﻿<?xml version='1.0' encoding='utf-8'?>
<?rfc toc="yes" ?>
<?rfc symrefs="yes" ?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes" ?>
<?rfc subcompact="no" ?>
<?rfc iprnotified="no" ?>
<?rfc strict="no" ?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" consensus="true" docName="draft-moskowitz-drip-dki-01"
	category="std" ipr="trust200902" obsoletes="" submissionType="IETF"
	xml:lang="en" tocInclude="true" symRefs="true" sortRefs="true" version="3">

<front> <title abbrev="DRIP DKI">The DRIP DET public Key Infrastructure</title>
    <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-dki-01"/>
	<author fullname="Robert Moskowitz" initials="R" surname="Moskowitz">
    <organization>HTT Consulting</organization>
    <address>
      <postal>
	    <street></street>
        <city>Oak Park</city>
        <region>MI</region>
        <code>48237</code>
        <country>USA</country>
      </postal>
      <email>rgm@labs.htt-consult.com</email>
	</address>
	</author>
	<author fullname="Stuart W. Card" initials="S." surname="Card">
	<organization>AX Enterprize, LLC</organization>
	<address>
	  <postal>
	    <street>4947 Commercial Drive</street>
	    <city>Yorkville</city>
	    <region>NY</region>
	    <code>13495</code>
	    <country>USA</country>
	  </postal>
	  <email>stu.card@axenterprize.com</email>
	</address>
	</author>
<date year="2023" />
   <area>Internet</area>
   <workgroup>INTAREA</workgroup>
    <keyword>RFC</keyword>
     <keyword>Request for Comments</keyword>
     <keyword>I-D</keyword>
     <keyword>Internet-Draft</keyword>
     <keyword>DRIP</keyword>
     <keyword>PKIX</keyword>
<abstract>
<t>
	The DRIP Entity Tag (DET) public Key Infrastructure (DKI) is a 
	specific variant of classic Public Key Infrastructures (PKI) where 
	the orginization is around the DET, in place of X.520 Distinguished 
	Names. Further, the DKI uses DRIP Endorsements in place of X.509 
	certificates for establishing trust within the DKI.
</t>
<t>
	There is a shadow PKI behind the DKI, with many of its X.509 fields 
	mirroring content in the DRIP Endorsements.  This PKI can at times 
	be used where X.509 is expected and non-constrained communication 
	links are available that can handle their larger size.
</t>
</abstract>
</front>
<middle>
<section numbered="true" toc="default"> <name>Introduction</name>
<t>
	A DRIP Entity Tag (DET, <xref target="RFC9374" format="default"/>) 
	public Key Infrastructure (DKI) is a strict hierarchy, governed by 
	the administrator of the DET prefix <xref target="IPv6-SPECIAL" 
	format="default"/> and having the authority to authorize RAAs. RAAs 
	in turn authorize HDAs within their domain. This authorization is 
	managed via a set of DETs whose sole use is to define the DKI.  The 
	RAA Authorization DETs MUST reside in  HID = RAA#|0 (Apex 
	Authorization DET in HID = 0|0).
</t>
<t>
	There are three main classifications/types of DETs:
</t>
<ul empty="true">
	<li>
	<dl newline="true" spacing="normal">
		<dt>Authorization DETs</dt>
		<dd>
			Used to assert the authorization of a DKI level.
		</dd>
		<dt>Endorsing DETs</dt>
		<dd>
			Used to assert operations within DKI level.
		</dd>
        <dt>Operational DETs</dt>
        <dd>
			Used by operational entities within DKI level
		</dd>
 	</dl>
 	</li>
</ul>
<t>
	All DETs exist in DET-Endorsements (<xref 
	target="I-D.ietf-drip-registries" section="B" format="default"/>). 
	These DET-Endorsements provide the proof of registration and thus 
	trust.  These DETs, through chained Endorsements define the DKI as 
	follows:
</t>
<figure anchor="reg-class-fig"> <name>The DKI Endorsements</name>
	<artwork align="center" name="" type="" alt="">
<![CDATA[
                +----------+
                |   Auth   | 
                +-o------o-+
                  |      |
                  |    +-o-----+
 Apex             |   +--o----+|
                  |   |Endorse|+
                  |   +---o---+
                  |      |
                  |    +-o-----+
                  |   +--o----+|
                  |   |CRL,Srv|+
                  |   +-------+
                  |      
******************|************************************
                +-o--------+
               +-o--------+|
               |   Auth   |+
               +--o-----o-+
                  |     |
                  |   +-o-----+
 RAAs             |  +--o----+|
                  |  |Endorse|+
                  |  +---o---+
                  |     |
                  |   +-o-----+
                  |  +--o----+|
                  |  |CRL,Srv|+
                  |  +-------+
                  |      
******************|************************************
                +-o--------+
               +-o--------+|
               |   Auth   |+
               +----o-----+
                    |
                  +-o-----+
 HDAs            +--o----+|
                 |Endorse|+
                 +---o---+
                     |
                   +-o-----+
                  +--o----+|
                  |CRL,Srv||
                  |UAS    |+
                  +-------+
                   
*******************************************************
]]>
	</artwork>
</figure>
<t>
	The Authorization DETs exist in a set of 
	DET-Authorization-Endorsements.  The lifetime of these endorsements 
	SHOULD be no less than 1 year, recommended 5 years, and should not 
	exceed 10 years.  Endorsements SHOULD be reissued prior to expiry 
	(may be for a new DET).  DETs used to define this authorization are 
	replaced per undetermined policy (note these DETs do very little 
	signing, see section...).
</t>
<t>
	This separation of DET type roles reduce the risk of private key 
	loss for the critical Authentication DETs by making them 
	infrequently used.  It does make the chain of trust for a HDA 
	customers' Operational DETs to be 4 Endorsements.
</t>
</section>
<section anchor="terms" numbered="true" toc="default"> <name>Terms and Definitions</name>
<section numbered="true" toc="default"> <name>Requirements Terminology</name>
	<t>
		The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
		NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
		"MAY", and "OPTIONAL" in this document are to be interpreted as
		described in BCP 14 <xref target="RFC2119" /> <xref
		target="RFC8174" /> when, and only when, they appear in all
		capitals, as shown here.
	</t>
</section>
<section numbered="true" toc="default"> <name>Definitions</name>
<t>
	This document uses the terms defined in <xref target="RFC9153" 
	section="2.2" format="default" /> and in <xref 
	target="I-D.ietf-drip-arch" section="2" format="default" />.  The 
	following new terms are used in the document:
</t>
	<dl newline="true" spacing="normal">
		<dt>DKI</dt>
		<dd>
			A DRIP Entity Tag (DET) public Key Infrastructure.
		</dd>
 	</dl>
</section>
</section>
<section anchor="DKI_Levels" numbered="true" toc="default"> <name>The DKI Levels</name>
<section anchor="DKI_apex" numbered="true" toc="default"> <name>The Apex</name>
<t>
	The Apex Authorization DET is used to endorse RAA Authorization 
	DETs and its own Apex Endorsing DETs; it has no other use.  This is 
	the case for all Authorization DETs.  Apex Endorsing DETs are used 
	to endorse DETs, with HID= 0|0, used by Apex services.
</t>
</section>
<section anchor="DKI_raas" numbered="true" toc="default"> <name>The RAAs</name>
<t>
	Each RAA use its Authorization DET (HID = RAA#|0) to endorse its 
	RAA Endorsing DET(s) (also HID = RAA#|0) and for endorsing its HDA 
	Authorization DETs (HID = RAA#|HDA#).
</t>
<t>
	An RAA may have multiple Endorsing DETs (HID = RAA#|0), each for a 
	different use (e.g. CRL signing, RAA server signing).  It is 
	expected that, over time, an RAA will rollover its Endorsing DETs, 
	thus at times there will be more than ONE Endorsing DET  per role 
	in use.
</t>
</section>
<section anchor="DKI_hdas" numbered="true" toc="default"> <name>The HDAs</name>
<t>
	Each HDA use its Authorization DET to endorse its HDA Endorsing 
	DETs (e.g. RAA=267, HDA=567).
</t>
<t>
	An HDA Endorsing DET is used to endorse Operational DETs; those 
	used by the HDA for its services (e.g. USS) and for Devices (e.g. 
	UA, GCS, ground infrastructure) partaking in the HDA's services.
</t>
</section>
</section>
<section anchor="DKI_dns" numbered="true" toc="default"> <name>DNS view of DKI</name>
<t>
	The primary view of the DKI is within DNS.  There are two main DNS 
	structures, one for DETs and one for DKI entities.
</t>
<t>
	In the DET DNS structure, only the Apex and RAA levels MUST be 
	DNSSEC signed.  The HDA level may be too dynamic for DNSSEC signing 
	(e.g. hundreds of new EE Operational DETs per hour); trust in the 
	EE Operational DETs within the HDA level comes through inclusion of 
	the HDA Endorsement of EE object.  A slow-churn HDA MAY use DNSSEC. 
	The RAA and HDA levels MUST contain their Endorsement by higher 
	object; this provides the needed trust in the Endorsement of EE 
	objects.  The Apex level Endorsement is self-signed, thus trust in 
	it is only possible via DNSSEC.  Other RR within these levels will 
	vary.  There may be HIP, TLSA, URI RR.
</t>
<t>
	Each level needs FQDNs for its Authorization DET and Endorsing 
	DET(s) (e.g. PTR to DETs?).  FQDNs for services offered may also be 
	present, or a URI for the commercial FQDN for the DKI Entity.  TLSA 
	RR of DET SPKI may be directly included here.  Same with HIP RR. 
	The Authorization Endorsement SHOULD be present, as SHOULD be 
	Endorsing Endorsements.
</t>
</section>
<section anchor="Offline_cache" numbered="true" toc="default"> <name>The Offline cache of HDA Endorsements</name>
<t>
	The Offline cache of HDA Endorsements, used to verify various EE 
	signed objects without needing DNS access, SHOULD consist of the 
	HDA Authentication DET Endorsements of the HDA Endorsement DETs.  
	Thus the receiver has a trusted source of the HDA Endorsement DET 
	Public Key (HI) in a DRIP standard object (136 bytes).  If the DKI 
	DNS tree includes GEO location data and coverage, a receiver could 
	query some service for a trusted cache within some radius of its 
	location.  Such as, please tell me of all HDAs within 100KM of...
</t>
<t>
	This cache MAY contain the full chain up to the Apex.  This could 
	be helpful in limited connectivity environments when encountering 
	an Endorsing HDA DET under a know Authenticated HDA or RAA.  The 
	needed trust chain could be shorter.
</t>
</section>
<section anchor="test_raas" numbered="true" toc="default"> <name>RAAs set aside for Testing</name>
<t>
	The RAA range of 16376 - 16383 are reserved for testing.  It test 
	DET DNS structure under drip-testing.org will use these.  RAAs 
	16376 - 16389 are preallocated in this test DNS with 16390 - 16383 
	available for testing setting up RAAs.  Within RAAs 16376 - 16383, 
	HDAs 16376 - 16383 will be preset for testing of Operational DETs. 
	Other HDAs within RAAs 16376 - 16383 additional HDAs can be made 
	available for testing of HDA setup and running said HDAs.
</t>
<t>
	It is anticipated that once a production DNS is established, these 
	test RAAs and HDAs will carry forward.  The migration could be as 
	simple as the production Apex Endorsing the test RAA Authorization 
	DETs and moving the various test DNS structures to the production 
	structure.
</t>
</section>
<section anchor="Shadow_PKI" numbered="true" toc="default"> <name>The DKI's Shadow PKI</name>
<t>
	TBD
</t>
<t>
	In development is an X.509 PKI to shadow the DKI.  The X.509 
	certificates are minimalistic (less than 400 bytes for DER).  Any 
	DRIP specific OIDs should come from the ICAO arc (e.g. 
	1.3.27.16.2).  Important X.509 fields like issuerKeyIdentifier will 
	have DETs rather than public key hashes, so software will need to 
	specifically handle them.
</t>
<t>
	Distiguished Names will follow DET hierarchy and not map well into 
	traditional PKI usage.
</t>
<t>
	This is a work in progress.
</t>
</section>
<section anchor="IANA" numbered="true" toc="default"> <name>IANA Considerations</name>
<t>
	TBD
</t>
</section>
<section anchor="security-considerations" numbered="true" toc="default"> <name>Security Considerations</name>
<t>
	TBD
</t>
<t>
	Needs description of risk to Authorization DET private keys for 
	broad trees (e.g. lots of RAAs).
</t>
</section>
</middle>
<back>
<displayreference target="I-D.ietf-drip-arch" to="drip-architecture"/>
<displayreference target="I-D.ietf-drip-registries" to="drip-registries"/>
<references> <name>References</name>
<references title="Normative References">
	<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
	<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
</references>
<references title="Informative References">
	<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9153.xml"/>
	<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9374.xml"/>
	<xi:include href="https://datatracker.ietf.org/doc/bibxml3/draft-ietf-drip-arch.xml"/>
	<xi:include href="https://datatracker.ietf.org/doc/bibxml3/draft-ietf-drip-registries.xml"/>
	<reference anchor="IPv6-SPECIAL"  target="https://www.iana.org/assignments/iana-ipv6-special-registry/">
		<front>
			<title>IANA IPv6 Special-Purpose Address Registry</title>
			<author><organization>IANA</organization></author>
		</front>
	</reference>
	<reference anchor="drip_scripts" target="https://github.com/ietf-wg-drip/drip-scripts">
	<front>
	<title>Python scripts to generate DETs and Endorsements</title>
    <author/>
		<date month="4" year="2023"/>
	</front>
	</reference>
</references>
</references>
<section anchor="test_dki" numbered="true" toc="default"> <name>Test DETs and Endorsements</name>
<t>
	The following are test DETs and Endorsements for the test DKI. This 
	testing environment is open to all.  There are 4 RAAs available for 
	others to build out.  HDAs under the 4 pre-set RAAs, or under any 
	of the 4, built out be others, are available.  Finally the test 
	HDAs are available for setting up a handful of entities.  Any 
	tester wanting more than a few DETs for entities should plan on 
	doing that under their own HDA.
</t>
<t>
	The following are the test values and objects.  They were generated 
	using the det-gen.py and endorse.py scripts available at <xref 
	target="drip_scripts" format="default"/>.
</t>
<figure anchor="test_dki_val"> <name>Test DKI values</name>
	<artwork align="center" name="" type="" alt="">
<![CDATA[

Apex
    Authorizing DET  (HID=0|0)
        DET: 20010030000000052aeb9adc1ce8b1ec
        DET: 2001:0030:0000:0005:2aeb:9adc:1ce8:b1ec
        Raw HI:  d60268e6cf64ad693e5bb055d7c6e48c
                 7ed07013609e6ed02bb935b3d6acf53e
        vnb="05/01/2023"
        vna="06/01/2024"
        DETofP=0x20010030000000052aeb9adc1ce8b1ec
        Endorsement(136 bytes): 644f3940665a9cc020010030000000052a
            eb9adc1ce8b1ecd60268e6cf64ad693e5bb055d7c6e48c7ed07013
            609e6ed02bb935b3d6acf53e20010030000000052aeb9adc1ce8b1
            ec17008ad1bc982c6cd8c955b1ef621ef80ee5c269aa3dbcfd34b5
            85162b19d39dad7d7ba78aeb0e84bc4dd8efc2246dd30834b1e5d0
            d220e7815af921a560fc0d

rra16376
    Authorizing DET  (HID=16376|0)
        DET: 2001003ffe000005f970a4d7fd0e14a5
        DET: 2001:003f:fe00:0005:f970:a4d7:fd0e:14a5
        Raw HI:  df7e64cc1bfdcb65835437b37b6110d5
                 6fedb81443f58d53df8094e0e2828d23
        vnb="05/07/2023"
        vna="05/21/2024"
        DETofP=0x20010030000000052aeb9adc1ce8b1ec
        Endorsement(136 bytes): 64572240664c1c402001003ffe000005f9
            70a4d7fd0e14a5df7e64cc1bfdcb65835437b37b6110d56fedb814
            43f58d53df8094e0e2828d2320010030000000052aeb9adc1ce8b1
            ecea2cdf1933fb93842cb2c4e849fda3637493c9eedbfe08178fd5
            c7293c1b46acbd9a6c0c740a297ffda903b53bb34e8779ee8397d4
            9e6216b51ac7e87161200c

    Endorsing DET  (HID=16376|0)
        DET: 2001003ffe000005191f150daf98f382
        DET: 2001:003f:fe00:0005:191f:150d:af98:f382
        Raw HI:  b81b0180631ce60c14d14ab80a69c214
                 7305836bf80b3b10284d36bae750265c
        vnb="05/07/2023"
        vna="05/21/2024"
        DETofP=0x20010030003ff805d80a0a62d3062894
        Endorsement(136 bytes): 64572240664c1c402001003ffe00000519
            1f150daf98f382b81b0180631ce60c14d14ab80a69c2147305836b
            f80b3b10284d36bae750265c20010030003ff805d80a0a62d30628
            94c1d2d6c8e0165da6318a8130a6eb5149830c9717bbad98be4fde
            abec31195df9d6c41319d477cafcebf19efaa2694abc05f4460cbb
            aedfee617fb44646523807

hda16376-16376
    Authorizing DET  (HID=16376|16376)
        DET: 2001003ffe3ff805e805a98f9df15e2d
        DET: 2001:003f:fe3f:f805:e805:a98f:9df1:5e2d
        Raw HI:  b82b27f86b013468fe48d85b54f01bf6
                 5385f302ab2e136dc51a3b929c88ce5a
        vnb="05/14/2023"
        vna="05/14/2024"
        DETofP=0x2001003ffe000005f970a4d7fd0e14a5
        Endorsement(136 bytes): 64605cc06642e1c02001003ffe000005a1
            43e69785df6f61e8f6d91f7d5351485471420a9c7d5df180c7a31d
            b86cc937581ee8106f18e4eb2001003ffe000005f970a4d7fd0e14
            a5a791e3e1f8fe3fcc4848232df472cb4f796a1b836b918b55d69e
            fac9a8d35d0fda184b5915e467969a8c6352f1e8ff65a0e8d42c2c
            08f1b22f800b1288512904

    Endorsing DET  (HID=16376|16376)
        DET: 2001003ffe3ff8059b0e2860eb0bacde
        DET: 2001:003f:fe3f:f805:9b0e:2860:eb0b:acde
        Raw HI:  65f26bc01b89398f787c4785e4e7f6e0
                 1f2993137759995d7baa72791a44ac5d
        vnb="05/14/2023"
        vna="05/14/2024"
        DETofP=0x2001003ffe3ff805e805a98f9df15e2d
        Endorsement(136 bytes): 64605cc06642e1c02001003ffe3ff8059b
            0e2860eb0bacde65f26bc01b89398f787c4785e4e7f6e01f299313
            7759995d7baa72791a44ac5d2001003ffe3ff805e805a98f9df15e
            2d72e53262d8b49452bfd6324daf2193fce47bbbce37bce0391542
            bde64a156ab0942fa1ad340ecabf1e49eecf3818b25322955ef71d
            ffc7b786c5c48a6a84c003

    UA DET in 16376.16376
        DET: 2001003ffe3ff805a93e53b72709e0ba
        DET: 2001:003f:fe3f:f805:a93e:53b7:2709:e0ba
        Raw HI:  bf0453a01120ed8e651ae9f6951a8278
                 3da820296a338effd54a0ba846a99875
        vnb="05/14/2023"
        vna="05/21/2023"
        DETofP=0x2001003ffe3ff8059b0e2860eb0bacde
        Endorsement(136 bytes): 64605cc0646997402001003ffe3ff805a9
            3e53b72709e0babf0453a01120ed8e651ae9f6951a82783da82029
            6a338effd54a0ba846a998752001003ffe3ff8059b0e2860eb0bac
            de903ad90789c07f948737280159a071449caed275c91cb73d782d
            904a20492d12e27eb0f40c6098e70c5e5e382a3b43d9cac4994b4a
            e82758665d62346fd80d00

]]>
	</artwork>
</figure>
<section anchor="test_dns" numbered="true" toc="default"> <name>Test DNS</name>
<t>
	The DNS tree(s) for the above test data is still in limbo and will 
	be added in a later version of this draft.  But some of the RR for 
	these DETs are available below (note that some HIP RR were 
	generated with an earlier version of det-gen.py that used the old 
	TYPE55 RR; this will be corrected in a later update):
</t>
<figure anchor="test_dns_val"> <name>Test DNS Records</name>
	<artwork align="center" name="" type="" alt="">
<![CDATA[

Apex
    Authorizing DET  (HID=0|0)
        IN  TLSA 3 1 0 ( 302a300506032b6570032100d60268e6cf64ad693e5b 
             b055d7c6e48c7ed07013609e6ed02bb935b3d6acf53e )
        IN  TYPE55 \# 152 (1005002020010030000000052aeb9adc1ce8b1ecd6 
             0268e6cf64ad693e5bb055d7c6e48c7ed07013609e6ed02bb935b3d6
             acf53e)
        IN  CERT 254 0 0 ( DAYKKwYBBAG0OwIGBmRPOUBmWpzAIAEAMAAAAAUq65
              rcHOix7NYCaObPZK1pPluwVdfG5Ix+0HATYJ5u0Cu5NbPWrPU+IAEAM 
              AAAAAUq65rcHOix7BcAitG8mCxs2MlVse9iHvgO5cJpqj28/TS1hR 
              YrGdOdrX17p4rrDoS8TdjvwiRt0wg0seXQ0iDngVr5IaVg/A0= )

rra16376
    Authorizing DET  (HID=16376|0)
        IN  TLSA 3 1 0 ( 302a300506032b6570032100efcd5ca4427d87d9642c 
                76ebf48776df567cf2a9e5e513cb50b966ce54162fa0 )
        IN  IN  HIP ( 5  2001003ffe000005f970a4d7fd0e14a5
                335kzBv9y2WDVDeze2EQ1W/tuBRD9Y1T34CU4OKCjSM= )
        IN  CERT 254 0 0 ( DAYKKwYBBAG0OwIGBmRXIkBmTBxAIAEAP/4AAAX5cK 
              TX/Q4Upd9+ZMwb/ctlg1Q3s3thENVv7bgUQ/WNU9+AlODigo0jIAEAM 
              AAAAAUq65rcHOix7Oos3xkz+5OELLLE6En9o2N0k8nu2/4IF4/Vxy 
              k8G0asvZpsDHQKKX/9qQO1O7NOh3nug5fUnmIWtRrH6HFhIAw= )

    Endorsing DET  (HID=16376|0)
        IN  TLSA 3 1 0 ( 302a300506032b6570032100b81b0180631ce60c14d1 
                4ab80a69c2147305836bf80b3b10284d36bae750265c )
        IN  TYPE55 \# 152 (100500202001003ffe000005191f150daf98f382b8 
                1b0180631ce60c14d14ab80a69c2147305836bf80b3b10284d36b
                ae750265c )
        IN  CERT 254 0 0 ( DAYKKwYBBAG0OwIGBmRXIkBmTBxAIAEAP/4AAAUZHx 
              UNr5jzgrgbAYBjHOYMFNFKuAppwhRzBYNr+As7EChNNrrnUCZcIAEAM 
              AA/+AXYCgpi0wYolMHS1sjgFl2mMYqBMKbrUUmDDJcXu62Yvk/eq+ 
              wxGV351sQTGdR3yvzr8Z76omlKvAX0Rgy7rt/uYX+0RkZSOAc= )

hda16376-16376
    Authorizing DET  (HID=16376|16376)
        IN  TLSA 3 1 0 ( 302a300506032b6570032100b82b27f86b013468fe48 
                d85b54f01bf65385f302ab2e136dc51a3b929c88ce5a )
        IN  HIP ( 5  2001003ffe3ff805e805a98f9df15e2d 
                uCsn+GsBNGj+SNhbVPAb9lOF8wKrLhNtxRo7kpyIzlo= )
        IN  CERT 254 0 0 ( DAYKKwYBBAG0OwIGBmRgXMBmQuHAIAEAP/4/+AXoBa 
                 mPnfFeLbgrJ/hrATRo/kjYW1TwG/ZThfMCqy4TbcUaO5KciM5aIA 
                 EAP/4AAAX5cKTX/Q4UpYcZ8SaHQTV9yscZCjN/KwqfqJXc/h3M4R 
                 Hz366TSNShUany3nQG3bF+FR1vRQqOEbXIYdTID/PcgZaUiGezJw
                 w= )

    Endorsing DET  (HID=16376|16376)
        IN  TLSA 3 1 0 ( 302a300506032b657003210065f26bc01b89398f787c 
                 4785e4e7f6e01f2993137759995d7baa72791a44ac5d )
        IN  TYPE55 \# 152 ( 100500202001003ffe3ff8059b0e2860eb0bacde6 
                 5f26bc01b89398f787c4785e4e7f6e01f2993137759995d7baa7
                 2791a44ac5d )
        IN  CERT 254 0 0 ( DAYKKwYBBAG0OwIGBmRgXMBmQuHAIAEAP/4/+AWbDi 
                 hg6wus3mXya8AbiTmPeHxHheTn9uAfKZMTd1mZXXuqcnkaRKxdIA 
                 EAP/4/+AXoBamPnfFeLXLlMmLYtJRSv9YyTa8hk/zke7vON7zgOR 
                 VCveZKFWqwlC+hrTQOyr8eSe7POBiyUyKVXvcd/8e3hsXEimqEwA
                 M= )

    UA DET in 16376.16376
        IN  TLSA 3 1 0 ( 302a300506032b6570032100bf0453a01120ed8e651a 
                 e9f6951a82783da820296a338effd54a0ba846a99875 )
        IN  HIP ( 5  2001003ffe3ff805a93e53b72709e0ba 
                vwRToBEg7Y5lGun2lRqCeD2oIClqM47/1UoLqEapmHU= )
        IN  CERT 254 0 0 ( DAYKKwYBBAG0OwIGBmRgXMBkaZdAIAEAP/4/+AWpPl 
                 O3Jwngur8EU6ARIO2OZRrp9pUagng9qCApajOO/9VKC6hGqZh1IA 
                 EAP/4/+AWbDihg6wus3pA62QeJwH+UhzcoAVmgcUScrtJ1yRy3PX 
                 gtkEogSS0S4n6w9AxgmOcMXl44KjtD2crEmUtK6CdYZl1iNG/YDQ
                 A= )

]]>
	</artwork>
</figure>
</section>
<section anchor="test_pki" numbered="true" toc="default"> <name>Test X.509 Certificates</name>
<t>
	Under development for next version.
</t>
</section>
</section>
<section numbered="false" toc="default"> <name>Acknowledgments</name>
<t>
	TBD
</t>
</section>
</back>
</rfc>
