            <ul spacing="normal">
              <li>
                <t>Allocation Title</t>
              </li>
              <li>
                <t>Contact Information: contact point such as email or person operating allocation</t>
              </li>
              <li>
                <t>Reference: public document reference for allocation, containing required information to register for HDAs under it</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="iana-hhit-type">
          <name>HHIT Entity Type</name>
          <t>This document requests a new registry for HHIT Entity Type under the <eref target="https://www.iana.org/assignments/drip/drip.xhtml">DRIP registry group</eref>.</t>
          <dl>
            <dt>HHIT Entity Type:</dt>
            <dd>
              <t>numeric, field of the HHIT RRType to encode the HHIT Entity Type. Future additions to this registry are to be made through Expert Review (Section 4.5 of <xref target="RFC8126"/>). The following values are defined by this document:</t>
            </dd>
          </dl>
          <table>
            <thead>
              <tr>
                <th align="left">Value</th>
                <th align="left">HHIT Type</th>
                <th align="left">Reference</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">Not Defined</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">DRIP Identity Management Entity (DIME)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">2 - 4</td>
                <td align="left">Reserved</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">5</td>
                <td align="left">Apex</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">6 - 8</td>
                <td align="left">Reserved</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">9</td>
                <td align="left">Registered Assigning Authority (RAA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">10 - 12</td>
                <td align="left">Reserved</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">13</td>
                <td align="left">HHIT Domain Authority (HDA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">14 - 15</td>
                <td align="left">Reserved</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">16</td>
                <td align="left">Uncrewed Aircraft (UA)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">17</td>
                <td align="left">Ground Control Station (GCS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">18</td>
                <td align="left">Uncrewed Aircraft System (UAS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">19</td>
                <td align="left">Remote Identification (RID) Module</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">20</td>
                <td align="left">Pilot</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">21</td>
                <td align="left">Operator</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">22</td>
                <td align="left">Discovery &amp; Synchronization Service (DSS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">23</td>
                <td align="left">UAS Service Supplier (USS)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">24</td>
                <td align="left">Network RID Service Provider (SP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">25</td>
                <td align="left">Network RID Display Provider (DP)</td>
                <td align="left">This RFC</td>
              </tr>
              <tr>
                <td align="left">26</td>
                <td align="left">Supplemental Data Service Provider (SDSP)</td>
                <td align="left">This RFC</td>
              </tr>
            </tbody>
          </table>
          <t>The remaining values (27 to 18446744073709551615) are left unallocated.</t>
          <section anchor="hhit-guidance">
            <name>Expert Guidance</name>
            <t>The value space of HHIT Entity Types is rather large, but care should still be given to conflicting or confusing allocations. Justification should be provided if there is an existing allocation that could be used. Future additions to this registry MUST NOT be allowed if they can be covered under an existing registration.</t>
          </section>
          <section anchor="hhit-form">
            <name>Registration Template</name>
            <t>For registration the following template is to be used:</t>
            <ul spacing="normal">
              <li>
                <t>HHIT Type: title to be used for the requested value</t>
              </li>
              <li>
                <t>Reference: public reference document allocating the value</t>
              </li>
            </ul>
          </section>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="dns-operational-considerations">
        <name>DNS Operational Considerations</name>
        <t>The Registrar and Registry are commonly used concepts in the DNS. These components interface the DIME into the DNS hierarchy and thus operation SHOULD follow best common practices, specifically in security (such as running DNSSEC) as appropriate. The following RFC provide suitable guidance: <xref target="RFC7720"/>, <xref target="RFC4033"/>, <xref target="RFC4034"/>, <xref target="RFC4035"/>, <xref target="RFC5155"/>, <xref target="RFC8945"/>, <xref target="RFC2182"/>, <xref target="RFC4786"/>, <xref target="RFC3007"/>.</t>
        <t>If DNSSEC is used, a DNSSEC Practice Statement SHOULD be developed and published. It SHOULD explain how DNSSEC has been deployed and what security measures are in place. <xref target="RFC6841"/> documents a Framework for DNSSEC Policies and DNSSEC Practice Statements.</t>
        <t>The interfaces and protocol specifications for registry-registrar interactions are intentionally not specified in this document. These will depend on nationally defined policy and prevailing local circumstances. It is expected registry-registrar activity will use the Extensible Provisioning Protocol (EPP) <xref target="STD69"/>. The registry SHOULD provide a lookup service such as WHOIS <xref target="RFC3912"/> or RDAP <xref target="STD95"/> to provide public information about registered domain names.</t>
        <t>Decisions about DNS or registry best practices and other operational matters SHOULD be made by the CAA, ideally in consultation with local stakeholders. This document RECOMMENDS that DNSSEC SHOULD be used by both Apex (to control RAA levels) and RAA (to control HDA level) zones.</t>
      </section>
      <section anchor="public-key-exposure">
        <name>Public Key Exposure</name>
        <t>DETs are built upon asymmetric keys. As such the public key must be revealed to enable clients to perform signature verifications. <xref target="RFC9374"/> security considerations cover various attacks on such keys.</t>
        <t>While unlikely the forging of a corresponding private key is possible if given enough time (and computational power). As such it is RECOMMENDED that the public key for any DET not be exposed in DNS (under any RRType) unless and until it is required for use in verification by other parties.</t>
        <t>Optimally this requires the UAS somehow signal the DIME that a flight using a Specific Session ID will soon be underway or complete. It may also be facilitated under UTM if the USS (which may or may not be a DIME) signals when a given operation using a Session ID goes active.</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT Consulting, LLC) for their early work on the DRIP registries concept. Their early contributions laid the foundations for the content and processes of this architecture and document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="F3411" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3411-22A"/>
          <seriesInfo name="DOI" value="10.1520/F3411-22A"/>
        </reference>
        <reference anchor="ISO3166-1" target="https://www.iso.org/iso-3166-country-codes.html">
          <front>
            <title>Codes for the representation of names of countries and their subdivisions</title>
            <author>
              <organization>International Standards Organization (ISO)</organization>
            </author>
            <date year="2020" month="August"/>
          </front>
          <seriesInfo name="ISO" value="3166-1:2020"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="drip-dki">
          <front>
            <title>The DRIP DET public Key Infrastructure</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="15" month="November" year="2024"/>
            <abstract>
              <t>   The DRIP Entity Tag (DET) public Key Infrastructure (DKI) is a
   specific variant of classic Public Key Infrastructures (PKI) where
   the organization is around the DET, in place of X.520 Distinguished
   Names.  Further, the DKI uses DRIP Endorsements in place of X.509
   certificates for establishing trust within the DKI.

   There are two X.509 profiles for shadow PKI behind the DKI, with many
   of their X.509 fields mirroring content in the DRIP Endorsements.
   This PKI can at times be used where X.509 is expected and non-
   constrained communication links are available that can handle their
   larger size.

   C509 (CBOR) encoding of all X.509 certificates are also provided as
   an alternative for where there are gains in reduced object size.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-dki-03"/>
        </reference>
        <reference anchor="RFC6841">
          <front>
            <title>A Framework for DNSSEC Policies and DNSSEC Practice Statements</title>
            <author fullname="F. Ljunggren" initials="F." surname="Ljunggren"/>
            <author fullname="AM. Eklund Lowinder" initials="AM." surname="Eklund Lowinder"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document presents a framework to assist writers of DNS Security Extensions (DNSSEC) Policies and DNSSEC Practice Statements, such as domain managers and zone operators on both the top level and secondary level, who are managing and operating a DNS zone with Security Extensions implemented.</t>
              <t>In particular, the framework provides a comprehensive list of topics that should be considered for inclusion into a DNSSEC Policy definition and Practice Statement. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6841"/>
          <seriesInfo name="DOI" value="10.17487/RFC6841"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC9575">
          <front>
            <title>DRIP Entity Tag (DET) Authentication Formats and Protocols for Broadcast Remote Identification (RID)</title>
            <author fullname="A. Wiethuechter" initials="A." role="editor" surname="Wiethuechter"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>The Drone Remote Identification Protocol (DRIP), plus trust policies and periodic access to registries, augments Unmanned Aircraft System (UAS) Remote Identification (RID), enabling local real-time assessment of trustworthiness of received RID messages and observed UAS, even by Observers lacking Internet access. This document defines DRIP message types and formats to be sent in Broadcast RID Authentication Messages to verify that attached and recently detached messages were signed by the registered owner of the DRIP Entity Tag (DET) claimed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9575"/>
          <seriesInfo name="DOI" value="10.17487/RFC9575"/>
        </reference>
        <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13">
          <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034">
            <front>
              <title>Domain names - concepts and facilities</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1034"/>
            <seriesInfo name="DOI" value="10.17487/RFC1034"/>
          </reference>
          <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
            <front>
              <title>Domain names - implementation and specification</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1035"/>
            <seriesInfo name="DOI" value="10.17487/RFC1035"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="STD69" target="https://www.rfc-editor.org/info/std69">
          <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
            <front>
              <title>Extensible Provisioning Protocol (EPP)</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5730"/>
            <seriesInfo name="DOI" value="10.17487/RFC5730"/>
          </reference>
          <reference anchor="RFC5731" target="https://www.rfc-editor.org/info/rfc5731">
            <front>
              <title>Extensible Provisioning Protocol (EPP) Domain Name Mapping</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names. This document obsoletes RFC 4931. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5731"/>
            <seriesInfo name="DOI" value="10.17487/RFC5731"/>
          </reference>
          <reference anchor="RFC5732" target="https://www.rfc-editor.org/info/rfc5732">
            <front>
              <title>Extensible Provisioning Protocol (EPP) Host Mapping</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet host names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to host names. This document obsoletes RFC 4932. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5732"/>
            <seriesInfo name="DOI" value="10.17487/RFC5732"/>
          </reference>
          <reference anchor="RFC5733" target="https://www.rfc-editor.org/info/rfc5733">
            <front>
              <title>Extensible Provisioning Protocol (EPP) Contact Mapping</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of individual or organizational social information identifiers (known as "contacts") stored in a shared central repository. Specified in Extensible Markup Language (XML), the mapping defines EPP command syntax and semantics as applied to contacts. This document obsoletes RFC 4933. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5733"/>
            <seriesInfo name="DOI" value="10.17487/RFC5733"/>
          </reference>
          <reference anchor="RFC5734" target="https://www.rfc-editor.org/info/rfc5734">
            <front>
              <title>Extensible Provisioning Protocol (EPP) Transport over TCP</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes how an Extensible Provisioning Protocol (EPP) session is mapped onto a single Transmission Control Protocol (TCP) connection. This mapping requires use of the Transport Layer Security (TLS) protocol to protect information exchanged between an EPP client and an EPP server. This document obsoletes RFC 4934. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5734"/>
            <seriesInfo name="DOI" value="10.17487/RFC5734"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="STD95" target="https://www.rfc-editor.org/info/std95">
          <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
            <front>
              <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <author fullname="B. Ellacott" initials="B." surname="Ellacott"/>
              <author fullname="N. Kong" initials="N." surname="Kong"/>
              <date month="March" year="2015"/>
              <abstract>
                <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP). It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP). RDAP is a successor protocol to the very old WHOIS protocol. The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="7480"/>
            <seriesInfo name="DOI" value="10.17487/RFC7480"/>
          </reference>
          <reference anchor="RFC7481" target="https://www.rfc-editor.org/info/rfc7481">
            <front>
              <title>Security Services for the Registration Data Access Protocol (RDAP)</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="N. Kong" initials="N." surname="Kong"/>
              <date month="March" year="2015"/>
              <abstract>
                <t>The Registration Data Access Protocol (RDAP) provides "RESTful" web services to retrieve registration metadata from Domain Name and Regional Internet Registries. This document describes information security services, including access control, authentication, authorization, availability, data confidentiality, and data integrity for RDAP.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="7481"/>
            <seriesInfo name="DOI" value="10.17487/RFC7481"/>
          </reference>
          <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
            <front>
              <title>Registration Data Access Protocol (RDAP) Query Format</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <date month="June" year="2021"/>
              <abstract>
                <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9082"/>
            <seriesInfo name="DOI" value="10.17487/RFC9082"/>
          </reference>
          <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
            <front>
              <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <date month="June" year="2021"/>
              <abstract>
                <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs). These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9083"/>
            <seriesInfo name="DOI" value="10.17487/RFC9083"/>
          </reference>
          <reference anchor="RFC9224" target="https://www.rfc-editor.org/info/rfc9224">
            <front>
              <title>Finding the Authoritative Registration Data Access Protocol (RDAP) Service</title>
              <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
              <date month="March" year="2022"/>
              <abstract>
                <t>This document specifies a method to find which Registration Data Access Protocol (RDAP) server is authoritative to answer queries for a requested scope, such as domain names, IP addresses, or Autonomous System numbers. This document obsoletes RFC 7484.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9224"/>
            <seriesInfo name="DOI" value="10.17487/RFC9224"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC4033">
          <front>
            <title>DNS Security Introduction and Requirements</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4033"/>
          <seriesInfo name="DOI" value="10.17487/RFC4033"/>
        </reference>
        <reference anchor="RFC5155">
          <front>
            <title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="G. Sisson" initials="G." surname="Sisson"/>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="D. Blacka" initials="D." surname="Blacka"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence. However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5155"/>
          <seriesInfo name="DOI" value="10.17487/RFC5155"/>
        </reference>
        <reference anchor="RFC8945">
          <front>
            <title>Secret Key Transaction Authentication for DNS (TSIG)</title>
            <author fullname="F. Dupont" initials="F." surname="Dupont"/>
            <author fullname="S. Morris" initials="S." surname="Morris"/>
            <author fullname="P. Vixie" initials="P." surname="Vixie"/>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="O. Gudmundsson" initials="O." surname="Gudmundsson"/>
            <author fullname="B. Wellington" initials="B." surname="Wellington"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a protocol for transaction-level authentication using shared secrets and one-way hashing. It can be used to authenticate dynamic updates to a DNS zone as coming from an approved client or to authenticate responses as coming from an approved name server.</t>
              <t>No recommendation is made here for distributing the shared secrets; it is expected that a network administrator will statically configure name servers and clients using some out-of-band mechanism.</t>
              <t>This document obsoletes RFCs 2845 and 4635.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="93"/>
          <seriesInfo name="RFC" value="8945"/>
          <seriesInfo name="DOI" value="10.17487/RFC8945"/>
        </reference>
        <reference anchor="RFC4034">
          <front>
            <title>Resource Records for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4034"/>
          <seriesInfo name="DOI" value="10.17487/RFC4034"/>
        </reference>
        <reference anchor="RFC4035">
          <front>
            <title>Protocol Modifications for the DNS Security Extensions</title>
            <author fullname="R. Arends" initials="R." surname="Arends"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <author fullname="M. Larson" initials="M." surname="Larson"/>
            <author fullname="D. Massey" initials="D." surname="Massey"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
              <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4035"/>
          <seriesInfo name="DOI" value="10.17487/RFC4035"/>
        </reference>
        <reference anchor="RFC3007">
          <front>
            <title>Secure Domain Name System (DNS) Dynamic Update</title>
            <author fullname="B. Wellington" initials="B." surname="Wellington"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This document proposes a method for performing secure Domain Name System (DNS) dynamic updates. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3007"/>
          <seriesInfo name="DOI" value="10.17487/RFC3007"/>
        </reference>
        <reference anchor="RFC2182">
          <front>
            <title>Selection and Operation of Secondary DNS Servers</title>
            <author fullname="R. Elz" initials="R." surname="Elz"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <author fullname="M. Patton" initials="M." surname="Patton"/>
            <date month="July" year="1997"/>
            <abstract>
              <t>This document discusses the selection of secondary servers for DNS zones.The number of servers appropriate for a zone is also discussed, and some general secondary server maintenance issues considered. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="16"/>
          <seriesInfo name="RFC" value="2182"/>
          <seriesInfo name="DOI" value="10.17487/RFC2182"/>
        </reference>
        <reference anchor="RFC7720">
          <front>
            <title>DNS Root Name Service Protocol and Deployment Requirements</title>
            <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
            <author fullname="L-J. Liman" surname="L-J. Liman"/>
            <date month="December" year="2015"/>
            <abstract>
              <t>The DNS root name service is a critical part of the Internet architecture. The protocol and deployment requirements for the DNS root name service are defined in this document. Operational requirements are out of scope.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="40"/>
          <seriesInfo name="RFC" value="7720"/>
          <seriesInfo name="DOI" value="10.17487/RFC7720"/>
        </reference>
        <reference anchor="RFC3912">
          <front>
            <title>WHOIS Protocol Specification</title>
            <author fullname="L. Daigle" initials="L." surname="Daigle"/>
            <date month="September" year="2004"/>
            <abstract>
              <t>This document updates the specification of the WHOIS protocol, thereby obsoleting RFC 954. The update is intended to remove the material from RFC 954 that does not have to do with the on-the-wire protocol, and is no longer applicable in today's Internet. This document does not attempt to change or update the protocol per se, or document other uses of the protocol that have come into existence since the publication of RFC 954. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3912"/>
          <seriesInfo name="DOI" value="10.17487/RFC3912"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+19a3PbyHbgd/6KXrsqQ16TNElRssTUbEJLsq0b21IkeSa3
ZqfGINGkcA0CDBqQxLG8v33Pqx/gQ9YkU9nU1tIumwAa/Th93o9mp9NpTPM4
yeYjVZWzzmGjUSZlqkfq5PLsQp1mcLVS19HcqObJ6XVLJZkqb7Q6yRcRfP0Y
LbS6WplSL+D5x6tWI5pMCn0Lr59eY1u414jzaQbtRiouolnZSTSMExfJslPo
eWLKItGmMxg2plGp53mxGilTxo1GsixGqiwqUw56vaPeoBEVOhqps6zURabL
xt0cO0yW6ue8+ALzV2+LvFo2vtz5Np0THBA7lj5NGWXxb1GaZzCblTaNZTJS
v5T5tK1MXpSFnhn4tlrwl2m+WOisNL82GlFV3uTFqNFRShU5gkfHSZkXDbiG
ZZqRGnfVz7Cym0pPb2B0esCrHsfRYvNZXsD8x/+GENbFskh+1231/v0xPQOY
aA1zHh4NX6ljnEUxTaJUnRTJraYWU9iVkfobrPw2SVO+h9DMs5H6+Ddukscw
eH9veLQv11VWInQ/XY3phoYdTEcqgul174Lp/XN0r92kugAEWjUt8q9ddamT
OFjcX5OFv0Vrurx+80Gl6bK2kqtSjbO40HdGvcsrEy5i73Cg3sEiYAvLPFOX
eRS31ds0MvP8Tl1N8zKFPQtW9Ha/r4av36+t6V/CJf09WfxzMZv2e3v7NP9G
lheLqATgjajZ5Zvj4cHwcKSeq0lk9MHQ3j08Gh7h3elEthbuHe29GuI9wthY
l0p1Our6/OS8eUoo0EJ8m9kB/qlB773ZG/b7PJhSQlBXiHxREaurpZ4mswTQ
EvZLwasAwUVeanV2oqCJui6iKWK0vG5xT8mn475ZLLq6/iA4T11GqR04KuYI
/ZuyXJrRy5d3d3fdyJSLLrz2coZT7AwGUfemXNg3YqBB2NQqXalBbzCQu0Yj
jSawSj8LHHTE64ROxu7+yfkZYF2v298f9F7WH59dne/1Dw4664A5hn01BAfk
LIVeFtoABjJ48hlhmsEvvN0wFQITNE4KZapJnNwmBtqapwKsBiu3L0adF/Mo
S37ngZsw3dYjgExMTnCE/zu0LEHGDqKp2QTquJoDL0Ow9h4BKwwKJMFQoqaN
xCMXN2NE/AKc66xz0vXcFG41LNIeHA77hLSZMXqqlnmaTFcOy/uDA3yYRFnU
mVdJrIH4tHGPD/o9IoI4Th0R9Pf3HBEU+t+rpNDEG12D4Z6nkqiY3rgH+6/2
/QPYGZ7jc3Wj0+WsSlFCKCBW7unq+qQPA/HM7Z2DI7qjl0t752if7hRxtHQE
3dvbc9S939/fdxdA1P4Cmg3DC/9kr9d75S4G/cOBu3j1atDzzY76/snw1eHB
qNHoAEeIJsDromnZaFzfJEaBzKsQQApwYVokE8BZRO44MdP8VhcrwuAFbMCc
4IjYvVXgmpZI0S4gEKJ1UhIqiOTVBXQGououKW+4AyPMheAKU6qmZVUIxRjL
gfDZAjh+HsO7IFdpbhfVBLDEMzNkxk5AE3nifALSK3QKmB1jTyBEyqjLkFgk
gDi60XiOdFbkMcwA+mo0gs5wyFkFc8G1AwmWufqUATQy6G2cFFMU206t+DS+
ajkOGcMLnnc2L89OWl11ngG/IqimySLBKeVLXVj6ToIFTaNMTbRC9qJuk0i9
LkDcTIEnKuiprSZVqfR9qbMY+gjfgx01OawzQU6UaQ3Pu+oagLbI4V1tsEOU
0Dp12xm+PivyBY6A/SCoYUkKx8PvVZb8e6XVF70iGKd5/qVaYgfbJ5Ih2PVt
BIN49Uk1jdbq61egIyTEziyZD799+0f1JpnD5qshdvf1q5Dpt28t2KmvI2gE
0r8o70CL6ERpMs9+fDYlyf/sW+N/w6fxl/pHPfGz9lqDXoQl9/npk7tR8t6A
rhp/2fL0yd24K+jmRUc+L7Z1czIev/xp8NOWboL3sJsHmh38k3c6f+k88QMN
c/veg51NTn+3zmb3ooL3BDYP9FeW/MItET/vCasMfQ+e8Hj2vW3dPKi3F+cn
uET8dPF2l7/n6uIKnjw8qZv6bB7cP39wNvVP2E0dNmvdHA/Wu/lpcCaN1/Hb
P/HdwPt+Nj/YfaxtazD8xobD54eNRYWDqC2Xu55s7Sb/ET4fweABHgPfwm7q
T/KNbl5Y3Ns2pjWkts/mRYB+gCfHV4ImfxA2Ob36EJCmnY1IDOZ8NdhseWJf
3WQUTRRZn64/tDZAvOsJw+Yx7ve0J8j91OMfRsyHjWYvPJhe+GZrDzbeerBS
nLiSoN0PTK1gPIK43jbWg4XnyqLUw+aD781QrZP09hludpI/odkDqSybc9g6
pReNBjBx0BBPdKmnZHmq8W0ORiryMrAgdQbaQWpBdT4xpEZB89tkqhvI1kb2
4VU006CPrbcBLgH9/6RvkmmqO2XeAa2piJy6Bc9/qj+XryxXSfaq56G0Zlvo
x2dv03wCU0MFAfWFTwYURLCCdRYVSa6aoUAXcd4Cad34+UZnKlpXIcVlw5If
zNhv31ABAfM7VlGoiKBWQfrPVpVDdKZCo6pxCw9Jm5HBWCGD4T54XVYm0Dw5
+3DaAt0UVn4juq6xSosz7pACI2PyaUK6ZCqCisZAfbMLTAimGqrUSYnLgJfg
MmZvFIxE91CrnNqucXGoIcOGqatquUwT0JVBn7wCfbI5Xi5hqcm9GncH6+oR
6YER9yqrTwAs+AIpd4W6gWmnMPgEFfkcplAogQMA9k6nKWhYz587TDvOs6le
gm2wS8fXi4mOEfCRuoFZogG1UmZ6AwAV+MHqFhHMGXTbDNTlx3xwsBayo759
69IaDMwNtnOq68BHyIf7HE2noMgiLFCZDzeFrIuIXHowmVSrKDW5Whb5bYKe
Q5oMeeqgPwAFaeC0gRONjyOwEGB9BXaNTd0KQXMn0CWi1eP2ePNCDBQyFvKK
dGownpZaPAUBRgCwdxtHdlRkIDxlNneWTOAhBEwFgBbKmBarZZnPi2gJ4Eft
HCwl2P+8MGz40kSnuhBrhB0UzkBa5gmKToOWzVIYbzgSWGR5BTsC6H1cG6jJ
02rRiLR0IlfoBm1nBBMOBmOsAAIAWwNqu+Ahjt52axA/7di/hePGepZkRN+C
8GCdA1dAiNZMoS4g6WNrDScmUGGopVGyQEjwzi/BvNjc9Q0TOUejKi/Fdl2p
8XgMuz8FIkvMQhgWrNBKsB0WKkzFlHmheQOKnHj/BWwCWoFgIFrbMZqk9T6a
F2dnLSbYK0QwnJ8WXKPJ15iPcdi0zspo94lWbIsYTLW5e87eLcRJDf0R7cLd
s4vbA1gabMx9G4nObejZ+OPYm92fB71ef7TXG41eDg4/0xovL40ujdsH5knM
NBsNpiwDMIDNAdYBCBLny5JXA6C5yfI0nwMJntGaCs3e7pg4aoTsb86iKFrq
e9VMurrb5rkuaa4t4R+hJ42aMqMvkGnGGldDLATXoSNATZ4RQltd62KR8DTU
1+elv/pGe3HJbqY4bMdbg7YyWK3AG559+HR1/azN/6uP5/T98vRfP51dnp7g
96t34/fv3Rfb4urd+af3J/6bf/P4/MOH048n/DLcVWu3Poz/Bv/h0p+dX1yf
nX8cv3/GtBYiCblUcpYb5EnXJctc6w0iCnx9fKH6QyDE/0Eep/4RUCJfHPZJ
WN8B6fJgOXo4+BL2FfYSJEFUYCeA2iCjlsD5UvTlGGVu8rtMweZrRulxHCey
PydI/XRh1mlwEX3RhEoWUXE7WFgC3yun3dYm7+jvk4hhTJP2KG/aIfOwb5PL
B2VCIGjbIk5IgMLLl+NxW707Ge94hzQYwhyURO+cnJQwUyPUc3iyTKvv3p1d
ExRnVcFUwT4y8ophYKOMQDzLwhdMT4ivVgmbAozhFmsj17ZDUjf6g8POBPSR
2yitNBMOqSbYMRFLFMcFSlXEAyIukAYL0OXSlbTysk8BJyFIAiGDHgSMFugE
yJN8bwvumWB/c5OUqDQiAP1u05SBNOErrKZdW/CaK8vtoIUoaaWB2o5KdOex
y7XrF42HkI+Buu535wx9BASxqyrhIMeDOr88fgdf3kXmBrT6B9UcHCqAo2mR
rh9e4WVwRdcHQ9/4PzftmvXwct2c+F+NRx+vNdjyHFp0HvuE7299/XufoIP/
0PthD+uw2vjsauDBaO1FjWx7TLIM1QCrnK0sJojmGtwPumj2h+F+r392NXj4
MxYSmmeWzKxptm5cvS509CUG8kMDDNnCEyV5si7MmalM8wI4xTLPSKUW/aCZ
JRNUV0RtIBnyea/bgz99+nfQTZYH3ahYRp9b2DNMh8dExnc2fg3EfVKRMMIb
IIvRfFzXyIAhpsDESKCXhv36KCRukiW+WZsDTk7eDxmc+LJBLBUqhYYpNvID
iP7wHexAAdBqqWcTAEV+Z54FfZZ3Oe25jE3RB2TjpO5vx6kmSJIWLC2aMm+s
K2RdmAEry24prNiQaT0es44rG3U/ur+/h80aDlnzgp43n69GqxW02T/4zEpg
MMH6Lsrm0lo+33f5z45NpeE+r7r45ztNN/RqWA9Irlw0doyUgr7oloeRb1Qs
eP1X5xJ1VB/h5QIskY8sLjA4C9LCxW5R4tMwCWvcsD15UVInpFuAmoFaBBgS
2unEsC1WlpLduaY2Er50wV7DgSgoWUSRWCXYL0xXyUIQK7tMbbAHLHYJjr22
GvaODtrqsH80IKD1B4PDQ9okDCcXtyLUw8iQqDswIRyiGQHddJYcsbI4Hk1y
2D8EJ7yClEWoKURATKjtQm5kZaCShoApBNW9QUDaMc7MGkweGWkJhFRstgF6
U9AbcVeWG8WgAztzox3GDtngxAhvfYXWhYHafLYSshS7MCDNMcyrTRCAl5Fm
2qS4ciSsQDjBffH5gEGHI1JXbeI3jxvm6LzBwBnhg2nXLGwmMktNuA8qk8XB
Y4AP7p1DEtBeyKBmb4hXsGPA8ZKBTFwvhxfR7CTtbgpMFdlpumJd+BNv+Ok9
ABL3EFnCB0Dw1IhrBlgfvihUgY/ZP8UTL/JqfpMilAEb74wYdGwEZqVNZ4oK
+22lFti5uLDY2wZ2liFfTXvtdbBoqjTGJeF9wBFET0CfmxyZunk5zTGamorf
bj1aSjJkxXZ5WoKKWWqYKAsUkyDzsdSEujMtClAi39AOSYWdo1lJjghzwwq/
QKPrHO8ZG54KcBC/fslQDY28e49dH4ykgtFE9NGU8d1RhQWV7xpfXS2FnKzH
BkxXsTG9OWPYt2ccVuF+AQLg1grV+I0AhlsS043IvTWJvKlTeKkkYpczTnZH
uuueItgYWBZgIgyQcqQ86AdmlMYAZeltI3wbFSz/3VRlybwcWaPbvd+BCzEn
YUKgwXFZgauhFnmuT8Z0Q4/JnN2TAZg3QPrzu/OzK7YWMPMBuDKmK52ML9jJ
eITeI/RxMbJ4AAHfrMonQ9fjFN71ONR1WQP08Ca6ZXAjGhkrZR3WIKkgrlZF
9ljTBKFwEa3YtcW0zGyLqBWWk4/WaXNSrYwHjjBDNzSNvIxWvPeumQDVqWMO
1RuN1yu2UBPH7wpNrmYy9IEH4DY7jMBeoxB6ICwTNFmJWl0zskhhE2ewZKC9
PMtBKqyYzzhvFupQSIS3CbFIigdUhANfNLqHcnTXwsQW1YLFGEhDcZjmpWQ5
4HzAiP0C2kScoM9NZBgieZl0pvliqUFNRs1nSRRPjs6xnymulHYI/o8KEKMA
xJXKKuslXttU7lDzLpIXiRkX4DeY02jsWjIhR2UFU1qgmc+6CbH+557Xozfe
wL4UInpJN0Q3udjBKA8t2q1eOq7UaKIa39odgnrx467PI+GtB7Vdm+s+Fuyq
jZQ/caQ1Y+l7NhJ/HnY+aXy0kvk7A3l+8zLg8JvtSPl/wsSfukD77XGPQL7p
IghM0XqXG2NsGfOF3xMKir7wW+Sv15/LdQO77HX5j81u6K9dD9au99x1Y8do
T7x+ImCfjDq7cafxHlT57+ANj/Q03EHkIVvvCT0+eZH223ccSrn90u12/xj6
bKLTU9FnBzoR+gi++OSYwdr13tr1rIt/1G70eeJs/hujD+kOjzbcuLWdl+fr
N7as+kHddx//s2+p9UljbnzqTqo4Mx1SW0JP1el9tFhiKAhNGif3OE8A/e1P
tFs45kweI5SrGNZWVQaCE+RrHrfRRMS4EkbuJqiUgr4D4hgjdCRS2Z7yITIy
btkYBKOlWrDb3VAEakq2D+j28M3YgGOOi7inIoEYDc58STFFtHRtDrjX8CKy
RVOKUJDRjmmhtFLWFTA61g5TJuuaJmgdM2jldQdWKF5a/wYNFmW1CLI8w0kl
tfQPccWnHGq0ViSr0lZ9lgEwdC0JBATAiHR6awj6oN5WYEYEo6igYe5gK/AF
UGahrY07sPuLDTqcuiE3Rle9A4UT7Pw0n35h25vbk1FQWmNCAs/qGQX3dYwO
uaSIyb5GvdJZaRjtuLpok7KG8WbAHIOOGT8Rjs+i8mlBDBv/RtAknEjtFQcJ
PyHSvRH6u9ygznW6GWoVB591ipFiHgRCWrTazGZyTNGXkFnlPUTvY9CeUzW+
TdjGClyOx6DDiH8sAJU37bcZ5HXH73Zs2YJf7CMJtpphKI4AHtHnaZhEfBo2
MIN6/DtMXnYZPJQwhK7Udh0oGBrGWOu2QTXn5wBcsmmCLCdCm79CCwTmWeD8
b8ndZfNxYs22Ee+spya0Y/JUe98iB7Y4RqaFn1HcqsbxKHp1sgKbCDPe14mE
LCKhrmVuGOwmTyu2uigmLV2z2w65BXnPeMJRMGVnxxrG4tqmkQOa4cThWhrS
JXnAzs8oMUHN0mR+w9wEUbrkCCUYkzPo+Q6LUAQCyFgBX2Y64lnD0sUBhKFI
nd0mRZ6xBUtWETLnzkSjURWjfZcjfb3L75AG2mzdOv5imbYB4gV4kCVJVpWs
FNqmyRf0H6HzX0OHUzAD2fZjNKiWYOTbzB+MhdbRk10TDu9cxkRgztP2OFbe
ITsOOkQOnek7imV78zpk1ejvnBeaE1M4UAyv3yUgm2iq1itI8kKy9A25AkKb
D7DLcRZOPPBm+jFGoQELbqKlEbibKpVyJAJ2SgoIyK8vmp07xNwiJAfrEjIl
7EYG7MaFLIx2O4AJ+w5NDDCMcZoGrb6f70QOI+t29qVT1snuHPDYFbulvBsP
sJL6DpKnnj9S+4GpGUByoDtcAEoHwXvKPKjlCaYY85olGuQs5iPBY+uITbLb
PL3FB5FxiVeG03VC/+KaL/2xiheMPcB9M1upy9O3nX6YKMCJCY8mhVVeMIg7
yoisZc2AnFi1KV4KNcMX5ofNy8uWpMb5VLnLy+vVUlsqDqqAJB3hDinqzjZr
k58Ht484iPOeOTZMMciiQDbMPlvmLDY7oZazVduM5mtK6Pz6dYKPuQtGG2wD
XfAMcIm0SdMqjQoAebJAlYaoDBmd9y8CL7w8A7Q1taSuICmsxVycMt9wd7Zl
a/m0N+Dap9emLXliYSRR25IkImTSN9VnL903IqIYHYRZ3nKIhuFE2UB1Pzji
XxtDIeLcaouwJ8AzMLrqhHI8KbqTCZXXdFVycXkHtKUzIwxfdlV9GP8N5y51
jKznWNpEqOHe2A2gqfrGnDDodUy/w7WEvO15fAjVj1dXp8eMuSAh5ukqzGBS
TYpJJkRdVHg6Hnc4LoRguwHhBMtAHzNyJZtUjDGkGN6KWYnDVcswlIskKVQ8
JZRxBRAUFhXRCPU8yiidI0HeLJjKMJErCGTRUrB00QUZRQwCZqcVprUQk55h
ASJcrRALSRRRaCn53Xn0cQVtHxdLCOFwB1x1XEArPiq1vFmZhDb9JkKrQhcY
J5pC57ijpExh8ZhjCairYarw9+NgjYatwKnFFS3CIL4DHhNpxj42sqVej7Pl
KmOF7zo1UHSHhRDACJ2qyPWiGei9LBxJdd5Qll1sMjJUS28lioOXpRCX/iTo
64IVQUqtLWXj5D9UCGByvmiPai4uzwwV4K0xER4gpA83gEE2Pn2E5YUxmR1k
QxTGHn9cZZ10nm+weIoZ8mrrT0AmWs4swehtjcgf73i6qIcImFtM5q+MS2ig
t7ehps0oy34AfnwLYjwSXZCgXeiOtpHMd6D62j06C1JqC71MI3Hgh22uqQNM
RcPEUIxHYaDOZrsK7LFSlaORdhgvNTjgP00rw5HmYBOt0KDcb2tO/WBC9PC5
MaEvAjRVVLw5C47yyYHrggQnXg2dzpJiUVPwJcpH8LWMFBhDziUM6vj1+SVv
Mhb2g8oyWZVacviOT07ey7ODfg/jWkyYVvC74I1PubtLAOJYFc3o8hwzWO8B
D+sF6w41OiU8/RbMkNJspS13zKcP8DTwRALUqqgumLge1rXzDEhUhQES0LBL
3SHjvmM0ugCwR8zwKMEUmwPHwsQkUpIw/K3tSHEyT1Bt9lF0ACvuWWat/XyC
W0egmFWolk7+rqelVaP9COQNgQmAnCTNxrMkx7U4WQDeSwDmH7F8l9DZQfkm
MjYTJMWeQXVMsSB5wpFD0tAIiX22K767iCivYpakm4cFYPQssmsGVkncXNbO
E2dTgXvkXXyOOVu+j53bGd4OtxVkA9uScWKA2FaA5wVYm5RGgOG3ia5tuwfU
qa22OUmieYZx6ymCSbhkTci7apW3rlaF0VYQ8Q2CDtQXzC5esonjJ85w/Sbh
LbmrflS/kA+SrplGOyUQ90hVsCltesaHubCbY6RKgKDqopxt9vdbbUVNQnLs
IBMYKUSRxq/WTSmJdI54rJOSmN7PcBfVI0xvRYpEHyU9sHl2OKFGY8TaAC2E
2aqQAolKyQKq6USURkQD45pQn+A8d7Sc2QfmkLHQluAWSGQlSWThymQAgsKz
kcgivk94yZ5jgJoRO0dtpJ87QLeGRV2X/EEGdj0b/OtXe4qD0354vV4CVhLw
B75Sa4HaiVUaIxa7qTj1rKpaK/TJ4peErjNKFi7Z8AkS+witJ3qVo9dXcpoD
6K6rNpjJOw4xZduGCfUtdFRXcjECHLxrVRTss+7vstQlHiSbNGkVf9Y4SAUI
ujMihCl5CJfHSj1nS4HdPTFSrc9vygNxmAhwRa7MEnK9OOVsBrIeFEXWEwEL
7iPUkRfQe50pOZWP0tg43Uk1E5HtoBLowpqRoJ9Y75PTQJ1aE7Evl60J67aS
oix6m7PYOBMdhuz33Gju3qDnXZEOTJRVOlKfe73eWPV6/SFmEh6DqZkR96x5
bI69lN+yy7VEO6SlUCkIKoVqPjoCgzMzJUOJyHVdogMQ/q273zuCBpeC/+EA
YnUZnc46ol84r564OBPOfUC9BAFa5DlbsqRrSI5qxNow2D9XFdWr+O7Iv5bA
2gJ6ABXGIk1QehUSMxsiT7ERMENtw6rfVD2dSc9C6PuvIEtjj0BLqiSZ41K4
ADnMZimc9+1bCim3DmVLHlg751gOQnBaMog5W4pnk9QPxUishjrVCSINaZv1
3vNCbMjcGMTiJJbc3VB9dSWfLuq0oZ7C9NHRgmkr6IfdYR1Eu+xqy74/Yw3e
Z8Z3qxHVeyi0JFWVW7RbsFXZTME6SxQZG+WYEzcxeZfx9r9MzWXMeqqea/Hw
/yu6/28oum4//3tquuQlR9RWdmfSPJvbgqlIpTqbgxxkMSdOKUIumivLD4EQ
yQUbEXpMhXYgqevQ9jYo0V9JC64i8xtx2R//p7hk+I22e5rEBh/+8gKvOknc
mRfLX/nxP1FtrzzFr7VnKIDgbXxMsgieudcKHeF9/D+8bz3x4nCBFvU7YVsb
75Ih7CU2aXxr+LnCUpv0ShL/xmbCP8jDkj3ZwUrZBBBTYdBrNVoNuyzXTWR7
oSfchzxAXKt10e929w4G1I2s1FkveOM3OnltpKDZYH+/7e8XUZxUoNrM0jwq
23hiWIIl0NNogUEf4xtCg7zw7aDh3dwcDjs3Eanu681BYKV0Yia9sKv5r41N
qLt50yMBQa/bPWz7u6MtGOTPxgyfwRAWJVzHaFP4fh08Yo/XNUNusNeCXsJd
dz0FmLGlw+Dpxnb/2ghRA7c8oxM3e5SomUQp7BV+NSicqYOhYMiWF8Qt9hv7
P0dqv9UIYQCNYVr9/YYnQdVrOIpT/QYTlxo0HCWpvQaTjho21mlF7TdqJKEO
vCG7Jh6tJUvuym2WLIVbaJLrKc+SeU1qFmqj8C5XloQZDnSu49evdIgilrQi
C44T0nVQ72lekzewz2dG0vdBi8toSPy44NOsHrUQC5IVjmj6ZV4A+dSPgkCu
bA2yCA/OEAwOfJRY1qx97Xvplgq6EGYBT0UB0fdTfB8gtQKdBWuLSACLzU4q
WuxjgKSusG+cK3ckVx7kNWl2uBRymtqxbfmx9CcKBamKfIoHB1ONy9mxedDU
XdDNeNsyraC2mj3qv+iSoPhUEWUGg2WaY/7h+Qyk+9EIdg6g6oGmwEIoX0Z4
4huVd9CmyurIB021gvUMZTIM0M6T6toTl+q/XvFFgRHMnyIEoK6kBCOsNbLa
7OMJNN1gHMPKhDcKODmJa/nVHDV38vZO8jhBWaC78y5rChaN2urseHze5TlR
Z1uyYUAZRdUYe3Ir4QAgzhdPqgwKtVFU29MFTu9hI0vDJhQNQcC3IWxJAKdb
YCKPfS0ZiHhXcLYTmBGFbGvZ+Ovd+Fn+EmahrBQS1/LXZu3gUBiQTg7lElGy
HF6iuUj/dO/x5NCWhD9591wRKSZQ1EcmKzxS/WFQhm4PhHC6GJVaddWbinP5
hBUY9rUkxs/Wx10XEREMVTwJeAGctwkAonml2d4adve9jtYfHAQhZhthYbJ8
CaQylzCXqHow7weC4k/Yoom1vA94EmtZGc6i9GvckmJ5acvcN55JC+i8ljOq
gmu19mxnw10toPOe6qi92oTE8wHfP74c75jW4w/dzIfY+dHRkX1n7PLVHsJC
zWN3Gq5tSPgLm/Fo570eTr6/v7d/9KfPHHo9oN4P9g731mZOSJTIgZ9YiBd2
/v2ZN659sena0SrAz4KIprOKELug13lyC8r+sMYBgZx8IWe5tcgY/WbicKPJ
geE4oeQQUNI02BsSeJ2g7ERpLOFgoB6bq8iCXLxKErBD9h3WDPe4qLhlzU4q
hWzuKGZtbVazil9RHAR4QBSxYV3eaZ1treoly5pVESrAlPOtZqQDkMvm+Oon
tjkBtL+8Tcp31cQzMLCqb6oJnqr9kk4evpt3hHXtOtr95STNJy9RouBRyTQd
4LbdqbmFVZ9i2tlHn6xni+bJuUrz48NoYN2pnpVBHbtUA7rUS4EG6FZilLKj
lPqw3BlZHXKiNiLJDYruIij6DvalR/vS+2x9irV8WEqVoyQxW4JHGUWY7zTk
8ZqcsCb7hHva8kvjJSysSS689a0Vbl+fA3Q6VtaBUBpbQSRlYMzjxYdPy0HI
/b2K576c2ykwgfJmi78wfYOQkmMQZVD9Ld1JdhFsD549X1cBXepcobEjfW8S
9qc6SueM42TmMy5t9qPn6FzsC7KEFsPiAQByxYTLKURBxTftP17fMfySjDxG
FR64iw4y5IGUh7HjKKO1nki2Ab2SbCZHAsxnyPWqXCVqqRzwI6TzYmV3reYU
R61f9g1VaNizTii+rtFKgFvHUicaJESNXPEor9nqmXSOPborl3R8ldVTPZxR
9+t4MTiyLtxAebESkrDGvdUOg/OFPWGp5vkNatdnXBFuKSgpWZNaj9BZLcrH
2/6ILrXR25+uTHV3BBUzZoptsVxErwzTWyhogY5W/yTo5P+iShXqUuwsDsBN
yhUpVoGIpcnTor77WVOwHtWmvvtZayzq05pukZd8OBXqId+bW01XIK1jrcHT
Dqbc1dsA9JdhDRRWQXoC3DZ6219rgMWlT+hpR28HMLfDP21uR2sNnnI6y+7e
+qT4Df6kufX36g0eO+LlCb0NSeX9s+Z2UG/wKZsW+i48ur75aUc14rbeXtUb
vGV3zDFn+5NNRAm9b4+v1vvc1tthvcHm3GrH6n+vt6N6g0dO4ccasyrVj/U2
6NV7u0hSoPsnfbb11q83OLeh8/9Yb4N6gxP3Qw3/ABDLpsC23S+D2DNlmyd4
kuzW3tawd9tJtHIQ7VPmNqw3+KjpzH6KkNpeLziOB71eXbQe721/d28nEtfx
vZ18r7c1WqDVabHyTtC5tWWGJzTHjd7kxI6FaCci6JqDVyhA+4fD4cGr4bD3
au9V72h/v3/Q3295w6DKnAa6W7Mm/SRQrXE8VqdZabWpmIGIpwQSOZgvxV+B
4ajdFAcWTdiU4s5iS1NSFdOEEw1yyk6fcSwsPMVI/bUyARH5ihQfkp1JelIi
VVCShBko0pI8IW+i4+cpOok9LJPSQESt5sFW1h4k5McYXsZnl/jR1/IvN9Xh
a71Y4nEpFuCiE7/Ji/XEj1CtKe1bfK6UrAZ/XMVrLiP2uAfPg18NIgXTepa3
KsdeJ/YHdQooxQ3A7zaeA9JOK5Iw2zyxYOafB6dIrTdBrLqs1S5dhsrglGyq
dMXzn/LJ0M4pS4fs2JKlxTLPKK+A3O0zm8fLp127U6Dx0Bt3mhOHGKrAQ25D
oXLQyQQtSZ6DP5xjre4G63QtAJrWJimqLJMCxavT4xb5CnxN5LqWilTtDpWp
kpLCE5b0Rqzg4u/qYHoMZwX09vbCi2F4se8u8Jd93AX+so+7wJ/s8e+8Ojxw
F/jLPpTKcDZTvj4CwY+OALlzIbAggcvqYhBDtuVkXFNgT0aidBdppe8BfQFw
WH8rXWLYf4J+mFgv03wlb1NCnQPvQkeGf5+nIJuUsrW7YSWEQ1Y0nt7Uaivs
1MOK6J3LseemOVwy7qDkfAqKhgl/lcxICTPjra8Qrx/ixHMuOQGPMMef4pxs
yxUUzCb/P5+njh4L681JV86ikePMeIIaM98RqbZU5Li8zns8a0/H2+Ysx92s
eNxKjqqmnAR2UFzYSkUc5MICpHl6cSFnqR8ccU5mcCaPbLtPu5Qf7rEn0fzR
A5Skny2pWHyU0o5jlLDkB8DNZZbcEhlCsHlM8Y7Ug/rU8Cg8e7yax3kyV8OS
yASPWmPu8JSSyPUSOFeGdMVSSxDVD2iP+Z7A7NhOarIsJT0YvblUqWRa1nlZ
e47+Wnre4voljgVJXeO/gGADdSBHUuPKMw65VklaclZWZFaLBf7CAZ/1Xj8d
MihcWGCm4IQLbqLUHoBO3G0KWh1SKe4m1/LsqIAx3dpPMjhesFajSiLY1YrA
/kRUIi+FLjRLe6BDldmCXS7wm0syb7RWp2yPoseVYPKX9dCB8GflRWfkncDf
uWIvJgqhqrRYsgRVoWh54LDDLSwwc4lPa7VAmNWFIUw5LELjZvgiqqZVM1bi
eGnhkrCaFudQAX9JnXNPXFZUhmyIZ9aqiyb2VDupPcWj0JdYCJimK6sGURf+
BzAwrxvZtiROOxEr56BLzbZocO7XG0FHoPwFPNCYGIvJ88yVLOJpDKT6YZpu
yUU5dAi7FJEBAwaeVpLHlBf/6fqDKGEKDAPVtD+bQf2E52wodl/wbA3nMkWy
f17qu+n6Wc5zLWd/Uc6TGk/x2D5A4rn8lh/Ihyj7Qhh8VVZY5nmM6W3NzZ8p
ZRp8nU/A7DNfQOSXv4Mxfn1NyhAWXmIpN7XzfnlNBaYkvOz5ioF3L6FDAUgZ
Ik7rXiACTyYVEwXI2NimX2dxIKtKOYnPHYjJsWRtXFETnXqAPwpgDzQJMm/R
MYW5EI3/A21NI3kQdwAA

-->

</rfc>
