<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-drip-registries-32" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="DET in DNS">DRIP Entity Tags in the Domain Name System</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-drip-registries-32"/>
    <author initials="A." surname="Wiethuechter" fullname="Adam Wiethuechter" role="editor">
      <organization>AX Enterprize, LLC</organization>
      <address>
        <postal>
          <street>4947 Commercial Drive</street>
          <city>Yorkville</city>
          <region>NY</region>
          <code>13495</code>
          <country>USA</country>
        </postal>
        <email>adam.wiethuechter@axenterprize.com</email>
      </address>
    </author>
    <author initials="J." surname="Reid" fullname="Jim Reid">
      <organization>RTFM llp</organization>
      <address>
        <postal>
          <street>St Andrews House</street>
          <city>382 Hillington Road, Glasgow Scotland</city>
          <code>G51 4BL</code>
          <country>UK</country>
        </postal>
        <email>jim@rfc1035.com</email>
      </address>
    </author>
    <date year="2025" month="August" day="06"/>
    <area>Internet</area>
    <workgroup>drip Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 82?>

<t>This document defines the Domain Name System (DNS) functionality of a Drone Remote Identification Protocol (DRIP) Identity Management Entity (DIME). It is built around DRIP Entity Tags (DETs) to standardize a hierarchical registry structure and associated processes to facilitate trustable and scalable registration and lookup of information related to Unmanned Aircraft Systems (UAS). The registry system supports issuance, discovery, and verification of DETs, enabling secure identification and association of UAS and their operators. It also defines the interactions between different classes of registries (root, organizational, and individual) and their respective roles in maintaining the integrity of the registration data. This architecture enables decentralized, federated operation while supporting privacy, traceability, and regulatory compliance requirements in the context of UAS Remote ID and other services.</t>
    </abstract>
  </front>
  <middle>
    <?line 86?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Registries are fundamental to Unmanned Aircraft System (UAS) Remote Identification (RID). Only very limited operational information can be sent via Broadcast RID, but extended information is sometimes needed. The most essential element of information from RID is the UAS ID, the unique key for lookup of extended information in relevant registries (see <xref target="rfc9434-fig4"/>; Figure 4 of <xref target="RFC9434"/>).</t>
      <figure anchor="rfc9434-fig4">
        <name>Global UAS RID Usage Scenario (Figure 4 of RFC9434)</name>
        <artwork align="center"><![CDATA[
***************                                        ***************
*    UAS1     *                                        *     UAS2    *
*             *                                        *             *
* +--------+  *                 DAA/V2V                *  +--------+ *
* |   UA   o--*----------------------------------------*--o   UA   | *
* +--o--o--+  *                                        *  +--o--o--+ *
*    |  |     *   +------+      Lookups     +------+   *     |  |    *
*    |  |     *   | GPOD o------.    .------o PSOD |   *     |  |    *
*    |  |     *   +------+      |    |      +------+   *     |  |    *
*    |  |     *                 |    |                 *     |  |    *
* C2 |  |     *     V2I      ************     V2I      *     |  | C2 *
*    |  '-----*--------------*          *--------------*-----'  |    *
*    |        *              *          *              *        |    *
*    |        o====Net-RID===*          *====Net-RID===o        |    *
* +--o--+     *              * Internet *              *     +--o--+ *
* | GCS o-----*--------------*          *--------------*-----o GCS | *
* +-----+     * Registration *          * Registration *     +-----+ *
*             * (and UTM)    *          * (and UTM)    *             *
***************              ************              ***************
                               |  |  |
                +----------+   |  |  |   +----------+
                | Public   o---'  |  '---o Private  |
                | Registry |      |      | Registry |
                +----------+      |      +----------+
                               +--o--+
                               | DNS |
                               +-----+

DAA:  Detect And Avoid
GPOD: General Public Observer Device
PSOD: Public Safety Observer Device
V2I:  Vehicle-to-Infrastructure
V2V:  Vehicle-to-Vehicle
]]></artwork>
      </figure>
      <t>When a DRIP Entity Tag (DET) <xref target="RFC9374"/> is used as the UAS ID in RID, extended information can be retrieved from a DRIP Identity Management Entity (DIME), which manages registration of and associated lookups from DETs. In this document it is assumed the DIME is a function of UAS Service Suppliers (USS) (Appendix A.2 of <xref target="RFC9434"/>) but a DIME can be independent or handled by another entity as well.</t>
      <section anchor="general-concept">
        <name>General Concept</name>
        <t>DRIP Entity Tags (DETs) embed a hierarchy scheme which is mapped onto the Domain Name System (DNS) <xref target="STD13"/>. DIMEs enforce registration and information access of data associated with a DET while also providing the trust inherited from being a member of the hierarchy. Other identifiers and their methods are out of scope for this document.</t>
        <t>Authoritative Name Servers of the DNS provide the public information such as the cryptographic keys, endorsements and certificates of DETs and pointers to private information resources. Cryptographic (public) keys are used to authenticate anything signed by a DET, such as in the Authentication defined in <xref target="RFC9575"/> for Broadcast RID. Endorsements and certificates are used to endorse the claim of being part of the hierarchy.</t>
        <t>This document does not specify AAA mechanisms used by Private Information Registries to store and protect Personally Identifiable Information (PII).</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>The scope of this document is the DNS registration of DETs with the DNS delegation of the reverse domain of IPv6 Prefix, assigned by IANA for DETs <tt>2001:30::/28</tt> and RRsets used to handle DETs.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <section anchor="required-terminology">
        <name>Required Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="additional-definitions">
        <name>Additional Definitions</name>
        <t>This document makes use of the terms and abbreviations from previous DRIP documents. Below are subsets, grouped by original document, of terms used this document. Please see those documents for additional context, definitions and any further referenced material.</t>
        <t>From <xref section="2.2" sectionFormat="of" target="RFC9153"/> this document uses: AAA, CAA, GCS, ICAO, PII, Observer, Operator, UA, UAS, USS, and UTM.</t>
        <t>From <xref section="2" sectionFormat="of" target="RFC9434"/> this document uses: Certificate, DIME, and Endorsement.</t>
        <t>From <xref section="2" sectionFormat="of" target="RFC9374"/> this document uses: HDA, HID, and RAA.</t>
      </section>
    </section>
    <section anchor="det-hierarchy-in-dns">
      <name>DET Hierarchy in DNS</name>
      <t><xref target="RFC9374"/> defines the HHIT and further specifies an instance of them used for UAS RID called DETs. The HHIT/DET is a 128-bit value that is as an IPv6 address intended primarily as an identifier rather than locator. Its format is in <xref target="hhit-fig"/>, shown here for reference, and further information is in <xref target="RFC9374"/>.</t>
      <figure anchor="hhit-fig">
        <name>DRIP Entity Tag Breakdown</name>
        <artwork align="center"><![CDATA[
+-------------+--------------+---------------+-------------+
| IPv6 Prefix | Hierarchy ID | HHIT Suite ID | ORCHID Hash |
| (28 bits)   | (28 bits)    | (8 bits)      | (64 bits)   |
+-------------+--------------+---------------+-------------+
             /                \
            /                  \
           /                    \-----------------------------\
          /                                                    \
         /                                                      \
        +--------------------------------+-----------------------+
        | Registered Assigning Authority | HHIT Domain Authority |
        | (14 bits)                      | (14 bits)             |
        +--------------------------------+-----------------------+
]]></artwork>
      </figure>
      <t><xref target="RFC9374"/> assigns the IPv6 prefix <tt>2001:30::/28</tt> for DETs. Its corresponding domain name for reverse lookups is <tt>3.0.0.1.0.0.2.ip6.arpa.</tt>. The IAB has administrative control of this domain name.</t>
      <t>Due to the nature of the hierarchy split and its relationship to nibble reversing of the IPv6 address (Section 2.5 of <xref target="STD88"/>), the upper level of hierarchy (i.e., Registered Assigning Authority (RAA)) "borrows" the upper two bits of their respective HHIT Domain Authority (HDA) space for DNS delegation. As such the IPv6 prefix of RAAs are <tt>2001:3x:xxx0::/44</tt> and HDAs are <tt>2001:3x:xxxy:yy00::/56</tt> with respective nibble reverse domains of <tt>x.x.x.x.3.0.0.1.0.0.2.ip6.arpa.</tt> and <tt>y.y.y.x.x.x.x.3.0.0.1.0.0.2.ip6.arpa.</tt>.</t>
      <t>This document preallocates a subset of RAAs based on the ISO 3166-1 Numeric Nation Code <xref target="ISO3166-1"/>. This is to support the initial use case of DETs in UAS RID on an international level. See <xref target="iana-raa"/> for the RAA allocations.</t>
      <t>The HDA values of 0, 4096, 8192 and 12288 are reserved for operational use of an RAA (a by-product of the above mentioned borrowing of bits), specifically when to register with the apex and endorse delegations of HDAs in their namespace.</t>
      <t>The administration, management and policy for the operation of a DIME at any level in the hierarchy (Apex, RAA or HDA) is out of scope for this document. For RAAs or DETs allocated on a per-country basis, these considerations should be be determined by the appropriate national authorities, presumably the Civil Aviation Authority (CAA).</t>
      <section anchor="use-of-existing-dns-models">
        <name>Use of Existing DNS Models</name>
        <t>DRIP relies on the DNS and as such roughly follows the registrant-registrar-registry model. In the UAS ecosystem, the registrant would be the end user who owns/controls the Unmanned Aircraft. They are ultimately responsible for the DET and any other information that gets published in the DNS. Registrants use agents known as registrars to manage their interactions with the registry. Registrars typically provide optional additional services such as DNS hosting.</t>
        <t>The registry maintains a database of the registered domain names and their related metadata such as the contact details for domain name holder and the relevant registrar. The registry provides DNS service for the zone apex which contains delegation information for domain names. Registries generally provide services such RDAP <xref target="STD95"/> or equivalent to publish metadata about the registered domain names and their registrants and registrars.</t>
        <t>Registrants have contracts with registrars who in turn have contracts with registries. Payments follow this model too: the registrant buys services from a registrar who pays for services provided by the registry.</t>
        <t>By definition, there can only be one registry for a domain name. A registry can have an arbitrary number of registrars who compete with each other on price, service and customer support.</t>
        <section anchor="dns-model-considerations-for-dimes">
          <name>DNS Model Considerations for DIMEs</name>
          <figure anchor="dns-model-fig">
            <name>Example DRIP DNS Model</name>
            <artwork align="center"><![CDATA[
Apex
Registry/Registrar
(IANA)
                         +=========================+
                         | 3.0.0.1.0.0.2.ip6.arpa. |
                         +============o============+
                                      |
--------------------------------------|-------------------------
National                              |
Registries/Registrars                 |
(RAA)                                 |
                                      |
        +--------------+--------------o-+---------------+
        |              |                |               |
  +=====o====+    +====o=====+    +=====o====+    +=====o====+
  | 0.0.0.0. |    | 1.0.0.0. |    | 2.0.0.0. |    | 3.0.0.0. |
  +====o=====+    +====o=====+    +====o=====+    +====o=====+
                                       |
---------------------------------------|------------------------
Local                                  |
Registries/Registrars                  |
(HDA)                                  |
                                       |
        +--------------+---------------o--------...-----+
        |              |               |                |
  +=====o====+    +====o=====+    +====o=====+    +=====o====+
  |  1.0.0.  |    |  2.0.0.  |    |  3.0.0.  |    |  f.f.f.  |
  +====o=====+    +=====o====+    +====o=====+    +====o=====+
                                       |
---------------------------------------|------------------------
Local                                  |
Registrants                            |
                 +=====================o================+
                 | x.x.x.x.x.x.x.x.x.x.x.x.x.x.x.x.5.0. |
                 +======================================+
]]></artwork>
          </figure>
          <t>While the registrant-registrar-registry model is mature and well understood, it may not be appropriate for DRIP registrations in some circumstances. It could add costs and complexity; developing policies and contracts as outlined above. On the other hand, registries and registrars offer customer service/support and can provide the supporting infrastructure for reliable DNS and RDAP service.</t>
          <t>Another approach could be to handle DRIP registrations in a comparable way to how IP address space gets provisioned. Here, blocks of addresses get delegated to a "trusted" third party, typically an ISP, who then issues IP addresses to its customers. For DRIP, blocks of IP addresses could be delegated from the <tt>3.0.0.1.0.0.2.ip6.arpa.</tt> domain (reverse domain of prefix allocated by <xref target="RFC9374"/>) to an entity chosen by the appropriate Civil Aviation Authority (CAA). This third party would be responsible for the corresponding DNS and RDAP infrastructure for these IP address blocks. They would also provision the Hierarchical Host Identity Tag (HHIT, <xref target="RFC9374"/>) records for these IP addresses. In principle a manufacturer or vendor of UAS devices could provide that role. This is shown as an example in <xref target="dns-model-fig"/>.</t>
          <t>Dynamic DRIP registration is another possible solution, for example when the operator of a UAS device registers its corresponding HHIT record and other resources before a flight and deletes them afterwards. This may be feasible in controlled environments with well-behaved actors. However, this approach may not scale since each device is likely to need credentials for updating the IT infrastructure which provisions the DNS.</t>
          <t>Registration policies (pricing, renewals, registrar and registrant agreements, etc.) will need to be developed. These considerations should be determined by the CAA, perhaps in consultation with local stakeholders to assess the cost-benefits of these approaches (and others). All of these are out of scope for this document. The specifics for the UAS RID use case are detailed in the rest of document.</t>
        </section>
      </section>
    </section>
    <section anchor="dns">
      <name>Public Information Registry</name>
      <t>Per <xref target="RFC9434"/> all information classified as public is stored in the DNS, specifically Authoritative Name Servers, to satisfy REG-1 from <xref target="RFC9153"/>.</t>
      <t>Authoritative Name Servers use domain names as identifiers and data is stored in Resource Records (RR) with associated RRTypes. This document defines two new RRTypes, one for HHIT metadata (HHIT, <xref target="hhit-rr"/>) and another for UAS Broadcast RID information (BRID, <xref target="bcast-rr"/>). The former RRType is particularly important as it contains a URI (as part of the certificate) that points to Private Information resources.</t>
      <t>DETs, being IPv6 addresses, are to be under <tt>ip6.arpa.</tt> (nibble reversed per Section 2.5 of <xref target="STD88"/>) and MUST resolve to an HHIT RRType. Depending on local circumstances or additional use cases other RRTypes MAY be present (for example the inclusion of the DS RRTypes or equivalent when using DNSSEC). For UAS RID the BRID RRType MUST be present to provide the Broadcast Endorsements (BEs) defined in <xref section="3.1.2.1" sectionFormat="of" target="RFC9575"/>.</t>
      <t>DNSSEC MUST be used for apex entities (those which use a self-signed <tt>Canonical Registration Certificate</tt>) and is RECOMMENDED for other entities. When a DIME decides to use DNSSEC they SHOULD define a framework for cryptographic algorithms and key management <xref target="RFC6841"/>. This may be influenced by frequency of updates, size of the zone, and policies.</t>
      <t>UAS-specific information, such as physical characteristics, may also be stored in DNS but is out of scope for this document.</t>
      <t>A DET IPv6 address gets mapped into domain names using the scheme defined in Section 2.5 of <xref target="STD88"/>. However DNS lookups of these names query for HHIT and/or BRID resource records rather than the PTR resource records conventionally used in reverse lookups of IP addresses. For example, the HHIT resource record for the DET <tt>2001:30::1</tt> would be returned from a DNS lookup for the HHIT QTYPE for <tt>1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.1.0.0.2.ip6.arpa.</tt>.</t>
      <t>The HHIT RRType provides the public key for signature verification and URIs via the certificate. The BRID RRType provides static Broadcast RID information such as the Broadcast Endorsements sent following <xref target="RFC9575"/>.</t>
    </section>
    <section anchor="resource-records">
      <name>Resource Records</name>
      <section anchor="hhit-rr">
        <name>HHIT Resource Record</name>
        <t>The HHIT Resource Record (HHIT, RRType 67) is a metadata record for various bits of HHIT-specific information that isn't available in the pre-existing HIP RRType. The HHIT RRType does not replace the HIP RRType. The primary advantage of the HHIT RRType over the existing RRType is the mandatory inclusion of the <tt>Canonical Registration Certificate</tt> containing an entity's public key signed by the registrar, or other trust anchor, to confirm registration.</t>
        <t>The data MUST be encoded in CBOR <xref target="RFC8949"/> bytes. The CDDL <xref target="RFC8610"/> of the data is provided in <xref target="hhit-wire-cddl"/>.</t>
        <section anchor="hhit-rr-text">
          <name>Text Representation</name>
          <t>The data are represented in base64 <xref target="RFC4648"/> and may be divided into any number of white-space-separated substrings, down to single base64 digits, which are concatenated to obtain the full object. These substrings can span lines using the standard parenthesis. Note that the data has internal subfields but these do not appear in the master file representation; only a single logical base64 string will appear.</t>
          <section anchor="hhit-rr-presentation">
            <name>Presentation Representation</name>
            <t>The data MAY, for display purposes only, be represented using the Extended Diagnostic Notation as defined in Appendix G of <xref target="RFC8610"/>.</t>
          </section>
        </section>
        <section anchor="hhit-rr-fields">
          <name>Field Descriptions</name>
          <figure anchor="hhit-wire-cddl">
            <name>HHIT Wire Format CDDL</name>
            <artwork><![CDATA[
hhit-rr = [
    hhit-entity-type: uint,
    hid-abbreviation: tstr .size(15),
    canonical-registration-cert: bstr
]
]]></artwork>
          </figure>
          <t>All fields of the HHIT RRType MUST be included to be properly formed.</t>
          <dl>
            <dt>HHIT Entity Type:</dt>
            <dd>
              <t>The <tt>HHIT Entity Type</tt> field is a number with values defined in <xref target="iana-hhit-type"/>. It is envisioned that there may be many types of HHITs in use. In some cases, it may be helpful to understand the HHITs role in the ecosystem like described in <xref target="drip-dki"/>. This field provides such context. This field MAY provide a signal of additional information and/or different handling of the data beyond what is defined in this document.</t>
            </dd>
            <dt>HID Abbreviation:</dt>
            <dd>
              <t>The <tt>HID Abbreviation</tt> field is a string that provides an abbreviation to the HID structure of a DET for display devices. The convention for such abbreviations is a matter of local policy. Absent of such a policy, this field MUST be filled with the four character hexadecimal representations of the RAA and HDA (in that order) with a separator character such as a space. For example, a DET with an RAA value of 10 and HDA value of 20 would be abbreviated as: <tt>000A 0014</tt>.</t>
            </dd>
            <dt>Canonical Registration Certificate:</dt>
            <dd>
              <t>The <tt>Canonical Registration Certificate</tt> field is for a certificate endorsing registration of the DET. It MUST be encoded as X.509 DER <xref target="RFC5280"/>. This certificate MAY be self-signed when the entity is acting as a root of trust (i.e., an apex). Such self-signed behavior is defined by policy, such as in <xref target="drip-dki"/>, and is out of scope for this document. This certificate is part of chain of certificates that can be used to validate inclusion in the heirarchy.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="bcast-rr">
        <name>UAS Broadcast RID Resource Record</name>
        <t>The UAS Broadcast RID Resource Record (BRID, RRType 68) is a format to hold public information typically sent over UAS Broadcast RID that is static. It can act as a data source if information is not received over Broadcast RID or for cross validation. The primary function for DRIP is the inclusion of one or more Broadcast Endorsements as defined in <xref target="RFC9575"/> in the <tt>auth</tt> field. These Endorsements are generated by the registrar upon successful registration and broadcast by the entity.</t>
        <t>The data MUST be encoded in CBOR <xref target="RFC8949"/> bytes. The CDDL <xref target="RFC8610"/> of the data is provided in <xref target="bcast-wire-cddl"/>.</t>
        <section anchor="bcast-rr-text">
          <name>Text Representation</name>
          <t>The data are represented in base64 <xref target="RFC4648"/> and may be divided into any number of white-space-separated substrings, down to single base64 digits, which are concatenated to obtain the full object. These substrings can span lines using the standard parenthesis. Note that the data has internal subfields but these do not appear in the master file representation; only a single logical base64 string will appear.</t>
          <section anchor="bcast-rr-presentation">
            <name>Presentation Representation</name>
            <t>The data MAY, for display purposes only, be represented using the Extended Diagnostic Notation as defined in Appendix G of <xref target="RFC8610"/>. All byte strings longer than a length of 20 SHOULD be displayed as base64 when possible.</t>
          </section>
        </section>
        <section anchor="bcast-rr-fields">
          <name>Field Descriptions</name>
          <figure anchor="bcast-wire-cddl">
            <name>BRID Wire Format CDDL</name>
            <artwork><![CDATA[
bcast-rr = {
    uas_type => nibble-field,
    uas_ids => [+ uas-id-grp],
    ? auth => [+ auth-grp],
    ? self_id => self-grp,
    ? area => area-grp,
    ? classification => classification-grp,
    ? operator_id => operator-grp
}
uas-id-grp = [
    id_type: &uas-id-types, 
    uas_id: bstr .size(20)
]
auth-grp = [
    a_type: &auth-types,
    a_data: bstr .size(1..362)
]
area-grp = [
    area_count: 1..255,
    area_radius: float,  # in decameters
    area_floor: float,   # wgs84-hae in meters
    area_ceiling: float  # wgs84-hae in meters
]
classification-grp = [
    class_type: 0..8,
    class: nibble-field,
    category: nibble-field
]
self-grp = [
    desc_type: 0..255,
    description: tstr .size(23)
]
operator-grp = [
    operator_id_type: 0..255,
    operator_id: bstr .size(20)
]
uas-id-types = (none: 0, serial: 1, session_id: 4)
auth-types = (none: 0, specific_method: 5)
nibble-field = 0..15
uas_type = 0
uas_ids = 1
auth = 2
self_id = 3
area = 4
classification = 5
operator_id = 6
]]></artwork>
          </figure>
          <t>The field names and their general typing are borrowed from the ASTM <xref target="F3411"/> data dictionary (Table 1 and Table 2). See that document for additional context and background information on aviation application-specific interpretation of the field semantics. The explicitly enumerated values included in the CDDL above are relevant to DRIP for its operation. Other values may be valid but are outside the scope of DRIP operation. Application-specific fields, such as UAS Type are transported and authenticated by DRIP but are regarded as opaque user data to DRIP.</t>
        </section>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="det-prefix-delegation">
        <name>DET Prefix Delegation</name>
        <t>The reverse domain for the DET Prefix, i.e., <tt>3.0.0.1.0.0.2.ip6.arpa.</tt>, is managed by the IANA following the usual IANA rules. IANA will liaise, as needed, with the International Civil Aviation Organization (ICAO) to verify the authenticity of delegations to CAAs (see <xref target="iso-range"/>).</t>
      </section>
      <section anchor="iana-drip-registry">
        <name>IANA DRIP Registry</name>
        <section anchor="iana-raa">
          <name>DRIP RAA Allocations</name>
          <t>This document requests a new registry for RAA Allocations under the <eref target="https://www.iana.org/assignments/drip">DRIP registry group</eref> to be managed by IANA.</t>
          <dl>
            <dt>RAA Allocations:</dt>
            <dd>
              <t>a 14-bit value used to represent RAAs. Future additions to this registry are to be made based on the following range/policy table:</t>
            </dd>
          </dl>
          <table anchor="raa-ranges">
            <name>RAA Ranges</name>
            <thead>
              <tr>
                <th align="left">RAA Range</th>
                <th align="left">Allocation</th>
                <th align="left">Policy</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0 - 3</td>
                <td align="left">Reserved</td>
                <td align="left">N/A</td>
              </tr>
              <tr>
                <td align="left">4 - 3999</td>
                <td align="left">ISO 3166-1 Countries</td>
                <td align="left">IESG Approval (<xref section="4.10" sectionFormat="of" target="RFC8126"/>), <xref target="iso-range"/></td>
              </tr>
              <tr>
                <td align="left">4000 - 8191</td>
                <td align="left">Reserved</td>
                <td align="left">N/A</td>
              </tr>
              <tr>
                <td align="left">8192 - 15359</td>
                <td align="left">Unassigned</td>
                <td align="left">First Come First Served (<xref section="4.4" sectionFormat="of" target="RFC8126"/>)</td>
              </tr>
              <tr>
                <td align="left">15360 - 16383</td>
                <td align="left">Private Use</td>
                <td align="left">Private Use (<xref section="4.1" sectionFormat="of" target="RFC8126"/>), <xref target="experimental-range"/></td>
              </tr>
            </tbody>
          </table>
          <section anchor="raa-allocation-fields">
            <name>RAA Allocation Fields</name>
            <dl>
              <dt>Value:</dt>
              <dd>
                <t>The RAA value delegated for this entry.</t>
              </dd>
              <dt>Name:</dt>
              <dd>
                <t>Name of the delegated RAA. For the ISO 3166-1 Countries (<xref target="iso-range"/>), this should be the name of the country.</t>
              </dd>
              <dt>Policy Reference:</dt>
              <dd>
                <t>A publicly accessible link to the requirements for prospective HDA operators to register under this RAA. This field is OPTIONAL.</t>
              </dd>
              <dt>Contact:</dt>
              <dd>
                <t>Contact details of the administrator of this RAA that prospective HDAs operators can make informational queries to.</t>
              </dd>
            </dl>
          </section>
          <section anchor="raa-registration-form">
            <name>RAA Registration Form</name>
            <figure anchor="raa-form">
              <name>RAA Delegation Request Form</name>
              <artwork><![CDATA[
Value:
Name:
Policy Reference:
Contact:
NS RRType Content (HDA=0):
NS RRType Content (HDA=4096):
NS RRType Content (HDA=8192):
NS RRType Content (HDA=12288):
]]></artwork>
            </figure>
            <t>The <tt>NS RRType Content (HDA=X)</tt> fields are used by IANA to perform the DNS delegations under <tt>3.0.0.1.0.0.2.ip6.arpa.</tt>. See <xref target="nibble-split"/> for technical details.</t>
          </section>
          <section anchor="nibble-split">
            <name>Handling Nibble Split</name>
            <t>To support DNS delegation in <tt>3.0.0.1.0.0.2.ip6.arpa.</tt> a single RAA is given 4 delegations by borrowing the upper two bits of HDA space (see <xref target="raa-borrowing"/> for an example). This enables a clean nibble boundary in DNS to delegate from (i.e., the prefix <tt>2001:3x:xxx0::/44</tt>). These HDAs (0, 4096, 8192 and 12288) are reserved for the RAA.</t>
            <figure anchor="raa-borrowing">
              <name>Example Bit Borrowing of RAA=16376</name>
              <artwork align="center"><![CDATA[
 7 6 5 4 3 2 1 0 9 8 7 6 5 4 3 2 1 0 0 0 0 0 0 0 0 0 0 0
 2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 1 9 8 7 6 5 4 3 2 1 0
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|           0           | x |         RAA=16376         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    0   |   0   |   0   |   0   |   E   |   F   |   F     HDA=0,x=00
    0   |   0   |   0   |   1   |   E   |   F   |   F     HDA=4096,x=01
    0   |   0   |   0   |   2   |   E   |   F   |   F     HDA=8192,x=10
    0   |   0   |   0   |   3   |   E   |   F   |   F     HDA=12288,x=11
]]></artwork>
            </figure>
          </section>
          <section anchor="iso-range">
            <name>ISO 3166-1 Countries Range</name>
            <t>The mapping between ISO 3166-1 Numeric Nation Codes and RAAs is specified and documented by IANA. Each Nation is assigned four RAAs that are left to the national authority for their purpose. For RAAs under this range, a shorter prefix of <tt>2001:3x:xx00::/40</tt> MAY be delegated to each CAA, which covers all 4 RAAs (and reserved HDAs) assigned to them.</t>
            <t>This range is set to IESG Approval (<xref section="4.10" sectionFormat="of" target="RFC8126"/>) and IANA will liaise with the ICAO to verify the authenticity of delegation requests (using <xref target="raa-form"/>) by CAAs.</t>
            <ul empty="true">
              <li>
                <t>The CSV file found for the ISO to RAA mapping is on <eref target="https://github.com/ietf-wg-drip/draft-ietf-drip-registries/commit/a8da51bfcafcdf91878f8862c52830aa736782c9">GitHub</eref>. RFC Editor, please remove this note after IANA initializes the registry but before publication.</t>
              </li>
            </ul>
          </section>
          <section anchor="experimental-range">
            <name>Private Range</name>
            <t><xref target="RFC1918"/> specifies safe use of private IPv4 addresses. One aspect is that such addresses should never appear in the source or destination address fields of an IPv4 packet on the global Internet, but only within private networks with ingress/egress controls at their Internet gateways. Another aspect is that if nibble-reversed lookup in DNS is desired it can only provided by private DNS servers as zone delegations from the global root will not be performed for this address range. HHITs generally and DETs specifically share these aspects. Thus the RAAs (with its subordinate HDAs) in this range may be used in like manner and IANA will not delegate any value in this range to any party (as per Private Use, <xref section="4.1" sectionFormat="of" target="RFC8126"/>).</t>
            <t>One anticipated acceptable use of the private range is for experimentation and testing prior to request allocation or assignment from IANA.</t>
          </section>
        </section>
        <section anchor="iana-hhit-type">
          <name>HHIT Entity Type</name>
          <t>This document requests a new registry for HHIT Entity Type under the <eref target="https://www.iana.org/assignments/drip">DRIP registry group</eref>.</t>
          <dl>
            <dt>HHIT Entity Type:</dt>
            <dd>
              <t>numeric, field of the HHIT RRType to encode the HHIT Entity Type. All entries in this registry are under a First Come First Served (<xref section="4.4" sectionFormat="of" target="RFC8126"/>) policy.</t>
            </dd>
          </dl>
          <section anchor="hhit-type-registry-fields">
            <name>HHIT Type Registry Fields</name>
            <dl>
              <dt>Value:</dt>
              <dd>
                <t>HHIT Type value of entry.</t>
              </dd>
              <dt>HHIT Type:</dt>
              <dd>
                <t>Name of the entry and optional abbreviation.</t>
              </dd>
              <dt>Reference:</dt>
              <dd>
                <t>Public document allocating the value and any additional information such as semantics. This can be a URL pointing to an Internet-Draft, IETF RFC, or web-page among others.</t>
              </dd>
            </dl>
          </section>
          <section anchor="hhit-type-registration-form">
            <name>HHIT Type Registration Form</name>
            <figure anchor="hhit-form">
              <name>HHIT Type Registration Form</name>
              <artwork><![CDATA[
Value:
HHIT Type:
Reference:
]]></artwork>
            </figure>
          </section>
          <section anchor="initial-values">
            <name>Initial Values</name>
            <t>The following values are defined by this document:</t>
            <table anchor="hhit-initial">
              <name>HHIT Entity Type Initial Values</name>
              <thead>
                <tr>
                  <th align="left">Value</th>
                  <th align="left">HHIT Type</th>
                  <th align="left">Reference</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left">0</td>
                  <td align="left">Not Defined</td>
                  <td align="left">This RFC</td>
                </tr>
                <tr>
                  <td align="left">1</td>
                  <td align="left">DRIP Identity Management Entity (DIME)</td>
                  <td align="left">This RFC</td>
                </tr>
                <tr>
                  <td align="left">5</td>
                  <td align="left">Apex</td>
                  <td align="left">This RFC</td>
                </tr>
                <tr>
                  <td align="left">9</td>
                  <td align="left">Registered Assigning Authority (RAA)</td>
                  <td align="left">This RFC</td>
                </tr>
                <tr>
                  <td align="left">13</td>
                  <td align="left">HHIT Domain Authority (HDA)</td>
                  <td align="left">This RFC</td>
                </tr>
                <tr>
                  <td align="left">16</td>
                  <td align="left">Unmanned Aircraft (UA)</td>
                  <td align="left">This RFC</td>
                </tr>
                <tr>
                  <td align="left">17</td>
                  <td align="left">Ground Control Station (GCS)</td>
                  <td align="left">This RFC</td>
                </tr>
                <tr>
                  <td align="left">18</td>
                  <td align="left">Unmanned Aircraft System (UAS)</td>
                  <td align="left">This RFC</td>
                </tr>
                <tr>
                  <td align="left">19</td>
                  <td align="left">Remote Identification (RID) Module</td>
                  <td align="left">This RFC</td>
                </tr>
                <tr>
                  <td align="left">20</td>
                  <td align="left">Pilot</td>
                  <td align="left">This RFC</td>
                </tr>
                <tr>
                  <td align="left">21</td>
                  <td align="left">Operator</td>
                  <td align="left">This RFC</td>
                </tr>
                <tr>
                  <td align="left">22</td>
                  <td align="left">Discovery &amp; Synchronization Service (DSS)</td>
                  <td align="left">This RFC</td>
                </tr>
                <tr>
                  <td align="left">23</td>
                  <td align="left">UAS Service Supplier (USS)</td>
                  <td align="left">This RFC</td>
                </tr>
                <tr>
                  <td align="left">24</td>
                  <td align="left">Network RID Service Provider (SP)</td>
                  <td align="left">This RFC</td>
                </tr>
                <tr>
                  <td align="left">25</td>
                  <td align="left">Network RID Display Provider (DP)</td>
                  <td align="left">This RFC</td>
                </tr>
                <tr>
                  <td align="left">26</td>
                  <td align="left">Supplemental Data Service Provider (SDSP)</td>
                  <td align="left">This RFC</td>
                </tr>
                <tr>
                  <td align="left">27</td>
                  <td align="left">Crowd Sourced RID Finder</td>
                  <td align="left">This RFC</td>
                </tr>
              </tbody>
            </table>
          </section>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="dns-operational-registration-considerations">
        <name>DNS Operational &amp; Registration Considerations</name>
        <t>The Registrar and Registry are commonly used concepts in the DNS. These components interface the DIME into the DNS hierarchy and thus operation SHOULD follow best common practices, specifically in security (such as running DNSSEC) as appropriate. <xref target="BCP237"/> provides suitable guidance.</t>
        <t>If DNSSEC is used, a DNSSEC Practice Statement SHOULD be developed and published. It SHOULD explain how DNSSEC has been deployed and what security measures are in place. <xref target="RFC6841"/> documents a Framework for DNSSEC Policies and DNSSEC Practice Statements. A self-signed entity (i.e. an entity that self-signed it certificate as part of the HHIT RRType) MUST use DNSSEC.</t>
        <t>The interfaces and protocol specifications for registry-registrar interactions are intentionally not specified in this document. These will depend on nationally defined policy and prevailing local circumstances. It is expected registry-registrar activity will use the Extensible Provisioning Protocol (EPP) <xref target="STD69"/> or equivalent. The registry SHOULD provide a lookup service such as RDAP <xref target="STD95"/> or equivalent to publish public information about registered domain names.</t>
        <t>Decisions about DNS or registry best practices and other operational matters that influence security SHOULD be made by the CAA, ideally in consultation with local stakeholders.</t>
        <t>The guidance above is intended to reduce the likelihood of interoperability problems and minimize security and stability concerns. For instance, validation and authentication of DNS responses depends on DNSSEC. If this is not used, entities using DRIP will be vulnerable to DNS spoofing attacks and could be exposed to bogus data. DRIP DNS responses that have not been validated by DNSSEC could contain bogus data which have the potential to create serious security problems and operational concerns for DRIP entities. These threats include denial of service attacks, replay attacks, impersonation or cloning of UAVs, hijacking of DET registrations, injection of corrupt metadata and compromising established trust architecture/relationships. Some regulatory and legal considerations are expected to be simplified by providing a lookup service for access to public information about registered domain names for DETs.</t>
        <t>When DNSSEC is not in use, due to the length of the ORCHID hash selected for DETs (<xref section="3.5" sectionFormat="of" target="RFC9374"/>), clients MUST "walk" the tree of certificates locating each certificate by performing DNS lookups of HHIT RRTypes for each DET verifying inclusion into the hierarchy. The collection of these certificates (which provide both signature protection from the parent entity and the public key of the entity) is the only way without DNSSEC to prove valid registration. The data within the BRID RRType has no direct endorsement when not protected by DNSSEC. The contents of the BRID RRType <tt>auth</tt> key, containing the Endorsements, SHOULD be validated, similiar to the certificates mentioned previously when access to them are unavailable.</t>
      </section>
      <section anchor="det-public-key-exposure">
        <name>DET &amp; Public Key Exposure</name>
        <t>DETs are built upon asymmetric keys. As such the public key must be revealed to enable clients to perform signature verifications. <xref target="RFC9374"/> security considerations cover various attacks on such keys. While unlikely, the forging of a corresponding private key is possible if given enough time (and computational power).</t>
        <t>When practical, it is RECOMMENDED that no RRTypes under a DET's specific domain name be published unless and until it is required for use by other parties. Such action would cause at least the HHIT RRType to not be in DNS, protecting the public key in the certificate from being exposed before its needed. The combination of this "just in time" publishing mechanism and DNSSEC is out of scope for this document.</t>
        <t>Optimally this requires that the UAS somehow signal the DIME that a flight using a Specific Session ID will soon be underway or complete. It may also be facilitated under UTM if the USS (which may or may not be a DIME) signals when a given operation using a Session ID goes active.</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT Consulting, LLC) for their early work on the DRIP registries concept. Their early contributions laid the foundations for the content and processes of this architecture and document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9374">
          <front>
            <title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking.</t>
              <t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs). HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement.</t>
              <t>This document updates RFCs 7401 and 7343.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9374"/>
          <seriesInfo name="DOI" value="10.17487/RFC9374"/>
        </reference>
        <reference anchor="F3411" target="https://www.astm.org/f3411-22a.html">
          <front>
            <title>Standard Specification for Remote ID and Tracking</title>
            <author>
              <organization>ASTM International</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
          <seriesInfo name="ASTM" value="F3411-22A"/>
          <seriesInfo name="DOI" value="10.1520/F3411-22A"/>
        </reference>
        <reference anchor="ISO3166-1" target="https://www.iso.org/iso-3166-country-codes.html">
          <front>
            <title>Codes for the representation of names of countries and their subdivisions</title>
            <author>
              <organization>International Standards Organization (ISO)</organization>
            </author>
            <date year="2020" month="August"/>
          </front>
          <seriesInfo name="ISO" value="3166-1:2020"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="drip-dki">
          <front>
            <title>The DRIP DET public Key Infrastructure</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Stuart W. Card" initials="S. W." surname="Card">
              <organization>AX Enterprize, LLC</organization>
            </author>
            <date day="22" month="April" year="2025"/>
            <abstract>
              <t>   The DRIP Entity Tag (DET) public Key Infrastructure (DKI) is a
   specific variant of classic Public Key Infrastructures (PKI) where
   the organization is around the DET, in place of X.520 Distinguished
   Names.  Further, the DKI uses DRIP Endorsements in place of X.509
   certificates for establishing trust within the DKI.

   There are two X.509 profiles for shadow PKI behind the DKI, with many
   of their X.509 fields mirroring content in the DRIP Endorsements.
   These PKIs can at times be used where X.509 is expected and non-
   constrained communication links are available that can handle their
   larger size.  It is recommended that a DRIP deployment implement both
   of these along side the Endorsement trees.

   C509 (CBOR) encoding of all X.509 certificates are also provided as
   an alternative for where there are gains in reduced object size.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-drip-dki-08"/>
        </reference>
        <referencegroup anchor="BCP237" target="https://www.rfc-editor.org/info/bcp237">
          <reference anchor="RFC9364" target="https://www.rfc-editor.org/info/rfc9364">
            <front>
              <title>DNS Security Extensions (DNSSEC)</title>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <date month="February" year="2023"/>
              <abstract>
                <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="237"/>
            <seriesInfo name="RFC" value="9364"/>
            <seriesInfo name="DOI" value="10.17487/RFC9364"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="STD13" target="https://www.rfc-editor.org/info/std13">
          <reference anchor="RFC1034" target="https://www.rfc-editor.org/info/rfc1034">
            <front>
              <title>Domain names - concepts and facilities</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1034"/>
            <seriesInfo name="DOI" value="10.17487/RFC1034"/>
          </reference>
          <reference anchor="RFC1035" target="https://www.rfc-editor.org/info/rfc1035">
            <front>
              <title>Domain names - implementation and specification</title>
              <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
              <date month="November" year="1987"/>
              <abstract>
                <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="13"/>
            <seriesInfo name="RFC" value="1035"/>
            <seriesInfo name="DOI" value="10.17487/RFC1035"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="STD69" target="https://www.rfc-editor.org/info/std69">
          <reference anchor="RFC5730" target="https://www.rfc-editor.org/info/rfc5730">
            <front>
              <title>Extensible Provisioning Protocol (EPP)</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes an application-layer client-server protocol for the provisioning and management of objects stored in a shared central repository. Specified in XML, the protocol defines generic object management operations and an extensible framework that maps protocol operations to objects. This document includes a protocol specification, an object mapping template, and an XML media type registration. This document obsoletes RFC 4930. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5730"/>
            <seriesInfo name="DOI" value="10.17487/RFC5730"/>
          </reference>
          <reference anchor="RFC5731" target="https://www.rfc-editor.org/info/rfc5731">
            <front>
              <title>Extensible Provisioning Protocol (EPP) Domain Name Mapping</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet domain names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to domain names. This document obsoletes RFC 4931. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5731"/>
            <seriesInfo name="DOI" value="10.17487/RFC5731"/>
          </reference>
          <reference anchor="RFC5732" target="https://www.rfc-editor.org/info/rfc5732">
            <front>
              <title>Extensible Provisioning Protocol (EPP) Host Mapping</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of Internet host names stored in a shared central repository. Specified in XML, the mapping defines EPP command syntax and semantics as applied to host names. This document obsoletes RFC 4932. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5732"/>
            <seriesInfo name="DOI" value="10.17487/RFC5732"/>
          </reference>
          <reference anchor="RFC5733" target="https://www.rfc-editor.org/info/rfc5733">
            <front>
              <title>Extensible Provisioning Protocol (EPP) Contact Mapping</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes an Extensible Provisioning Protocol (EPP) mapping for the provisioning and management of individual or organizational social information identifiers (known as "contacts") stored in a shared central repository. Specified in Extensible Markup Language (XML), the mapping defines EPP command syntax and semantics as applied to contacts. This document obsoletes RFC 4933. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5733"/>
            <seriesInfo name="DOI" value="10.17487/RFC5733"/>
          </reference>
          <reference anchor="RFC5734" target="https://www.rfc-editor.org/info/rfc5734">
            <front>
              <title>Extensible Provisioning Protocol (EPP) Transport over TCP</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <date month="August" year="2009"/>
              <abstract>
                <t>This document describes how an Extensible Provisioning Protocol (EPP) session is mapped onto a single Transmission Control Protocol (TCP) connection. This mapping requires use of the Transport Layer Security (TLS) protocol to protect information exchanged between an EPP client and an EPP server. This document obsoletes RFC 4934. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="69"/>
            <seriesInfo name="RFC" value="5734"/>
            <seriesInfo name="DOI" value="10.17487/RFC5734"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="STD95" target="https://www.rfc-editor.org/info/std95">
          <reference anchor="RFC7480" target="https://www.rfc-editor.org/info/rfc7480">
            <front>
              <title>HTTP Usage in the Registration Data Access Protocol (RDAP)</title>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <author fullname="B. Ellacott" initials="B." surname="Ellacott"/>
              <author fullname="N. Kong" initials="N." surname="Kong"/>
              <date month="March" year="2015"/>
              <abstract>
                <t>This document is one of a collection that together describes the Registration Data Access Protocol (RDAP). It describes how RDAP is transported using the Hypertext Transfer Protocol (HTTP). RDAP is a successor protocol to the very old WHOIS protocol. The purpose of this document is to clarify the use of standard HTTP mechanisms for this application.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="7480"/>
            <seriesInfo name="DOI" value="10.17487/RFC7480"/>
          </reference>
          <reference anchor="RFC7481" target="https://www.rfc-editor.org/info/rfc7481">
            <front>
              <title>Security Services for the Registration Data Access Protocol (RDAP)</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="N. Kong" initials="N." surname="Kong"/>
              <date month="March" year="2015"/>
              <abstract>
                <t>The Registration Data Access Protocol (RDAP) provides "RESTful" web services to retrieve registration metadata from Domain Name and Regional Internet Registries. This document describes information security services, including access control, authentication, authorization, availability, data confidentiality, and data integrity for RDAP.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="7481"/>
            <seriesInfo name="DOI" value="10.17487/RFC7481"/>
          </reference>
          <reference anchor="RFC9082" target="https://www.rfc-editor.org/info/rfc9082">
            <front>
              <title>Registration Data Access Protocol (RDAP) Query Format</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <date month="June" year="2021"/>
              <abstract>
                <t>This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). This document obsoletes RFC 7482.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9082"/>
            <seriesInfo name="DOI" value="10.17487/RFC9082"/>
          </reference>
          <reference anchor="RFC9083" target="https://www.rfc-editor.org/info/rfc9083">
            <front>
              <title>JSON Responses for the Registration Data Access Protocol (RDAP)</title>
              <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck"/>
              <author fullname="A. Newton" initials="A." surname="Newton"/>
              <date month="June" year="2021"/>
              <abstract>
                <t>This document describes JSON data structures representing registration information maintained by Regional Internet Registries (RIRs) and Domain Name Registries (DNRs). These data structures are used to form Registration Data Access Protocol (RDAP) query responses. This document obsoletes RFC 7483.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9083"/>
            <seriesInfo name="DOI" value="10.17487/RFC9083"/>
          </reference>
          <reference anchor="RFC9224" target="https://www.rfc-editor.org/info/rfc9224">
            <front>
              <title>Finding the Authoritative Registration Data Access Protocol (RDAP) Service</title>
              <author fullname="M. Blanchet" initials="M." surname="Blanchet"/>
              <date month="March" year="2022"/>
              <abstract>
                <t>This document specifies a method to find which Registration Data Access Protocol (RDAP) server is authoritative to answer queries for a requested scope, such as domain names, IP addresses, or Autonomous System numbers. This document obsoletes RFC 7484.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="95"/>
            <seriesInfo name="RFC" value="9224"/>
            <seriesInfo name="DOI" value="10.17487/RFC9224"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="STD88" target="https://www.rfc-editor.org/info/std88">
          <reference anchor="RFC3596" target="https://www.rfc-editor.org/info/rfc3596">
            <front>
              <title>DNS Extensions to Support IP Version 6</title>
              <author fullname="S. Thomson" initials="S." surname="Thomson"/>
              <author fullname="C. Huitema" initials="C." surname="Huitema"/>
              <author fullname="V. Ksinant" initials="V." surname="Ksinant"/>
              <author fullname="M. Souissi" initials="M." surname="Souissi"/>
              <date month="October" year="2003"/>
              <abstract>
                <t>This document defines the changes that need to be made to the Domain Name System (DNS) to support hosts running IP version 6 (IPv6). The changes include a resource record type to store an IPv6 address, a domain to support lookups based on an IPv6 address, and updated definitions of existing query types that return Internet addresses as part of additional section processing. The extensions are designed to be compatible with existing applications and, in particular, DNS implementations themselves. [STANDARDS-TRACK]</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="88"/>
            <seriesInfo name="RFC" value="3596"/>
            <seriesInfo name="DOI" value="10.17487/RFC3596"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC1918">
          <front>
            <title>Address Allocation for Private Internets</title>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <author fullname="B. Moskowitz" initials="B." surname="Moskowitz"/>
            <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
            <author fullname="G. J. de Groot" initials="G. J." surname="de Groot"/>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <date month="February" year="1996"/>
            <abstract>
              <t>This document describes address allocation for private internets. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="5"/>
          <seriesInfo name="RFC" value="1918"/>
          <seriesInfo name="DOI" value="10.17487/RFC1918"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6841">
          <front>
            <title>A Framework for DNSSEC Policies and DNSSEC Practice Statements</title>
            <author fullname="F. Ljunggren" initials="F." surname="Ljunggren"/>
            <author fullname="AM. Eklund Lowinder" initials="AM." surname="Eklund Lowinder"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document presents a framework to assist writers of DNS Security Extensions (DNSSEC) Policies and DNSSEC Practice Statements, such as domain managers and zone operators on both the top level and secondary level, who are managing and operating a DNS zone with Security Extensions implemented.</t>
              <t>In particular, the framework provides a comprehensive list of topics that should be considered for inclusion into a DNSSEC Policy definition and Practice Statement. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6841"/>
          <seriesInfo name="DOI" value="10.17487/RFC6841"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9153">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
            <author fullname="S. Card" initials="S." role="editor" surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9153"/>
          <seriesInfo name="DOI" value="10.17487/RFC9153"/>
        </reference>
        <reference anchor="RFC9434">
          <front>
            <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <author fullname="S. Zhao" initials="S." role="editor" surname="Zhao"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture for protocols and services to support Unmanned Aircraft System Remote Identification and tracking (UAS RID), plus UAS-RID-related communications. This architecture adheres to the requirements listed in the Drone Remote Identification Protocol (DRIP) Requirements document (RFC 9153).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9434"/>
          <seriesInfo name="DOI" value="10.17487/RFC9434"/>
        </reference>
        <reference anchor="RFC9575">
          <front>
            <title>DRIP Entity Tag (DET) Authentication Formats and Protocols for Broadcast Remote Identification (RID)</title>
            <author fullname="A. Wiethuechter" initials="A." role="editor" surname="Wiethuechter"/>
            <author fullname="S. Card" initials="S." surname="Card"/>
            <author fullname="R. Moskowitz" initials="R." surname="Moskowitz"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>The Drone Remote Identification Protocol (DRIP), plus trust policies and periodic access to registries, augments Unmanned Aircraft System (UAS) Remote Identification (RID), enabling local real-time assessment of trustworthiness of received RID messages and observed UAS, even by Observers lacking Internet access. This document defines DRIP message types and formats to be sent in Broadcast RID Authentication Messages to verify that attached and recently detached messages were signed by the registered owner of the DRIP Entity Tag (DET) claimed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9575"/>
          <seriesInfo name="DOI" value="10.17487/RFC9575"/>
        </reference>
      </references>
    </references>
    <?line 549?>

<section anchor="example-zone-files-rrtype-contents">
      <name>Example Zone Files &amp; RRType Contents</name>
      <t>An example zone file <tt>ip6.arpa.</tt>, run by IANA, is not shown. It would contain NS RRTypes to delegate to a respective RAA. To avoid any future collisions with production deployments an apex of <tt>ip6.example.com.</tt> is used instead of <tt>ip6.arpa.</tt>. All hexadecimal strings in the examples are broken into the lengths of a word, for document formatting purposes.</t>
      <t>An RAA with a HID of <tt>RAA=16376, HDA=0</tt> and HDA with a the HID <tt>RAA=16376, HDA=10</tt> were used in the examples.</t>
      <section anchor="example-raa">
        <name>Example RAA</name>
        <section anchor="raa-hhits">
          <name>Authentication HHIT</name>
          <figure anchor="raa-rr-zone">
            <name>RAA Auth HHIT RRType Example</name>
            <artwork><![CDATA[
$ORIGIN 5.0.0.0.0.0.e.f.f.3.0.0.1.0.0.2.ip6.example.com.
7.b.0.a.1.9.e.1.7.5.1.a.0.6.e.5. IN HHIT (
    gwppM2ZmOCAwMDAwWQFGMIIBQjCB9aAD
    AgECAgE1MAUGAytlcDArMSkwJwYDVQQD
    DCAyMDAxMDAzZmZlMDAwMDA1NWU2MGEx
    NTcxZTkxYTBiNzAeFw0yNTA0MDkyMDU2
    MjZaFw0yNTA0MDkyMTU2MjZaMB0xGzAZ
    BgNVBAMMEkRSSVAtUkFBLUEtMTYzNzYt
    MDAqMAUGAytlcAMhAJmQ1bBLcqGAZtQJ
    K1LH1JlPt8Fr1+jB9ED/qNBP8eE/o0ww
    SjAPBgNVHRMBAf8EBTADAQH/MDcGA1Ud
    EQEB/wQtMCuHECABAD/+AAAFXmChVx6R
    oLeGF2h0dHBzOi8vcmFhLmV4YW1wbGUu
    Y29tMAUGAytlcANBALUPjhIB3rwqXQep
    r9/VDB+hhtwuWZIw1OUkEuDrF6DCkgc7
    5widXnXa5/uDfdKL7dZ83mPHm2Tf32Dv
    b8AzEw8=
)
]]></artwork>
          </figure>
          <t><xref target="raa-rr-cbor"/> shows the CBOR decoded RDATA in the HHIT RRType found in <xref target="raa-rr-zone"/>.</t>
          <figure anchor="raa-rr-cbor">
            <name>2001:3f:fe00:5:5e60:a157:1e91:a0b7 Decoded HHIT RRType CBOR</name>
            <artwork><![CDATA[
[
    10,  # Reserved (RAA Auth from DKI)
    "3ff8 0000",
    h'308201423081F5A00302010202013530
    0506032B6570302B312930270603550403
    0C20323030313030336666653030303030
    3535653630613135373165393161306237
    301E170D3235303430393230353632365A
    170D3235303430393231353632365A301D
    311B301906035504030C12445249502D52
    41412D412D31363337362D30302A300506
    032B65700321009990D5B04B72A18066D4
    092B52C7D4994FB7C16BD7E8C1F440FFA8
    D04FF1E13FA34C304A300F0603551D1301
    01FF040530030101FF30370603551D1101
    01FF042D302B87102001003FFE0000055E
    60A1571E91A0B7861768747470733A2F2F
    7261612E6578616D706C652E636F6D3005
    06032B6570034100B50F8E1201DEBC2A5D
    07A9AFDFD50C1FA186DC2E599230D4E524
    12E0EB17A0C292073BE7089D5E75DAE7FB
    837DD28BEDD67CDE63C79B64DFDF60EF6F
    C033130F'
]
]]></artwork>
          </figure>
          <t><xref target="raa-rr-cert"/> shows the decoded DER X.509 found in <xref target="raa-rr-cbor"/>.</t>
          <figure anchor="raa-rr-cert">
            <name>2001:3f:fe00:5:5e60:a157:1e91:a0b7 Decoded Certificate</name>
            <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 53 (0x35)
        Signature Algorithm: ED25519
        Issuer: CN = 2001003ffe0000055e60a1571e91a0b7
        Validity
            Not Before: Apr  9 20:56:26 2025 GMT
            Not After : Apr  9 21:56:26 2025 GMT
        Subject: CN = DRIP-RAA-A-16376-0
        Subject Public Key Info:
            Public Key Algorithm: ED25519
                ED25519 Public-Key:
                pub:
                    99:90:d5:b0:4b:72:a1:80:66:d4:09:2b:52:c7:d4:
                    99:4f:b7:c1:6b:d7:e8:c1:f4:40:ff:a8:d0:4f:f1:
                    e1:3f
        X509v3 extensions:
            X509v3 Basic Constraints: critical
                CA:TRUE
            X509v3 Subject Alternative Name: critical
                IP Address:2001:3F:FE00:5:5E60:A157:1E91:A0B7,
                URI:https://raa.example.com
    Signature Algorithm: ED25519
    Signature Value:
        b5:0f:8e:12:01:de:bc:2a:5d:07:a9:af:df:d5:0c:1f:a1:86:
        dc:2e:59:92:30:d4:e5:24:12:e0:eb:17:a0:c2:92:07:3b:e7:
        08:9d:5e:75:da:e7:fb:83:7d:d2:8b:ed:d6:7c:de:63:c7:9b:
        64:df:df:60:ef:6f:c0:33:13:0f
]]></artwork>
          </figure>
        </section>
        <section anchor="delegation-of-hda">
          <name>Delegation of HDA</name>
          <figure>
            <name>HDA Delegation Example</name>
            <artwork><![CDATA[
$ORIGIN c.d.f.f.3.0.0.1.0.0.2.ip6.example.com.
a.0.0. IN NS ns1.hda-10.example.com
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="example-hda">
        <name>Example HDA</name>
        <section anchor="hda-hhits">
          <name>Authentication &amp; Issue HHITs</name>
          <figure anchor="hda-rr-zone">
            <name>HDA Auth/Issue HHIT RRType Example</name>
            <artwork><![CDATA[
$ORIGIN 5.0.a.0.0.0.e.f.f.3.0.0.1.0.0.2.ip6.example.com.
0.a.9.0.7.2.4.d.5.4.e.e.5.1.6.6.5.0. IN HHIT (
    gw5pM2ZmOCAwMDBhWQFHMIIBQzCB9qAD
    AgECAgFfMAUGAytlcDArMSkwJwYDVQQD
    DCAyMDAxMDAzZmZlMDAwMDA1NWU2MGEx
    NTcxZTkxYTBiNzAeFw0yNTA0MDkyMTAz
    MTlaFw0yNTA0MDkyMjAzMTlaMB4xHDAa
    BgNVBAMME0RSSVAtSERBLUEtMTYzNzYt
    MTAwKjAFBgMrZXADIQDOaB424RQa61YN
    bna8eWt7fLRU5GPMsfEt4wo4AQGAP6NM
    MEowDwYDVR0TAQH/BAUwAwEB/zA3BgNV
    HREBAf8ELTArhxAgAQA//gAKBWYV7kXU
    JwmghhdodHRwczovL3JhYS5leGFtcGxl
    LmNvbTAFBgMrZXADQQAhMpOSOmgMkJY1
    f+B9nTgawUjK4YEERBtczMknHDkOowX0
    ynbaLN60TYe9hqN6+CJ3SN8brJke3hpM
    gorvhDkJ
)
8.2.e.6.5.2.b.6.7.3.4.d.e.0.6.2.5.0. IN HHIT (
    gw9pM2ZmOCAwMDBhWQFHMIIBQzCB9qAD
    AgECAgFYMAUGAytlcDArMSkwJwYDVQQD
    DCAyMDAxMDAzZmZlMDAwYTA1NjYxNWVl
    NDVkNDI3MDlhMDAeFw0yNTA0MDkyMTA1
    MTRaFw0yNTA0MDkyMjA1MTRaMB4xHDAa
    BgNVBAMME0RSSVAtSERBLUktMTYzNzYt
    MTAwKjAFBgMrZXADIQCCM/2utQaLwUhZ
    0ROg7fz43AeBTj3Sdl5rW4LgTQcFl6NM
    MEowDwYDVR0TAQH/BAUwAwEB/zA3BgNV
    HREBAf8ELTArhxAgAQA//gAKBSYO1Ddr
    JW4ohhdodHRwczovL2hkYS5leGFtcGxl
    LmNvbTAFBgMrZXADQQBa8lZyftxHJqDF
    Vgv4Rt+cMUmc8aQwet4UZdO3yQOB9uq4
    sLVAScaZCWjC0nmeRkgVRhize1esfyi3
    RRU44IAE
)
]]></artwork>
          </figure>
          <t><xref target="hdaa-rr-cbor"/> shows the CBOR decoded RDATA in the HHIT RRType found in <xref target="hda-rr-zone"/>.</t>
          <figure anchor="hdaa-rr-cbor">
            <name>2001:3f:fe00:a05:6615:ee45:d427:9a0 Decoded HHIT RRType CBOR</name>
            <artwork><![CDATA[
[
    14,  # Reserved (HDA Auth from DKI)
    "3ff8 000a",
    h'308201433081F6A00302010202015F30
    0506032B6570302B312930270603550403
    0C20323030313030336666653030303030
    3535653630613135373165393161306237
    301E170D3235303430393231303331395A
    170D3235303430393232303331395A301E
    311C301A06035504030C13445249502D48
    44412D412D31363337362D3130302A3005
    06032B6570032100CE681E36E1141AEB56
    0D6E76BC796B7B7CB454E463CCB1F12DE3
    0A380101803FA34C304A300F0603551D13
    0101FF040530030101FF30370603551D11
    0101FF042D302B87102001003FFE000A05
    6615EE45D42709A0861768747470733A2F
    2F7261612E6578616D706C652E636F6D30
    0506032B6570034100213293923A680C90
    96357FE07D9D381AC148CAE18104441B5C
    CCC9271C390EA305F4CA76DA2CDEB44D87
    BD86A37AF8227748DF1BAC991EDE1A4C82
    8AEF843909'
]
]]></artwork>
          </figure>
          <t><xref target="hdaa-rr-cert"/> shows the decoded DER X.509 found in <xref target="hdaa-rr-cbor"/>.</t>
          <figure anchor="hdaa-rr-cert">
            <name>2001:3f:fe00:a05:6615:ee45:d427:9a0 Decoded Certificate</name>
            <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 95 (0x5f)
        Signature Algorithm: ED25519
        Issuer: CN = 2001003ffe0000055e60a1571e91a0b7
        Validity
            Not Before: Apr  9 21:03:19 2025 GMT
            Not After : Apr  9 22:03:19 2025 GMT
        Subject: CN = DRIP-HDA-A-16376-10
        Subject Public Key Info:
            Public Key Algorithm: ED25519
                ED25519 Public-Key:
                pub:
                    ce:68:1e:36:e1:14:1a:eb:56:0d:6e:76:bc:79:6b:
                    7b:7c:b4:54:e4:63:cc:b1:f1:2d:e3:0a:38:01:01:
                    80:3f
        X509v3 extensions:
            X509v3 Basic Constraints: critical
                CA:TRUE
            X509v3 Subject Alternative Name: critical
                IP Address:2001:3F:FE00:A05:6615:EE45:D427:9A0,
                URI:https://raa.example.com
    Signature Algorithm: ED25519
    Signature Value:
        21:32:93:92:3a:68:0c:90:96:35:7f:e0:7d:9d:38:1a:c1:48:
        ca:e1:81:04:44:1b:5c:cc:c9:27:1c:39:0e:a3:05:f4:ca:76:
        da:2c:de:b4:4d:87:bd:86:a3:7a:f8:22:77:48:df:1b:ac:99:
        1e:de:1a:4c:82:8a:ef:84:39:09
]]></artwork>
          </figure>
          <t><xref target="hdai-rr-cbor"/> shows the CBOR decoded RDATA in the HHIT RRType found in <xref target="hda-rr-zone"/>.</t>
          <figure anchor="hdai-rr-cbor">
            <name>2001:3f:fe00:a05:260e:d437:6b25:6e28 Decoded HHIT RRType CBOR</name>
            <artwork><![CDATA[
[
    15,  # Reserved (HDA Issue from DKI)
    "3ff8 000a",
    h'308201433081F6A00302010202015830
    0506032B6570302B312930270603550403
    0C20323030313030336666653030306130
    3536363135656534356434323730396130
    301E170D3235303430393231303531345A
    170D3235303430393232303531345A301E
    311C301A06035504030C13445249502D48
    44412D492D31363337362D3130302A3005
    06032B65700321008233FDAEB5068BC148
    59D113A0EDFCF8DC07814E3DD2765E6B5B
    82E04D070597A34C304A300F0603551D13
    0101FF040530030101FF30370603551D11
    0101FF042D302B87102001003FFE000A05
    260ED4376B256E28861768747470733A2F
    2F6864612E6578616D706C652E636F6D30
    0506032B65700341005AF256727EDC4726
    A0C5560BF846DF9C31499CF1A4307ADE14
    65D3B7C90381F6EAB8B0B54049C6990968
    C2D2799E4648154618B37B57AC7F28B745
    1538E08004'
]
]]></artwork>
          </figure>
          <t><xref target="hdai-rr-cert"/> shows the decoded DER X.509 found in <xref target="hdai-rr-cbor"/>.</t>
          <figure anchor="hdai-rr-cert">
            <name>2001:3f:fe00:a05:260e:d437:6b25:6e28 Decoded Certificate</name>
            <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 88 (0x58)
        Signature Algorithm: ED25519
        Issuer: CN = 2001003ffe000a056615ee45d42709a0
        Validity
            Not Before: Apr  9 21:05:14 2025 GMT
            Not After : Apr  9 22:05:14 2025 GMT
        Subject: CN = DRIP-HDA-I-16376-10
        Subject Public Key Info:
            Public Key Algorithm: ED25519
                ED25519 Public-Key:
                pub:
                    82:33:fd:ae:b5:06:8b:c1:48:59:d1:13:a0:ed:fc:
                    f8:dc:07:81:4e:3d:d2:76:5e:6b:5b:82:e0:4d:07:
                    05:97
        X509v3 extensions:
            X509v3 Basic Constraints: critical
                CA:TRUE
            X509v3 Subject Alternative Name: critical
                IP Address:2001:3F:FE00:A05:260E:D437:6B25:6E28,
                URI:https://hda.example.com
    Signature Algorithm: ED25519
    Signature Value:
        5a:f2:56:72:7e:dc:47:26:a0:c5:56:0b:f8:46:df:9c:31:49:
        9c:f1:a4:30:7a:de:14:65:d3:b7:c9:03:81:f6:ea:b8:b0:b5:
        40:49:c6:99:09:68:c2:d2:79:9e:46:48:15:46:18:b3:7b:57:
        ac:7f:28:b7:45:15:38:e0:80:04
]]></artwork>
          </figure>
        </section>
        <section anchor="registratant-hhit-brid">
          <name>Registratant HHIT &amp; BRID</name>
          <figure anchor="uas-rr-zone">
            <name>Registrant HHIT/BRID RRType Example</name>
            <artwork><![CDATA[
$ORIGIN 5.0.a.0.0.0.e.f.f.3.0.0.1.0.0.2.ip6.example.com.
2.b.6.c.b.4.a.9.9.6.4.2.8.0.3.1. IN HHIT (
    gxJpM2ZmOCAwMDBhWQEYMIIBFDCBx6AD
    AgECAgFUMAUGAytlcDArMSkwJwYDVQQD
    DCAyMDAxMDAzZmZlMDAwYTA1MjYwZWQ0
    Mzc2YjI1NmUyODAeFw0yNTA0MDkyMTEz
    MDBaFw0yNTA0MDkyMjEzMDBaMAAwKjAF
    BgMrZXADIQDJLi+dl+iWD5tfFlT4sJA5
    +drcW88GHqxPDOp56Oh3+qM7MDkwNwYD
    VR0RAQH/BC0wK4cQIAEAP/4ACgUTCCRp
    mkvGsoYXaHR0cHM6Ly9oZGEuZXhhbXBs
    ZS5jb20wBQYDK2VwA0EA0DbcdngC7/BB
    /aLjZmLieo0ZFCDbd/KIxAy+3X2KtT4J
    todVxRMPAkN6o008gacbNfTG8p9npEcD
    eYhesl2jBQ==
)
2.b.6.c.b.4.a.9.9.6.4.2.8.0.3.1. IN BRID (
    owAAAYIEUQEgAQA//gAKBRMIJGmaS8ay
    AogFWIkB+t72Zwrt9mcgAQA//gAABV5g
    oVcekaC3mZDVsEtyoYBm1AkrUsfUmU+3
    wWvX6MH0QP+o0E/x4T8gAQA//gAABV5g
    oVcekaC3vC9m1JguvXt7W2o4wxPumaT1
    IP3TQN3fQP28hpInSIlsSwq8UCNjm2ad
    7pdTvm2EqfOJQNPKClvRZm4qTO5FDAVY
    iQGX4PZnp+72ZyABAD/+AAoFZhXuRdQn
    CaDOaB424RQa61YNbna8eWt7fLRU5GPM
    sfEt4wo4AQGAPyABAD/+AAAFXmChVx6R
    oLfv3q+mLRB3ya5TmjY8+3CzdoDZT9RZ
    +XpN5hDiA6JyyxBJvUewxLzPNhTXQp8v
    ED71XAE82tMmt3fB4zbzWNQLBViJAQrh
    9mca7/ZnIAEAP/4ACgUmDtQ3ayVuKIIz
    /a61BovBSFnRE6Dt/PjcB4FOPdJ2Xmtb
    guBNBwWXIAEAP/4ACgVmFe5F1CcJoIjy
    CriJCxAyAWTOHPmlHL02MKSpsHviiTze
    qwBH9K/Rrz41CYix9HazAIOAZO8FcfU5
    M+WLLJZoaQWBHnMbTQwFWIkB3OL2Z+zw
    9mcgAQA//gAKBRMIJGmaS8ayyS4vnZfo
    lg+bXxZU+LCQOfna3FvPBh6sTwzqeejo
    d/ogAQA//gAKBSYO1DdrJW4ogOfc8jTi
    mYLmTOOyFZoUx2jOOwtB1jnqUJr6bYaw
    MoPrR3MlKGBGWsVz1yXNqUURoCqYdwsY
    e61vd5i6YJqnAQ==
)
]]></artwork>
          </figure>
          <t><xref target="uas-rr-cbor"/> shows the CBOR decoded RDATA in the HHIT RRType found in <xref target="uas-rr-zone"/>.</t>
          <figure anchor="uas-rr-cbor">
            <name>2001:3f:fe00:a05:1308:2469:9a4b:c6b2 Decoded HHIT RRType CBOR</name>
            <artwork><![CDATA[
[
    18,  # Uncrewed Aircraft System (UAS)
    "3ff8 000a",
    h'308201143081C7A00302010202015430
    0506032B6570302B312930270603550403
    0C20323030313030336666653030306130
    3532363065643433373662323536653238
    301E170D3235303430393231313330305A
    170D3235303430393232313330305A3000
    302A300506032B6570032100C92E2F9D97
    E8960F9B5F1654F8B09039F9DADC5BCF06
    1EAC4F0CEA79E8E877FAA33B3039303706
    03551D110101FF042D302B87102001003F
    FE000A05130824699A4BC6B28617687474
    70733A2F2F6864612E6578616D706C652E
    636F6D300506032B6570034100D036DC76
    7802EFF041FDA2E36662E27A8D191420DB
    77F288C40CBEDD7D8AB53E09B68755C513
    0F02437AA34D3C81A71B35F4C6F29F67A4
    470379885EB25DA305'
]
]]></artwork>
          </figure>
          <t><xref target="uas-rr-cert"/> shows the decoded DER X.509 found in <xref target="uas-rr-cbor"/>.</t>
          <figure anchor="uas-rr-cert">
            <name>2001:3f:fe00:a05:1308:2469:9a4b:c6b2 Decoded Certificate</name>
            <artwork><![CDATA[
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 84 (0x54)
        Signature Algorithm: ED25519
        Issuer: CN = 2001003ffe000a05260ed4376b256e28
        Validity
            Not Before: Apr  9 21:13:00 2025 GMT
            Not After : Apr  9 22:13:00 2025 GMT
        Subject:
        Subject Public Key Info:
            Public Key Algorithm: ED25519
                ED25519 Public-Key:
                pub:
                    c9:2e:2f:9d:97:e8:96:0f:9b:5f:16:54:f8:b0:90:
                    39:f9:da:dc:5b:cf:06:1e:ac:4f:0c:ea:79:e8:e8:
                    77:fa
        X509v3 extensions:
            X509v3 Subject Alternative Name: critical
                IP Address:2001:3F:FE00:A05:1308:2469:9A4B:C6B2,
                URI:https://hda.example.com
    Signature Algorithm: ED25519
    Signature Value:
        d0:36:dc:76:78:02:ef:f0:41:fd:a2:e3:66:62:e2:7a:8d:19:
        14:20:db:77:f2:88:c4:0c:be:dd:7d:8a:b5:3e:09:b6:87:55:
        c5:13:0f:02:43:7a:a3:4d:3c:81:a7:1b:35:f4:c6:f2:9f:67:
        a4:47:03:79:88:5e:b2:5d:a3:05
]]></artwork>
          </figure>
          <t><xref target="uas-rr-brid"/> shows the CBOR decoded RDATA of the BRID RRType in <xref target="uas-rr-zone"/>.</t>
          <figure anchor="uas-rr-brid">
            <name>2001:3f:fe00:a05:1308:2469:9a4b:c6b2 Decoded BRID RRType CBOR</name>
            <artwork><![CDATA[
{
    0: 0,
    1: [4, h'012001003FFE000A05130824699A4BC6B2'],
    2: [
        5,
        h'01FADEF6670AEDF6672001003FFE0000
        055E60A1571E91A0B79990D5B04B72A180
        66D4092B52C7D4994FB7C16BD7E8C1F440
        FFA8D04FF1E13F2001003FFE0000055E60
        A1571E91A0B7BC2F66D4982EBD7B7B5B6A
        38C313EE99A4F520FDD340DDDF40FDBC86
        922748896C4B0ABC5023639B669DEE9753
        BE6D84A9F38940D3CA0A5BD1666E2A4CEE
        450C',
        5,
        h'0197E0F667A7EEF6672001003FFE000A
        056615EE45D42709A0CE681E36E1141AEB
        560D6E76BC796B7B7CB454E463CCB1F12D
        E30A380101803F2001003FFE0000055E60
        A1571E91A0B7EFDEAFA62D1077C9AE539A
        363CFB70B37680D94FD459F97A4DE610E2
        03A272CB1049BD47B0C4BCCF3614D7429F
        2F103EF55C013CDAD326B777C1E336F358
        D40B',
        5,
        h'010AE1F6671AEFF6672001003FFE000A
        05260ED4376B256E288233FDAEB5068BC1
        4859D113A0EDFCF8DC07814E3DD2765E6B
        5B82E04D0705972001003FFE000A056615
        EE45D42709A088F20AB8890B10320164CE
        1CF9A51CBD3630A4A9B07BE2893CDEAB00
        47F4AFD1AF3E350988B1F476B300838064
        EF0571F53933E58B2C96686905811E731B
        4D0C',
        5,
        h'01DCE2F667ECF0F6672001003FFE000A
        05130824699A4BC6B2C92E2F9D97E8960F
        9B5F1654F8B09039F9DADC5BCF061EAC4F
        0CEA79E8E877FA2001003FFE000A05260E
        D4376B256E2880E7DCF234E29982E64CE3
        B2159A14C768CE3B0B41D639EA509AFA6D
        86B03283EB4773252860465AC573D725CD
        A94511A02A98770B187BAD6F7798BA609A
        A701'
    ]
}
]]></artwork>
          </figure>
        </section>
      </section>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+29aXfbSLIm/F2/AlM1p0u62rATwD01MyBBWrK1L7blnj5t
kARFWCRBA6Qo2a757RNLJpAgqcV1697T75yXrrJJIJFLZGREPJGRgd3d3Y1e
1k8nt4E2nw12vY2NWTobJYEWXRyeae0J/HrUruLbQksn2myYaFE2juHrSTxO
tMvHYpaMN+JuN0/u4ZH2FZaKTi43+llvAiUCrZ/Hg9lumkDd/Tyd7ubJbVrM
8jQpdi1zoxfPktssfwy0Ytbf2EineaDN8nkxM3Xd182NOE/iQDuczJJ8ksw2
FrdYYTrVPmT5HfRZe5Nn8+nG3aIqsxthg1ixqLOYxZP+P+NRNoHePCbFxjQN
tL/Pst6OVmT5LE8GBXx7HPOXXjYeJ5NZ8Y+NjXg+G2Z5sLGraVqeIUmSfjrL
8g34DcMsAi3c0z7AyIbzpDeE1ukGjzrsx+PVe1kO/Q8/IlWTfJqn35Id7eio
RfeAJkkCfbZ9u6G1sBd5L41HWpSn9wmV6MFMBNoNjPw+HY34GlIzmwTayQ0X
yfrQuGHZviN+zyczpO71ZUgXEpi7UaDF0L29hdK9/xU/JGWn9oAINGoa5Ns9
7SJJ+8rg3qbj6hKN6eKqc6yNRtPaSC5nWjjp58mi0A6yeaEOwvJM7QAGAVM4
yybaRRb3d7Q3o7i4zRbaZS+bjWDOlBG9cQzNbh4tjemdOqQv6fh/5YOeoVsO
9X9jkuXjeAbEC6jYRadlu7YXaL9q3bhIXFte9Xzbx6u9rphauOZbDRuvEcf2
k5mm7e5qV6fR6WabWGAL+W0gG/ifG/Rcx7INgxvTNLGILpH54ryvXU6TXjpI
gS1hvjR4FCg4zmaJdhhpUES7yuMecrR4XPKeJj675TfJRZdXx4Lnqcp4JBuO
81uk/nA2mxbB/v5isdiLi9l4Dx7bH2AXd00z3hvOxvKJPqxBmNT56FEzddMU
V4sE12gKo6x6gY0GPE6oJCyvR6eHwHX6nuGY+n799uHlqWW47u4yYVowrwXR
AWVKnkzzpAAOZPJkA+K0Ar/wdENXiExQOM21Yt7tp/dpAWWL1xKsRqtyXgrt
NL+NJ+k3bngTurv1DCHTIiM6wr+7NCzBjLvIpsUqUcP5LcgyJKv+DFmhUVgS
TCUqupFWzMXFmBHvQHId7kZ7lTSFS8x8zdaZaTWIZydFkfT46uVVZFiBxlfl
FdenK8l0Kq/4Dl3J+3F5yfPoUjq9dzfkqjB8g9YPCIn7GFn37L5cRY7p6Xjv
456j+9rZu0N5w/Vso+qWNs1Gae+xXHuG6eLNNJ7Eu7fztJ+ASEiK8rZrUKW9
fn9ULk3DscqlmSdf52mekMQuC9hWtXbjvDcsbzgNp7oB/LKxsQvLOu6CwIp7
s42Nq2FaaKC45lif1k8G2JcndJ62CVpuSxvMJz1mKVSTwK4xCGzQNOXq7kNV
1bo/yzNQPNkIngbtuiVuw5PHQIBbGodUuZvR4XF7a087nGnQq+48Hc20GLQd
LIIVzbwJirfY0maZVgi+BikOXRmmSY4UgOZHmlC8jyif573ZPE9oRcVFkYGi
mSV9mNesl8AsFVjTIO6lMCicZ1LIcXfEDxRQGf0QFfLI8M4oy+7mU6RCyb9w
J09GVDvUeT0Zx5MJfA/TvIdqWhATRnAdXsJgr4aJ0k8mdDGfTkFPg/1RFPN4
0gOd2U+LXnaf5I871C58q0gMrSM1drRkAr1EGwHYDgeb1qdCHbt4DvqgCJls
CsQDWV/QHMSjIquxRIryJKbJh+lJZoskmUDHBoMkx1nsgTIrWIJVFo+2mWfZ
bAcFUilz4hEPIp2gSOvP49GW0gmQiqA4UA6QCUJGGLLiDP7Hscme3OaC/2bD
pYkBQRQjYYGJiBVmCc89kQcq7Cc96G8ODPwtASU8SPo4bJgjHj9WsRimMN1i
HrBVEgA9oD4unCTuIqOIuYC25yMk2yOaUtNRijOmqetU2pG9DPr9MJOEr6vD
DErkKCzvU2DJPV6p4xTkQLKx8SsK8zzrz4n6GxsXFYHBXsQ1CeYNKpPRc0zH
PPfEQt28OIyAH08noBSR0bRROk5rVIHKVS7vxRPgAg11mHafxlozB5umB4pX
g5p2YP3ONBhsMukn/dpzMC1FNk5mKaq7SQLU7/MyGGfwLK5G6Ba0lYxYOiwt
rkGejbEFrAeJipTE9vD7fJJ+nSfaXfJIerZanes7Qis1uY+hEZVjiyTRvn8H
ywrl6u4gvbX/+OPftU56i0xkY3Xfvwup+8cfWzBT3wMoBCZmPluAqboLjHU7
+f2XHpmXv/yx8X/gs/Fv9Y/2ys/SYxv0IAzZ4LuvrkYTz5n0a+Pf1tx9dTXl
L6hme1d8ttdVE4Xh/nvz/ZpqlOewmh/UO/gr2939t91XfqBgJp/7IXuT0X9r
e/P0oJTnBG1+0H9iyNvlEPFzRFxV0HflDrcnn1tXzQ/tzdlphEPEzx5e3uPv
mXZ2CXd+vKqaem9+lH/9ZG/qH7WaOm2WqmmZy9W8Nw9F4WX+ru5U1cDzVW9+
k/NYm1al+ZUJh89vK4NSG9HW/Hzqztpqst/hcwKoGmQMfFOrqd/JVqrZlry3
rk2J1tf3ZlthP+CT1qVgk5+kTUaP/lCWpuzNhaoha7RZc0c+uiooNlFVXV8d
b62Q+Kk7TJvnpN/r7qD0057/MGP+WCm2XZFpuyq2dGPlqR/a2RzMqZ5GUkmw
3W+8WgUcWNPWD0nPR8lSP1ZvvNRDbXlJr+/haiXZK4r9QG/Vmj6s7dL2xgYI
cQBGUYJmFLo3tPA+S/sbKMsC7U0yAetgJEl12kUDBuyYKEEzZgPFWiBvXsaD
BEy25TIgJaD+9wnY7KNkd5btHk4GeVya7HD/ff2++Mp6lXSv9quqrRlw//7L
m1HWha6RqQX2wnUBeEO7BLUc52mmbaoKXajzLdDWGx+GYNbGy5CDEMeW0PxW
AzQ/GiDzIkGbWjFE0Kog+2etySFspjxBU+MebpI1Ixp7ERrtoF3aG4I5jPeL
utWLSKwObkZCUVEbiBDArEdDVIV8KWEteAh+9hn4QUt0rUR60l69ZNtUuwSz
eAQ4CzHMJdiTm+F0CkNNH7Rwz1w2j8gOjLlWMXqw+xN8gIy7XBtCt0fQePcR
BsBWsKADEHaRjEZgYf36a8lprQzM6ylg16cwYTLu4qSUUBBgVW8I1BTEg6GN
Y+gwGLYTsJWfxbrfv5M74Y8/9mgABXQM5rK3Bgiqkxz3EFMiIRCJqDOySGdD
JEb7SiAMwlgAQgEGSWxD0BPqAzqQ+U2z103wdqyNcXC5RD3lCMFsJ7pJwIdz
UyEqsLWHWZ+RQjYngxrA5DQRviiFHYDSIXmVEAUjAmOS0HItZKsoPbjLCf2e
8upWKVDMgdBiWfTyx+ksu83jKZAfTXMCqn1AmQIcYUd7SS6gCANInEm6Mc0I
dRI+l06YOtQusnmOgElr1Rra5G5tUYs0dFqrUA36QZBM2Bi08QgUQMgMNrtg
Qmx9pxyDwG5h9RRhTMLFOO+C252GAyIBKVrDQXvAoc+NVe2YoApTbRSnY6QE
z/wUsMXqrK/4bzJEVNlMK8j1+qiFYQiz34MVlhZjIa1ghFJ9HSqEVBAlOVUy
4SyBmSbBfwaTgBAQ0KEEjuQSUevYPDs83OLVeokMhv1LBK9R52uSpyi5aVmO
0ezTWpEl+oDTbsv7jPiRJxOoj9YuXD08u3dhaDAxDzu46MoJPQxPQpoZqvez
qetGYOlBsG96n2mMFxdFMivKeWCBxBITofdVko/TSTbKbh+177/Oql9/0FAv
GOn31XI8csShgAhh6f1yfH159csO/6udnNL3i/b59eFFO8Lvlwfh0VH5RZa4
PDi9Poqqb9WTrdPj4/ZJxA/DVW3p0nF48wu7J345Pbs6PD0Jj35hVlbnALkP
BtwVvp0p6CXWZ/2k6OVplxm82TrTDBv4/L8Bo5uG4QOj8w/PIEW4gJXBjWXo
PeCfMEmwlkDQxjlWApwD8n8KgmVU4PRoxTBbTDSQWglzTNjvp8LLEOHioh/F
MouP47uEZkryAU4HryvekmPfllB6U7yQzQvWr7ISkBXNZJQtaPjFvIuTv6Pd
4r4aMwzIv9sUOyKf2KHWqCVmkprQ1M5GSVygJwTXbkZMKVoitourkQkP0A7L
Dx4id37yCPo2JykOLIwetR40BAsL1ECMKrCDAwKFlLBONlnVCvcwTEJ9ZqGb
uFsXhjtaC/8CWLCjHbbC0x0NFulOaYTBN+H02wEdj/9DOdDqPJ1gzq9pWTGY
nmi3VYm4HdKcXJ0iCp+plo2rddUeRNDDAzSuaNWGIS1P1KYHpa4Xm7EbqqGm
OjEPDg6v6HFJbZaVvNuC238zct8xd415unESpRXZA0aGS2xOXYkK92kbGG0m
w/R2u2BU3cejOXJDLOwrrJwEFDBDjtYBLjgyD0GrjcEgHT2KUpUO12BesIdQ
ywSMuR7OEnpmiavGXDPpn+EwnaHl+8cfO8qyom6XvLRTG/SSP67UYkQvoCqZ
1gr2QCSw+9zPpd/bGz9UeQyYo5qhQ3R00DRczlP2f/7QTi9aMLHaQVwMAZr8
0DZNTwM6FlsEWNRf+FP5Rb9duyr8H+t2DQLtL2Oi/73x7O2lAmvuQ4nd5z7q
82sff+mjVPCnnldrWKbVyuepAhUZJehNUD+GpJPRnJFG5qPkBGGBK9eVKjYN
W53v5c9TBX78FQNRMaZcZhJfLiPEZp7Ed31YfogiVfnDxgjLH1oVU14VS6aI
NFF4jfeyHLdCsgkhA2Hm4B6xWNds/kiMB4v4s7Wnwx+D/jb30qm7F+fTeO8z
y6nDsAmWDYiYPhgpwty65z2JPBsp9lnZEMiBaE4GAnZ8EtMmyrIRCvJzBPKO
MNCs4K0v1GrDdIpPTtIub5xhd3Eg4vmaLNyslJrD+JG2YwE9Crc+WBG5NoI6
qJ9V25vpXrK38xKPbYKm2NrSfukCRbNF8YtS52yREeeIbtW3n9Zz5iZooS0Y
ddzjmaibp3vQA4YOy5ON2i0M2eIXE/8QPDw84OzbNhuiUPVqgcfg8VHHUo77
ma1ipY81+kprmIbz+WGP/zzFFtTi58c9/PNS2RWoAYMCRZgJECOsqHKMGG6C
xiAT4fJUbPVrJ/BwDuDshDUPRkTAZJcBE4izqZmUQQhvv4kdv5Q2hdDy68Vs
/pE5D3MjVTNBcbZky6gHYpo9gLDYEO2553EsgBrWC93VxECQa/fYcId5YA1O
lNR3NFv33R3NM3yTqGaYpufRRGEMR34vbAR1p0yYqNAhbGIzBrtyd8o7eHIN
xN0MZhDJCY+g5Un8KRYJybMdaZ30CHihYY2EyQW/VxgpniYP1DOJISuOpCEQ
YzGSBR6nSBNkYDFcVSRkYLqPK/8TY3AMYChJVu2S8uY/enbiGVmwvEQFYlaW
aQjd2yFCQB20fmCGX3BFaB2MGEJukshNMhxxVqxBN2QwCjJcWpCwKEikFWlf
dJKAxnzUR5DTRbowfmNDn0kH0wJGGALikm1isdzBLNxBXi/mY0C7/EArvU9H
WiiQhioZwNIW8PeaZ7/9AFTFCUUhcQzcPiqE3wrkJJqcYongbXbesewAKHI7
HCHJYciLorbFPZnJgMI43y0jB8ZYufDvsSsy6WUcTrCz9DhAUkEPvA4Mg7wK
vDTMNNBdxb7QCMKpubyVTMrkkf0Wo1mKAAU6ypqqSFEWST5Bm1hCm2zF6iTT
+BZhNzlqiiFjTUGNvXJXYsLAXAOGxK93EzRv48r3ya4h5ljB3rU4hXKJSFJV
VeOjj1OxtqRHK5tKFqhQm9yUL31COF8A9HBqxRKqJkKEKqBURPdfN66wal7p
KUXNqq46GTkyTmYxOQ9rnjSYGBgW8nCcjhhbqnbBMBsB18vaVva243wp2kQM
mYcjxljO3jcM6SGxwm5TahyHpbhiatvy9c4Ue6pH6ZZ9twqZ6yS9iMIz1vo+
etGgKvSpgARGEYSeP2aRiiwgOuezV9O04iQRryGmf68MpKCbw1jaQ0DlQqra
kldwgSCHzvPJc0VTHPtZ/CjxP65gFm20RmE4WbC8Irvzx6IiidgTKJumlqfx
I894WUyQshRkJYNvbDQfFQcDrf88Ie87+Wdg5ePklnxAPoqa4aeF1V18jIYL
/8Y5qCXo0aM2mUtH9BKFMAQGZCyTJIlhcnntA4uAkEUcKjmNfKHzYpaNEYWz
rifp+WslLtHbr8pyMrjQEy8gKioWOYeP++XC3thEn9/W01tc278/9Xlm++yH
9oR59NxmWq2l7JUtLeGYl+ALf348eWfjROq1Fxqqluy+IiRXy5FF/YqOv3aA
8tvzYD1bRe8KSqxXudLGmja3qzmhTdftaoqq38v3xe8NrFLf4z8yesJY+m0u
/bbK3xtPtPbK368k7KtZ52ne2TjKei/xDbf0Ot5B5iED8BU1vnqQ8tsLvp5M
ftnb2/s59lllp9eyzxPsROwj+KUKvjGXfltLvwd7+Ed7mn1e2Zt/YfYhRfxs
wZVL62V5tnxhzah/aA97z/9x5Gp9VZsrn7r/qD8pdskGUJ1I7Yd4PMXdJkQF
pd7jOATcIX6l6c/b2mWIM26ba/MJKE7Qr1l/B/f5x/EjbQ5265iHVCpDkmoX
jsAiRmlqPbD752P2inNccI/gA5jH8K2Qe5oY+Jo8AAr6d7A8AARmU9q2ROQo
DzJU5lJM4G9EKIxAMIadMrYkWwE34HbUkMy62QZWxwBKVbYDGxT70l9AjcWT
2ia1Esqb1sJLhDdtxLuZEoiRQSrqxU1xEZdAdIvJGpYQqtouXEvDmEgT51T7
AmYAHwCDEMpK7xe7khgKYY8L8gbsaQdgtO1oXcC8d4ThRXkyp2fSDBdb2tov
FDaQ9NG5leZ92jDGaOUS3+D+w+XZDtlouJNNseVQV9UR3vlFZ5ikbMEgHEem
dqT2SEmJqkNkvyLRn/RISmNzc3UXV3jLKqwP1q3iS6WQfxiLiBDp4XbbZB2U
fwGls59JoVWFitdh2boztsYla9iJ3RDKFDPtBHTmhqrIjyIVXoAD9ezCAQZD
lxFBFICE/sidOjFyQPm4v7yu1YTjfYAek16KIiZGmDwfxNTRHFHWPbmLZHxP
P2FgwVNarR4A6hiJX/nmeI+Jt6sSIb9oC6km4WgjKXoEQJH2VlcHbYuJZTXN
CiZ3kY3mDFlwQLJqdnuVnifucKx0uQSBBbNvbbLIi8t0UuLsy7gRmPEBxTpo
g1F6O2Tpgbw84w1DQGIDqHmBJ6cEBVCQAp8Mkph7DUMXPhPcGUwm92meTRj+
EQpCYbzbTRBEQRd6fMDiIFsktP9K0LAULFJI45EToEeKe5GEosRIoewovUOX
CzrXE6iwB9CXI+aZDeZTQMgymOjwapk/Gc2XjFcGYShYmKanFN2bCNugPhTI
k2RB2/cVNFUlM7oLb/OEQ112tGTW29sCCoAmoo5yoIHQDiLm/zlv3aqrjnay
gQeG8bQQVC/mI3GCjkg9InMDtNVdwt4Qkml0LkX6UIoZzMUEhEzp9S+Skv44
3pJJChAT4WiklHo5gIo8LNJpW532ky7q0n2NVbEfp/J7AU9S3Uo01q8ydnJN
qA4Go8CCA0vhDBhaibmjWIta1CGezMEtZfIwynitgqN8VLfbkr/56ViwHfLP
w/Vi8KhdtN/sGiz1uRcUkPB8LNm8EvrCX1OsRK+Rp6fWzQuxauELy73Ni4st
EVVXRdldXFw9ThO5WldPty1w5SxksR1yhuBEkaQoXUyluKVtvzxHccvuTJYg
MiigFu5VI/tmkwJBv3/v4m2ughkEy0AV3AMcIqqgtDcfxTmQPR2jqULLCQVa
5XoDmXdxCAxa1OLBlHiyLZbWFDRHnL8u0qsKmQPxTOfGOMZM3ZJDslTBQWRI
ap8V/b1Z33fq46rUntzFI7pR5BO2PbpPhBIngjMR9rSIYkJp92Mi1nHN9tTq
kTRyJRVCoIvZ1I7DG+yyOFyrbaqKhDeSeqN5oQSSRZfls3W/I6mdeSEU/mW7
tcXmkFzL+DDOsJxGGqDS9CyrWaAVn9QiAjeb7WKrHk4o6WiB5WTuGTIuhiIM
cc6oM2VzZYQKOWvJXiCxzZFILO7JgQ727GiwK8LiPreAjydkadTEvhK585nn
DbhTiS3jfa4qSJe8nTJiGneC+iA/+mxKYquisxQMJmLYeKyocHNY+Xhiiiqt
x4nGo1uUHEMR24WRdMquFIkZPGZb7hgKnQzLbzTn0CnQGQM8hAe/6Jgg6UXk
6wJPiorJRy/3TrXJldKigAnelXJQXdBVTOh0+FgQ7XrDGCFNkuM+T6/YoX6Q
aYcn40q5hQYjxkG/vOsFQpM2Tmr744QNRNByikHLNcnJLEogh+OcFWZ6akmW
9gd1TQYRlIqOKwbaCe+wDJrax/BWZHkpQ0oDVA1Vwq6cXV2sFgJBds+7naRe
iHPpEF49lmEJYvCqE2t4pwriWqq+tu9URVYYn1XLHp33StR9OfbyYar5/Orm
rE2XPkuX3uv/PLuFnqgyr9qAUcKo5dlFXKeM52tnfSkq7+KwoBOXS9KfdYsq
ksoGCtTBvWd0lbrP9ISkIqHG+xnIcErYMxkqy7qZ9kF5tPU7YLZIlaqSZKmQ
UL9iIG5ji+PrSvWsTPo9nueYF2UgBz65dgHLeLzJb6Ba78H2ioX5TvTPk91E
7tceAANKxbQ8a2WUdZ5MRwjdiW+WHuCoPpAFfdyCw71JIXHUmvBAN2/CynYr
iwAvj/FkOx0sXtFar5Hf0nCgowMSMv9WqJxWBUmrfqYcz2sLKc/HEUADDzFE
dIYbPJNBmo9rYE7wNk2M1EsgdzM+/qK1mqcXzC+YeQQM1O7jLBHhk60oOhL3
XEPHzT8eoDT+yl2uKtJxkcJUYYIE5rxfMUL7AVi6nlGj5LJdjLj9Q+khx22I
wlwz50fhfmDOFDSiJ32pVeiYupS9uJ1d7X4t8Hj5LrlwdosEHT1YI4bDzAB3
34JGwIAwspbhJ3CbaKmf3qYIklg/Y4+ArjhrE+nTybo4d0SLwRxRSPcLCHOJ
mqoWyNUFHQCjicxbRR3ITCzQLRgpPJcC0U/w7DcthJLMw7iQYTMjrBlM8FG/
II3F+qCfEcNX0dzMnRSDMkhHy9lM/p33GWM55lF2S5wqxs4dZ2TIVfI0/orR
otUEPjmf6mV1XsH0Y8dBPy1gZT4Co+fTjExE6M4Oa4Bq2itCteVRrSiNbye4
r99DMgmJW6gKtTzq9KY86MR8Kzixg6QDWxbD56eMaKuOM13/EHuX4qr2u/Z3
cjDTb16kuzOQAoE2h0nZ4Xtpf1eNbw+0GVBR20NbZtNwtrhUT8qEXXVx7qKK
CDTkl41/SIe0iGYsl5J0R5N4+gBXUelijDGuT/RGIxAWfLFGkslFT3KqX4J9
dMclOQWyAODpA43oIRkziYPc2AhIDnxevvOZm2OxLxYcIT0RmFUzmSmyi0aE
lEP7hpOIoDOG/akly+eJXNZjXMoztvxZa5BXAcwScpyx+zsmLCTc5/DQMBlN
YT2Sfcv+dRlvwRWgp0yukDIEh3w29UMV37/LbDalDcvjrXT2XIRdgPiqlUCI
I5FFzIbCSDiIJTqqHUdju61K1EEOayUWkxZPN3nMcONARKwr1F02UDFOO1R5
sZrCpTu1KRSrngGqHCPGFCgPyFhTrKhyWXGYGVh16toWzkpWIpVhybYTGTO1
4yBsPMSzGYttxpcc2LYHfS5Eogl+UtwQvjlBdMHhg5S8fGVY0QCslgoGAHs8
xAiBxpR+RpVU5bqhkEMO9tQ2U2GUgC2T5NKVoQlNkqk1Swst5g2DJatYHCqk
xznkkE8gQJuGXjZXXjP1yiouCUXuoUD7rOt6qIH9bKPN+rKdUc3/a2ySkiM4
6kQxX0XsIjLJ8oEwYdbTql62L4AknIEpagsjAxMzlYtKbUD4BlQcXPqWhaMd
+aRHphiRGpPXUAfIChLhxsi0gLW39rRLnBO1OvLypjAyZQmBcSX5STlTqK7/
HQm0X3YuLo0orVxBwCm8g1I7X0jMJc7dyvNtwAVpnw9SSqtShmwmaXm0EKMY
V9xbq6Z86dtiRfzyI8IrJg17Txj24kgLbY+hFFw9VFrtZfFqReN5tTl55IYR
D29Y4oT1ZjyjHFXHPUrrmWVSadb3khRd9dRCvfYsF76KDGC5oCNFfas2f3lu
utxaTWUCJcWKR68j3B/j5sMTiCsunjpnKubrM8apijUlLcN6DXkigu9ma8x8
bT5l6IfnlVGprRxr7pYdE8/yMvkvs/eZu15r8Ete/P8t/v9HLP5yQv81TX7a
HULe1uTMjLLJrXSDxdoomdyCQmZ9K7yfxFzUV9ZdgkKkh+Q+6HNYoiRJHUzI
y4AmvhMWmMfFP9G21X7/H+KQCD+xU95NYcLh5t+38dcuAIzbfPoPvv0/KQBe
3MWvtXuo8OBpvE26D+6Vj+VJjNfxX/W63IESXiwoUb+ilpW7vKIJ+ROLbPyx
UfW1BE5p/5+Ml/4mbs54X0cZKcMfgZdMfQuAkBxWWU0sa6E7XIe4gbxWq8LY
27Nck6oRI62qgQv/pHMJgQbFTMfZqa7ncT+dg401GGXxbIfSTWIugV48xs3O
oioIBbK8KgcFF7eFZ+8OY0IXy8VBY40ooTE98FTxf2ysUr3sN90SJND39ryd
6mqwhoOqNMbqPWhCskRZMcKeqt6SHv2Kr2to1rSQrOqslzUpnLGmQuXumulW
WQMq3JxQcmSdwpHTeARzhV8L1M5Ugb21UfFB/QHhWfwn59UINGdrQ6UBFIZu
Gc5GtQQ1faNccZqxwYtLMzfKlaRZG7x0NHtjea1ozkZtSWhuBeKX9KNE8eQD
XofiafOROrkcJS9C9MnKQusXnuXzSGpAD6Xg/f6d8t3iuWoUwf2U04GC4bN5
RQ5Vg9P70ndziw9fkfopt2LXn4pniyPu3d1y0k/VNkOpLEFijOlnBAcrbl6R
wKAGGnisYA3FmLpDmCDJAz4PlHoEowVPpJECFm6F0oMhdB7ZK3xSi60IcagC
9DWZdjgU8jvLU1EyF4uoTxgUZCtyLhwOIijKyDSZHoOqU6oJ1w2TpX6FJNAA
JkOadmvzeFLg3nHCoS5qphOy/qgJ2Qkw9sBUYC2UTWNMnEgHgWhWxfDIs0/5
M+qB+AQPEHGK891ReShEHoepxXWpWzMyQwdjqSdDxHY4ohG3/ErDVSTykDsQ
eGlezIGB6EY+H1HIE34nS2OUxmmRULIJTjO5U8H2em7kpWCxpQTJrfCUws5o
I0ZEmknKihyk6nE7KNnCY2sijyQmToZ5uU04V+Svgp40FTKSQ5x6oEsA3cPq
QCJo/PLU4vIZTNrdpAhMimeonedYroa38LHrf1dDsR457cU/Nmspn6FByvnM
55YJSewjWt0Sbj1lWnAsGDpUb45cArFm2EouBIk+S3uMDvftaZ05R60KcVCw
Dygtqi5WgQjjuJ/UD5dW3EA03hdnFSl3L/TiBxHiAm+JiN+ql2vCgc/46Z/5
YLKCWsiztvT79Teffgja0LVdzVK6eiEPnq7pknayH/7UIMQ4bGzD931ZjXJy
t1XmJC9vti/foIwCvAYraLMKW7D3DF3ELGCyazrFXVsG3Jau45A8wzdeNx58
iA7g7mqGYzk+Xr+elHl+Vh/qpDng1hZ6cfnrJTdQ66pd7ym1AtW72DfDtTwL
uUIE0eChzpVW1Jt1IqzSABQPiBDO06sQAxU5rG++UkgdXjJu8csfAizVVxnj
AxDF73F9lV64yvenRORKVxLmPUb0jrFY9AQFZUkIXpbH1CrkX5zVz29XXLBZ
F2zCVVoF7+GDE6VucVAXmhZr7EImJqFuhMLhgxiSvBEUWAkm7Z10CdfyKeN4
gPGqk/pRWCWvrp2QlnIPo1hwUIobHb7I1Ejo5+TDldSb1tJBS3leuzomneVl
wgSkt3Rqqx0qlB4hYMfMRapJA4sGAyw44daeMsM13ynabwLiiWnmqVulYjmA
ExnQROOgICjozu/61pO38HT703dx0T19l47Cw+3SJEVOxkGqfFyZB5QtC+Mc
cWDSIv38RN0ftz7LPacyT5rM54XRVUnODQ2Xk4RJffdMSgzOCCDsdsphIbMC
JL0hO7HF9Mu5OZDbJicc+3ZJiS++/1qrAwZUJS5YylwGhtDTEfGl6wTpBWx1
C2wEYqQ2KBh7lSOArJ+VJBa4EvhAgUxjDdNRPiSGWIVty0B4mRo9BsCXwG0R
3tdFOzzOZVYlJLoUEgwKhEdcxE8oOU3U1BZb0oVFq2LziXQKW6v5FMRuicxH
pDU0V3OAJpZmAsjQNV/zVq6t+bMBt+p/jDV/1lS2sb37J/9sqCfG9JrCeFBO
k8Hgfgct03AVNfzn25Rt/Xjm37b4t6P8q2kkH3Yeftf1ZysxXqyEJhbqMZ6t
x3yxHmQNqMd4vj/Wi/UQZ2FFRj1brLoolk9iNWFVN9VUHOUslYp4rUpkKxPs
9VIvsnTDwD2sSb4x4fl8KIXMbcYnLURyMsZz0vJXTG+tjYcDTqojFdIeon1J
qoaUE66tUTKYKdl86pkuyvweaS6dqEoKDkWN0tBwwxGUfY4qtspvo6x9Slhj
65/lnlvtuBIdaKBgfplbgGLCMWzd5vY2+VyBkAUoN7aqofEQxjInDXWIiJXQ
8H7CMCWqLgNGBSQC8ns18Kvg2Ca7mVn2ooaiNLiPhAqh0/+D90Eu37MjfUC+
joFibEGLqAQk36SUJuTvb9LZwbxbIbVb6OW8iy9+2qeX4yxu6f04+0+/fWwf
3/SVzvZjrx87RnfQiwe9/sA3vIY38DzX7DmmZ+lx3LDchmf2fJDbQCqN3/+0
o005yyHYYOgMIV6Y4M4CnY9hKoosPem3pJaz5JF8DuKgDRt6MmxMbAKwDS1X
0Bo7WSTUwvfxgBKrcvYV8SCRuXbUl/So4aOnGG1MphlvxMFyYPdJeYhN2K0T
ioit73mIrULcYkgwRk+4oERkbhURw/n9bA107x1mQuKnbzkFtcz9zm/F4CSZ
KeadLfsMNzESWpwYgmnH6vcT+kcrM7LwFg6s0DKZPK6pRfwIoyzPKNZHmg6k
g7aM1Rchr0Kn0051QQlM01mVJELNLiE7KfOE0GItOEWIap+UfkIxbNo95wNA
fO5UWGwqIpGUpGneE0E0Vb4QXKCU/Kd2MKUYkk+AD+XQeMm1Ny+kyQCLkAmJ
catzEPV9nLlESBIZ1MKSQ3joZDQyhepQ0pt8STzgIErzBzcFGWbVaxP7hXym
kI5qQD0KSNzRngGJsCCIWUnATDkio4fZrsmXqmQ9lTNSyj4+5lAum3IDd5YU
8v01SPFMSikl6RUdrCg9PTyJwq3zqwzhVeKypEeqirb6Gb/USm1/jWPqqciy
CSvYHQH51kSuUd5l3Lmu7iiV8BZfIjR8OdOqZ4oHEP85d4OIQJIIA1unXpVH
vFYxflWojOaRqL68tQLtqQQffyzzGynxUXT4T8Xj4tRZlShYcIvAHdyyTO70
RNyZdFHXvO9pIaNR8DDTER9VomrpRFD9lZY7oMuvOkgvCkheJN3dKYZSx+MM
LTMUd8WTtHsKPytEUsZcD4tU8eszFVf2oMhOR00UYpul9EyKnQA+8jeoDjQq
a4ZclfS0ghSqll/8/Kg8AYwifsYp+YKTUrgf682dgCyMxGBe7BtNO5oSsm/G
UoHXvf7gqdqcpdowKdDLJHuqNn+FsC8nl3xmpFa9tudySr6Cbm69wOqLvjav
n8itsq62Rr3AG952a4mMoJdCjWy+aV0u17muNu+lvtVeQvZSbX69wDPvLMOM
GfNR8lxtpl6v7SwdAf++6rOuNqNeQGbQ/pO1mfUCkXzTn/Y3oNikN8yzci9K
voFjM8L3bqytbYnf1r23Q7y24zV9s+sFTthKpVA4WesZG4pQ6+XZ1vO1OU/X
Fon4naq26KXaltYCjS4RL8GLcA9zTQ8j6uO62pbWQgvgf1+7JOO/Tz3spKTo
XzGnpRqRSUtVTaLaPnW1QdoET+zNSSas23AF+/tUyTH6t6U426UnaDegdlL/
QjVcEA2SqU+Wb49fq1K98xqTMF6JE/rjKZj6/CJDkIQDeeiJXxVTvkUFkyKW
OT85smCubIzLCCiREq+LVij3AaxTDLrt0elM1c7HJDSSHpvSnsjnk4lyKJfC
OqvEH3tgX/ObYQEnKrH0KdvQ+MZVPE4MZsPhQJ5OFS/y2eEjgXjlTHSIhCCr
IiV+S6Yw4IOjMn0lxZqKUhhigCIeU72IKjHkrktvzEymo+xRPE3x9uUYx4Cw
57mwFRAdjijSWznuqrxaAEzO2gFa2XU1586Tw0HAWItcFrqXHLpKghVGy0o5
xIhKAPLSWXTFst7iyNDqELAIGi1ZqCjfL0Lvhy3U10UXIi0Ps2uV9aie25Op
NFOOlFYvP0nXHV4QDE1ojt9BhEBd+sJGj6V9JraRuYMJHhVEjltzKr08aPKA
KDTpr+szdvceiUntzsUbXigCkfe5zmQ2DmykemFu++xMvILI9ZezYi6l8hRs
V50KERhf5lqUa+e1iTbXhF9zys0n0m3isXSgOmcU4ZIoDpQ55PVeLnQlFYua
NZlPaEjXhTzMXS2QahFyKICSFwTGLWXGa/KCCG6U8kCE+KTKixkILPfnQtZR
1pV0mGV9fiEpdJM6zm+CRcrDTIrT6rhNOMZT5mW/6S3CM1mYZG0+ESeb5Tsn
dpSA8uXwHRHSxC/LofREdAIKOZi8g2KFaYdiU1KEsrNUK3MCiGQGaGwTK2Jc
0nyErhbkQgz5QQfPNMsGFAI2m8WY8Ylzd4l9XeDzTARydLNbEO/8st0ye1nV
O5pCShzKzh+QfPLgAccisWjimsVJVaVO4RqmCsjjkc04yw2dQc0TFD4YuocH
f0sy12ZB5StJ8Sokv8pewDJhNsQ6y/gvIO4k5WNVZb5SpscOn/t9rH6n4ym/
HEl6U3ojXsqUV+k9lBimX/hd9yJteT1PGNQw+ZKUr1rD9EXz6UxJdisSrOXZ
OKUZTOjd1JwzWZzPVd5zvK/m4IfxXaJLQnlJMb23Orllqqipd1CclnKMA26K
FF9oTMK0K32C/CayJQFD24r83jMpRn5CfFSvPhCv36sUMzIPH8rb0frV2wiq
0Gr8Jd4eMsS3h4Cy4hGUb3zaVFNqOLXXzGztwGSlpE5JW/2yiEd3/IKAWZ4k
K8dpSi8IbWGoihDJw95NmSFMSWegqEXhqsPHkRF4a4HT0lWHccQglfe78Sm3
0ahiE/Z+1nq3qSR3QukI8lXJIyDe5JXKdyjTqqJzAuX79sRJRuWAeOU/ggJb
8iALe7Bj9mILYU9pPjjliQx3rB0R18qgfeH6ni0lK0ADaZJp/TRH/7XyijgO
jkdGEENQBUh5AHBGsyj6q9YrDsnAaHbUE/Gkg5WzMjuKcikFFWYLGYPQjnPJ
eDWCV7n75ZumZJb+ai3MKIcYOQrLnAN7Zfzk36Sr7R0Qu43CFV95ucH57jEG
d56OZnxOJy4ex2N8cSS/Ra/+pgllysYoELocgxmPxI4b7e+XvK4ET6zPM1Hs
1d50WQrYJYlBQLXMvyAVhvT9cS85jeV8wmnLdkTUXn4rpGG8lK5NerZxJHgc
SKaGSwciJCKZYHJ8DV8fztuEKBrnMynpp9kiybekHBH2Br5xnt90qaayIQ0F
HCcXpvTkAvF/qzYcainWu4mSrh7GhHOMfZgDH4xEE7l8HxxlYytINIg8d5jl
CVUOnRtkK1acw+zFlKNnpuEm22ydl1psofCuzU65mgUnK/MvXzavCCflHZJS
gYvdONwgUd/BDsTsyk0uGeH0yxd+IyXR/BdJAKysfLegCjZek+TmdIqvDhiN
HqVDnUhWVKeU0G+BB7ARQIkTziXi5A1tma+PjRpA+3K+LjmKH98rRVZOkWWT
MosVCi3U0JSvFNHi4ayWsweACdpoZKQwP1xfHSPzUacuL6WMHXM9ak5VjZ2U
3NtCiAHBtBUILrtb9fIWE4oQSCDBoIU9fMsBrFx2ghKSjyd3tGwvZ3OEWy08
5LUZfkR3Aoa9g7G5ox0dtXhHu5l1teOsuMtA0n7TNg+ursg3gO9rwDx+VK7a
7U8o6RjBSPk6CmUjJqWEkOQbIA4pH6BNybQ7Z0kAaLcvz0NP+gqGm1XSWeK9
Hm+6SvZSbZdamAMQA93PeCIAySLjMz7htmMnxXClvy2FjRWYqrVM90X7k7TH
/lmNK8/nExk+sSMtDMpoScywqNmjJ1VyMDX2iVKuKm/h4dBCuIhvRhbv8qPh
oMoWqIhwiHgDTJpJN4B8LShn78IYCuyqGAFu7u99Lt8zjEAhiftlKRnKhltU
6rlzeRhNZiHgyoQ+ybO7RDEx2I7iHWx6V6U4Tqec1EBMRpJZHK2jfLgUoSBO
q6PphX0q42R2OKCofKeRLDgTR/uXSxpQdJHk1R6s2m3WlXLy4Unellx6HysJ
y+8U2IOut/Jc3H8/vTh8c3iiOUqGpoTSaK9G4qlU32jsdeFGDAV8eMDYa+w5
8HcM16AgfNegUmp0k0KUbhfT6bH5aXzaChfHUbj4cN55c3x42Dz/0mr6cRhR
ofC23YL/jePw+k34OBv1ojA/vrxbvF3cRO/Pz7lQ1AofoYYH+P/bp/GnEdYG
/xsnH67N4zftByp0ctV7+HR193Bz1UxPvoVJZ6E/nlyF+nF0Bw9fm1To+Mun
uHbjCmqAa8dN/eHNt/ATFWrenrxvhqAS7y4uL9+Hs+u7TvPouj07vrr5dvLt
ZsY1ReHXstPh8TB8Oz43us2j3tc34afZ+Vsq9M44OjDejs5mXic3tr80/Xa0
//WkeeYl7f1MXyyo0OWX8AybPLg4boYDr928CqPw/GD/OOq9CY3rPhVqn7eb
+4vz2XFrfgAUa4bR/nYYhp2P49bw/YN7wce9jpI3HXOo9w+a305T77437gyP
xu/tmw/Govvmek6Fbkx/VnX8pBkeXZ99GR42rXzx9eN5MqVCub//PmpuD4ez
xfzDp8OFcXp9155HeceNWne3vQYVchZp/+PkY+zsz6NB/91Ro//Js8ZnB2Pz
amCZ0T0V6nrht/bC+31jqx4Pm+e7JIyUkFjk35qKFxzO744TD/W6WY7m11C+
BIhOVsM6p5PWF1F4FcrlolY1EMentLIibL16sSOfpjN0OoBYBt5vlt3iF4a/
O+QXaPxiDQaepsPnF5GM5jdL90zdsE341+g4oa5bOvyG/+Fvy7FE1J6ju7pl
Nl2ngfeblmH68G8DrzqObusWF2uZUMqCIpZBf1sufhz6Tn+oGFTrwEXX0l3D
wkYalgG/ffgbHnNNi6fJ0o220dAjqBFrsOF/n2rHR03LdUIe+2oRoyoClfBa
tAyjCT/8qst6yzBt2zFt39HNyOGFZhu2YUb4P9TiWhb0zYXvOGqoC+nAIxXE
gH8NXfd9X4+cpm43G2ZoeLrrRjYX882mY7Yake37dqfZaBluM2q0vZbRsW29
0wk9lhO63enAYK1OaNktS7exqQ731IiAJiIG0+h0oOMwUuiOgb+gX42ymFEr
hp02m14DpxIK61an08aJ1x2nTcVcPTSchtH2jVBvNjzXaLhew4Y/esOyQrNj
dqhYw3RhWsw2jBbKuBG013Id+G25sKiQJNyoW5HEhuaajt7x2gYwUdRutszQ
4VnQG6EfdqJO5AD1O0ArWJdm2/F9mNfIbsNk8Jyabb3dNBohcJRvQoea7Ybu
+ZHTbjhR2G50mlTMsxpRZHrNdhS5jVYEfWo1/KZrQ/0dV293XB5CCxgRiNj5
Tc2ZpCxLuZY55HEQDBJdD5zASVw9iIFGgZH4RhDr3YYWifWqLlFcyPWlDuZ6
banLVY5pTTjByeqyZvkgl3UtJwuxCB5bLl9e8B7fwIiHbS1tU38wq7fjXNIJ
WAxG7SZ5oDl033KUAiVGDGVazkBrRyZwkF8WOsR88vB46wSPtjL7DJAqxD5A
FqQKEgVpUnUKkTYgy9orFjC4oEn4JNDCaa5pPlQYOG5guvDFdLQ3x1crD4QU
hlg9YDz1wOWc8iqInqKtuwuSbzfcJYtkV18uqCJ0zKMb1JpWbj5DHPkR18VT
u/BUsFIG8NXqRfz4fuDrQd8Junpgd4OGCYwWeHrgukHfDnQ/MLuBYwa9Bv58
qgZ7EHQbQc8I3G7QbwSJh98HdmDrwWAQxF7Q17HMwFhfQ4LMXt75CGx5b4Gp
RlsZdPBPLSxuN+MCKIQIZJbj29GKQOvhu/UAlq+00QqDq4vr9rpq5HSEI3F0
U+SUfqY2gDEhxxcGvE47AQo0XKdtWKchrVMQZgFKs52Vx68vDgMZfwYrTjUQ
2Zh5aV1UBUTwkay56wT6IPCSwDAD6Fc/Cbq9wIwDpx/ojSD2g3gQ9Ac413ov
MAY00W71eB8KJ4ED/GBiklOY7sQJTBtrS/Qg6QYGVKIHPRMLQIVWN0ga1eO6
F/h9EFVBwwn6Md4adAPPChr9oG8GHhSGL27Q6GHHXAs5yld40rWpb4MASJjA
34OgpweWFRgWDGpVWCb4Cs+fFpaKMBNhVuopIj7psmTj9/b6r7HsY36rDjwA
6G5SGHvDfrxr6LXZlYOQO/dR7QyTYqop0IQ6tAaa/I1Fowht/f4rNvckRol/
BqNgcR9uNeCmDYN34O+E0IkBKMXlt9cs4xRHwSnNIeCUA8Ip3wCnfK3hlM7g
PxmnXIXfGF1cjeo45Uv4Da8dN+0HIGpcxyk645TL9sUanHIVLt59CTvN2+P8
08cwOjyPTuOmbdoX57Fr3JywkT6JveTDrDE4urh23pwdF4P2zF5kdnj+Jjxz
T465pna2iHC4F/oV4pNmeL0IFwBLvoUWdoUKHVy0CcQcXYX58CG8Dc/D/f3b
8F3zw837xt3Hayr0djG+HQ77Wf/gYtH7lt0fWW+HN5fOCNDLrPfmgYXW0fjk
vntVdfz8PBweT08vT8e3x3dvb9hGG2w3/cnVbby4/vLOvmkDAWa9b8d3k4Po
7jRbfGTF9Tjpxkcnrn51k/jDryfuduutdXnidfO3d4k1nPLoQFjdD6O7t4BT
POCdhHjFBMTrAi9ZxEsJIV1zPQ/5r+ahm5/moZsr4KEvNw8nH94zbU6i93cn
0aF1HI2GUGCZhwwx8xfLPGTgtVfw0N1LPNRqHe+b89l5fLS4HjJq1i9ObxuD
b7YVJs2rL9Zlf+TkH+yj26vzXmf01/DQ5c2pEfVz5qEPdlbjIXN49woeasbe
6NPjYPZw8PZrxGbt+9t7+2K23Tu+Hve8+HyRzOzrT/1T6/H8tOnPv7IlXRy9
Dy978afWhy8tfTJOLu5u318M02+JkRSDx5Rx28XFtW0fhm0V66JoW8K6KDpR
IO5XQnAt4oVH/yLIq3RiBfLaS5BX9u4pyBsvQ16LIK9bh7xO518Q8mLNCGH8
pyGvWRXBSiTkBTAJ8E6FvFYFeW1Gn7a9FvIaFehdQXgIeltt1zPalts2ADKH
7aYjkHHkthtuE4CY22wA4m3ajt22AZm1mkYH2mgLuoWWhxjW058CvQLLvgR6
a8WeAL2hGILrGk67bTuRDfPoh/oq6KViZucl0LvCIQx6TcMCJgEsG7qe3vK5
mO9aTgO60Yj8yPKMsGXYXitsG56hI+WbTotBaqvlmw2YMF9vAyWcjt0KG24U
moBrm7YdecwhzchzQ6sRdjzTbDRsL+oYzbDl+0Y7ahuh3fLYjeGF7Y5nQ11+
DfSqK3OtIRfrToBUCpLEBoMS6BT4sf4C7C1r/SncW5cSfzHw9R287wz+tYCv
EehgWvuvB77mUw+sAb4g/0rga/zrIt8ewBAPQEJguQEgUAOQTowwBxC+3g9c
ADIuAqiGj6h2bQ2NLsKZrh04gJVsAjXw00Cca/aDBJBLHFgeYjH9CeQLQPv/
AeQbyrWKIi2IaK2G+n8l9AWGtgCXWoRdY5xXgLi+HvhuYDlBY4AIFoAoAFSY
D5jmnhHYXvV4L0YO8GCe7MAGPgAm6OFc9vwAxmL0AssP9CSIYUYd9GtA+YaK
nOPAJFgLrGD3A68RdPsIraF8Iw4GXgDLp9HAFgHfQuUx9M2vHgcWhGehV3Yv
8AAqxwiAPZsa9deIzKew7wsicwn8ktxL//OtI2eNdcRm23/MPPL+SvMIbR9p
HoFqRcPIRTPJhn9t+BvMIjRvqmJPm0cO/G0/bx6JIn/SPPJ/0jzyTMvqRGgX
6a7XRKVPxRwfbBYr1NtRp9Xxopbe8Ay7bUWR2XCdttt0hGfbbOt2pDd0x2/8
l5lHpgvdskF/NE3HbZvek+aR67n2nzCPnLADFTfMRjtq2WBiMbjUW47j6k0w
V9yo47csw/b9VgdsGUtvhGDUMI5xncgCa9LXLWTKdtj0mnrTsXXbb7k+mDku
k7dlAiF9v41pgA0HOuk1rUbTaYStRsf0mg3bEcvD8tq6p+v2snmUvmgeAZVA
cgCZQEGZsPQT03vZPkr/lH2U/qfZR55H9pH3l9lHQBkUgigD+2Rdx5UJ8jP2
kQMWwU/ZR+sfeMI+OvzXt49AFVlWMOgHMSg2J9BddOKy4nT8oG+gazbW0a07
6K2vATRfv4euYtCsNthZ5AkGxekkaFI5XdR2oJht8k+vrQGI6lfm7f+X7SMU
aUFEi7WJixWk2vMGEqy6v9BAcsAOMdG0bcAMJDgtdgP6RA59h0zeLhoqtosm
ig8GD8yYYqLAFTBqYxs3BsCkQXMF7F0wMiza+PERHcAkD8CSjoOuh5tJwDLl
47aOtfVcNHt0H82znkm84Ad+go0CT4HdAl8MeBasJuAOhSPAXgITzvSwLbBs
oCRYccA4YD3r9hqh+ZyB9JzQXLM9UJ6Fw/SsJFT/RnHA/1EvO/tFe/C3Tf52
H37ZUNCjl70ZK97Rh7dL3tH2DXpHO1Gr+eDWvaPXf8o7evzlZvHpwzmLo+Nv
PfPmy6FxMr5+PF3xjraFhz1qLnlH29/w2nHIvk7hHS2d5m+P0u3+aDv9EDmz
QWd0ZRdvQ1aC2/2898Hz3hx8fTiLTqeOezq0tr8eN6DWxQl0np2MF/oFOTxb
+uKd3Ts/DNvh2b4dtm6vr1qtC466Gd/dvymym4/xwYXeOzh2jx797NOb9vzT
x+Gw+7HJya0/XTpfuqa+aJ7fRO/M9wuwgUI96vb6k9tWY7/Jds9+fPTl0/go
TTL9U6cVdfv77w4fwsdt66P5bnZlc3TSLOu/f7g4PgvvTtwMLK3buNc9GVy9
8ab+ZNrucceTm2FSjMwvzfPfMYbnNTNPkeY889kiDMObw/b1ebty414cH759
M44vvZhVWZjddj4c3jW3Zw3z0yKf+eOeLBw23zu3XNP7XnIXt6zxp+h90Z49
ZjfNsRHe5dfF4Hp8vc123OLD/Uf3+EA/P9vO9Pb+g33lPV3TfcsfG29v5/cf
Z40PZmYvHs7m4/iKTb3DM+vq/MQanJ+Z3nB6OLk8HBWXi6/edevky9iMOSir
Me1f3Y/N9tfB6dvzk7N3rdH9xaex/fXq1AGT9f0NFUrP33y0zz5NptswukcZ
uZV1Pg0/zi/65xO2t+L6rszyhgz7oNVdmccnY8AG99bX7fHRRdN6jJ2r8Zcb
b9tqfetn0acr/4J99dsfpyfOMEpD9+3j40Pz7f11sng4+nZ2Mrz6eD71OHKr
HTWMj2HbM2fH45k1aNrfut8+nJwfNd+nb8PzfMheuXEvbux/mij8PI5m51b8
+H7+7vDwm+BG12hm983LzuSi7Uaz/bMvvabdOT3rvzU/jmddFhLz5klz8eFj
VdP7cSdxOkar9zY7/MKs0srTty1g5PDD1enB2Xh0cKSbx+8up8XBfZpefUuo
0NdF88B/t3+Rf7ON1k364B/E38LD0/DTqdfpDa551R5vfzg6evspi88/NA8m
x92r8wUxoXV6ZH7a/raQo1vLto+X9v3k0yCjQqPb7e7Hh0/X20et89PBJLY6
92fNoVtcLb59TZIvXKi/n63sY+AWxu3poOd9uUp5/d8cja9OTx87n7LrB/PL
6eli1jS+TL5ev83d7k3MfTrOzvIL63j07k3zzYfi/Tfj8ePJ1+vri6z19aa/
KJjpEte47zupe/P26yTklVsqGkz7vhx9V72uHMX2vnpWpLYlIZ79j2NupRMr
mNsjzH096eXJ4qlkCc+DbkDdALpbjSXQbf9ngW6TdiQYbBOwdU0CzljYtLzn
QbcBj0B9z4HusgjAUwnhZRzd0m6Cb7bNjh8Ju7Pt+a7e8ZuwjFzH7gDYA+Tn
w/0wajnNVkeE4RntsGV39FY7bPhtr+01Gp0wtKwmdYBwMBOkDJB7CgdTMQmG
DZwMG2BlaDdbYDdWOJilZxkg9xQOZsRaBsgt4+BIt9yo1eC+NTzdbGOnDBC9
ZhunCijRCL3I8A3b1CNWjA3Er17L1lsY7daIvLDpWG3db0LHHKflSIdARzfB
ygIi2JHV8oywYTQt3EtwO6bfcRshDwEAvdXwPc9pg1Uc4XZDDQcrq+VJiw6J
FCCVAj+2AaGAXfcCDJa1/hQKri3cvxoE2wSC7b8SBKOhi3Yumrlo5f4ZEIzB
N/rPgOAnHpAg+F8W66KjNwnMAXqIfQpg810MpvIBiAwCw0UP/4Bgja+vr8Hy
g4GPgU8ArQDZ9gYImI0Efb32AL3RAIwA7kDNiffEbkIjGMQ/iXX/YpCqLCWQ
OAGKnP9KkNrXcS8GCNgAnOoFuomO8AFgR4PcECZuqbhu4MIXE2Go1w8M1Y9u
w4iCfhd97QB2PUCZNlK+C4Cvj+5/L0ZUaiWIQbsu+ukdBaT2HA42w3Zt8tzH
FvomrB5C27iBnnuL3f8u1u8PAlcFqTZCasDBMMvQtJMEXRND72jTYFWiPYdR
n5NoK158UWE3T/svGRRrzrE+bUrwG590fDsNa7hA+7u9AwaCbiz7bJfV1G/i
rU5mIN6xgx+n4iSsoxNG7Y7rNvSwHeG/9djwsigGidfjw5dD3MuiGOv+fJh7
WRTj3atQ99WwdLcqqjbdbIGmhVZ8z2xDtXDBabphWdTyWmBntNtIh45j6p0o
smw9iqKODd+bLc+t/Cmm2bA9MC1adlMPmy1HRwMIdKjrR1BBw7HKok2w9z07
9DuW50NtVivUQ6cZGaCe22Zot9qV98p29NZvO09R3G+0daR02Gi3VygeKhRf
Dk5Yjq+oGnBfirEoi7YtNc7i1RRvd6J22AldMzL0RqPlh23H8hWKQ0swy3oT
1JynRzDlke2AcQbWRdR2Db1tVsMCQ6lhQrd0229GdqOpA+lbrY7lGnbUsMEm
KYuaHUO32h0wZnTDaoGhZ5kwOmgeiACmlOVUuhQ4rvk0xYG3DaQ0EK3zLMVX
9juWtmyqGfZe2rap+tJUt26WlyzOcTU5aiSKB7MTNoE3daCVBUa/CzxWydhW
xw8do9WM0GAPgS+beqMJXfaBUu2wqSxdu9Gxw05khB2rbYG68jzgCRvGCJao
B7zg2lUHOjrMeQfDkKy24zXNlu+CSevrjmcY7YZlVMOCAT3D41GrjUu00QbD
/FmKL4usyupng79aqc9Y/mz0V7XWrP9liuMcK3yjTLbebkStjmnZbdNH0YIE
V9a/aTh+aNhgpntwvak3bSMCWdEOgaa4NqpF5rlNmDHPajftRsMyHcALuu06
YctpWFHDdFpV0dC3HQOWmBn60FuYaq/RDCO30wBjvBm6urLIwoZu/Ea//rHx
x4oiQ73zpxSZqoWEaf5/ARRwKpZFxwAA

-->

</rfc>
