| rfc9886v1.txt | rfc9886.txt | |||
|---|---|---|---|---|
| skipping to change at line 80 ¶ | skipping to change at line 80 ¶ | |||
| 5.1. HHIT Resource Record | 5.1. HHIT Resource Record | |||
| 5.1.1. Text Representation | 5.1.1. Text Representation | |||
| 5.1.2. Field Descriptions | 5.1.2. Field Descriptions | |||
| 5.2. UAS Broadcast RID Resource Record | 5.2. UAS Broadcast RID Resource Record | |||
| 5.2.1. Text Representation | 5.2.1. Text Representation | |||
| 5.2.2. Field Descriptions | 5.2.2. Field Descriptions | |||
| 6. IANA Considerations | 6. IANA Considerations | |||
| 6.1. DET Prefix Delegation | 6.1. DET Prefix Delegation | |||
| 6.2. IANA DRIP Registry | 6.2. IANA DRIP Registry | |||
| 6.2.1. DRIP RAA Allocations | 6.2.1. DRIP RAA Allocations | |||
| 6.2.2. HHIT Entity Type | 6.2.2. HHIT Entity Types | |||
| 7. Security Considerations | 7. Security Considerations | |||
| 7.1. DNS Operational and Registration Considerations | 7.1. DNS Operational and Registration Considerations | |||
| 7.2. DET and Public Key Exposure | 7.2. DET and Public Key Exposure | |||
| 8. References | 8. References | |||
| 8.1. Normative References | 8.1. Normative References | |||
| 8.2. Informative References | 8.2. Informative References | |||
| Appendix A. Example Zone Files and RRType Contents | Appendix A. Example Zone Files and RRType Contents | |||
| A.1. Example RAA | A.1. Example RAA | |||
| A.1.1. Authentication HHIT | A.1.1. Authentication HHIT | |||
| A.1.2. Delegation of HDA | A.1.2. Delegation of HDA | |||
| skipping to change at line 158 ¶ | skipping to change at line 158 ¶ | |||
| can be independent or handled by another entity as well. | can be independent or handled by another entity as well. | |||
| 1.1. General Concept | 1.1. General Concept | |||
| DRIP Entity Tags (DETs) embed a hierarchy scheme that is mapped onto | DRIP Entity Tags (DETs) embed a hierarchy scheme that is mapped onto | |||
| the Domain Name System (DNS) [STD13]. DIMEs enforce registration and | the Domain Name System (DNS) [STD13]. DIMEs enforce registration and | |||
| information access of data associated with a DET while also providing | information access of data associated with a DET while also providing | |||
| the trust inherited from being a member of the hierarchy. Other | the trust inherited from being a member of the hierarchy. Other | |||
| identifiers and their methods are out of scope for this document. | identifiers and their methods are out of scope for this document. | |||
| Authoritative Name Servers of the DNS provide the public information | Authoritative name servers of the DNS provide the public information | |||
| such as the cryptographic keys, endorsements and certificates of | such as the cryptographic keys, endorsements and certificates of | |||
| DETs, and pointers to private information resources. Cryptographic | DETs, and pointers to private information resources. Cryptographic | |||
| (public) keys are used to authenticate anything signed by a DET, such | (public) keys are used to authenticate anything signed by a DET, such | |||
| as in the Authentication defined in [RFC9575] for Broadcast RID. | as in the Authentication Messages defined in [RFC9575] for Broadcast | |||
| Endorsements and certificates are used to endorse the claim of being | RID. Endorsements and certificates are used to endorse the claim of | |||
| part of the hierarchy. | being part of the hierarchy. | |||
| This document does not specify AAA mechanisms used by Private | This document does not specify AAA mechanisms used by Private | |||
| Information Registries to store and protect Personally Identifiable | Information Registries to store and protect Personally Identifiable | |||
| Information (PII). | Information (PII). | |||
| 1.2. Scope | 1.2. Scope | |||
| The scope of this document is the DNS registration of DETs with the | The scope of this document is the DNS registration of DETs with the | |||
| DNS delegation of the reverse domain of the IPv6 prefix, assigned by | DNS delegation of the reverse domain of the IPv6 prefix (2001:30::/28 | |||
| IANA for DETs 2001:30::/28 and RRsets used to handle DETs. | for DETs) and RRsets used to handle DETs. | |||
| 2. Terminology | 2. Terminology | |||
| 2.1. Required Terminology | 2.1. Required Terminology | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
| "OPTIONAL" in this document are to be interpreted as described in | "OPTIONAL" in this document are to be interpreted as described in | |||
| BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
| capitals, as shown here. | capitals, as shown here. | |||
| skipping to change at line 204 ¶ | skipping to change at line 204 ¶ | |||
| ICAO, PII, Observer, Operator, UA, UAS, USS, and UTM. | ICAO, PII, Observer, Operator, UA, UAS, USS, and UTM. | |||
| From Section 2 of [RFC9434], this document uses: Certificate, DIME, | From Section 2 of [RFC9434], this document uses: Certificate, DIME, | |||
| and Endorsement. | and Endorsement. | |||
| From Section 2 of [RFC9374], this document uses: HDA, HID, and RAA. | From Section 2 of [RFC9374], this document uses: HDA, HID, and RAA. | |||
| 3. DET Hierarchy in DNS | 3. DET Hierarchy in DNS | |||
| [RFC9374] defines the Hierarchical Host Identity Tags (HHIT) and | [RFC9374] defines the Hierarchical Host Identity Tags (HHIT) and | |||
| further specifies an instance of them used for UAS RID called DETs. | further specifies an instance of them used for UAS RID called DET. | |||
| The HHIT/DET is a 128-bit value that is as an IPv6 address intended | The DET is a 128-bit value that is an IPv6 address intended primarily | |||
| primarily as an identifier rather than locator. The format is shown | as an identifier rather than locator. The format is shown in | |||
| in Figure 2 and further information is in [RFC9374]. | Figure 2 and further information is in [RFC9374]. | |||
| +-------------+--------------+---------------+-------------+ | +-------------+--------------+---------------+-------------+ | |||
| | IPv6 Prefix | Hierarchy ID | HHIT Suite ID | ORCHID Hash | | | IPv6 Prefix | Hierarchy ID | HHIT Suite ID | ORCHID Hash | | |||
| | (28 bits) | (28 bits) | (8 bits) | (64 bits) | | | (28 bits) | (28 bits) | (8 bits) | (64 bits) | | |||
| +-------------+--------------+---------------+-------------+ | +-------------+--------------+---------------+-------------+ | |||
| / \ | / \ | |||
| / \ | / \ | |||
| / \-----------------------------\ | / \-----------------------------\ | |||
| / \ | / \ | |||
| / \ | / \ | |||
| skipping to change at line 365 ¶ | skipping to change at line 365 ¶ | |||
| agreements, etc.) will need to be developed. These considerations | agreements, etc.) will need to be developed. These considerations | |||
| should be determined by the CAA, perhaps in consultation with local | should be determined by the CAA, perhaps in consultation with local | |||
| stakeholders to assess the cost-benefits of these approaches (and | stakeholders to assess the cost-benefits of these approaches (and | |||
| others). All of these are out of scope for this document. The | others). All of these are out of scope for this document. The | |||
| specifics for the UAS RID use case are detailed in the rest of | specifics for the UAS RID use case are detailed in the rest of | |||
| document. | document. | |||
| 4. Public Information Registry | 4. Public Information Registry | |||
| Per [RFC9434], all information classified as public is stored in the | Per [RFC9434], all information classified as public is stored in the | |||
| DNS, specifically Authoritative Name Servers, to satisfy REG-1 from | DNS, specifically authoritative name servers, to satisfy REG-1 from | |||
| [RFC9153]. | [RFC9153]. | |||
| Authoritative Name Servers use domain names as identifiers and data | Authoritative name servers use domain names as identifiers and data | |||
| is stored in Resource Records (RRs) with associated RRTypes. This | is stored in Resource Records (RRs) with associated RRTypes. This | |||
| document defines two new RRTypes, one for HHIT metadata (HHIT, | document defines two new RRTypes, one for HHIT metadata (HHIT, | |||
| Section 5.1) and another for UAS Broadcast RID information (BRID, | Section 5.1) and another for UAS Broadcast RID information (BRID, | |||
| Section 5.2). The former RRType is particularly important as it | Section 5.2). The former RRType is particularly important as it | |||
| contains a URI (as part of the certificate) that points to Private | contains a URI (as part of the certificate) that points to Private | |||
| Information resources. | Information resources. | |||
| DETs, being IPv6 addresses, are to be under ip6.arpa. (nibble | DETs, being IPv6 addresses, are to be under ip6.arpa. (nibble | |||
| reversed per Section 2.5 of RFC 3596 [STD88]) and MUST resolve to an | reversed per Section 2.5 of RFC 3596 [STD88]) and MUST resolve to an | |||
| HHIT RRType. Depending on local circumstances or additional use | HHIT RRType. Depending on local circumstances or additional use | |||
| skipping to change at line 415 ¶ | skipping to change at line 415 ¶ | |||
| Broadcast RID information such as the Broadcast Endorsements sent as | Broadcast RID information such as the Broadcast Endorsements sent as | |||
| described in [RFC9575]. | described in [RFC9575]. | |||
| 5. Resource Records | 5. Resource Records | |||
| 5.1. HHIT Resource Record | 5.1. HHIT Resource Record | |||
| The HHIT Resource Record (HHIT, RRType 67) is a metadata record for | The HHIT Resource Record (HHIT, RRType 67) is a metadata record for | |||
| various bits of HHIT-specific information that isn't available in the | various bits of HHIT-specific information that isn't available in the | |||
| pre-existing HIP RRType. The HHIT RRType does not replace the HIP | pre-existing HIP RRType. The HHIT RRType does not replace the HIP | |||
| RRType. The primary advantage of the HHIT RRType over the existing | RRType [RFC8005]. The primary advantage of the HHIT RRType over the | |||
| RRType is the mandatory inclusion of the Canonical Registration | existing RRType is the mandatory inclusion of the Canonical | |||
| Certificate containing an entity's public key signed by the | Registration Certificate containing an entity's public key signed by | |||
| registrar, or other trust anchor, to confirm registration. | the registrar, or other trust anchor, to confirm registration. | |||
| The data MUST be encoded in the Concise Binary Object Representation | The data MUST be encoded in the Concise Binary Object Representation | |||
| (CBOR) [RFC8949] bytes. The Concise Data Definition Language (CDDL) | (CBOR) [RFC8949] bytes. The Concise Data Definition Language (CDDL) | |||
| [RFC8610] of the data is provided in Figure 4. | [RFC8610] of the data is provided in Figure 4. | |||
| 5.1.1. Text Representation | 5.1.1. Text Representation | |||
| The data are represented in base64 [RFC4648] and may be divided into | The data are represented in base64 [RFC4648] and may be divided into | |||
| any number of white-space-separated substrings, down to single base64 | any number of white-space-separated substrings, down to single base64 | |||
| digits, which are concatenated to obtain the full object. These | digits, which are concatenated to obtain the full object. These | |||
| substrings can span lines using the standard parenthesis. Note that | substrings can span lines using the standard parenthesis. Note that | |||
| the data has internal subfields but these do not appear in the master | the data has internal subfields but these do not appear in the zone | |||
| file representation; only a single logical base64 string will appear. | file representation; only a single logical base64 string will appear. | |||
| 5.1.1.1. Presentation Representation | 5.1.1.1. Presentation Representation | |||
| The data MAY, for display purposes only, be represented using the | The data MAY, for display purposes only, be represented using the | |||
| Extended Diagnostic Notation as defined in Appendix G of [RFC8610]. | Extended Diagnostic Notation as defined in Appendix G of [RFC8610]. | |||
| 5.1.2. Field Descriptions | 5.1.2. Field Descriptions | |||
| hhit-rr = [ | hhit-rr = [ | |||
| skipping to change at line 480 ¶ | skipping to change at line 480 ¶ | |||
| the DET. It MUST be encoded as X.509 DER [RFC5280]. This | the DET. It MUST be encoded as X.509 DER [RFC5280]. This | |||
| certificate MAY be self-signed when the entity is acting as a root | certificate MAY be self-signed when the entity is acting as a root | |||
| of trust (i.e., an apex). Such self-signed behavior is defined by | of trust (i.e., an apex). Such self-signed behavior is defined by | |||
| policy, such as in [drip-dki], and is out of scope for this | policy, such as in [drip-dki], and is out of scope for this | |||
| document. This certificate is part of a chain of certificates | document. This certificate is part of a chain of certificates | |||
| that can be used to validate inclusion in the hierarchy. | that can be used to validate inclusion in the hierarchy. | |||
| 5.2. UAS Broadcast RID Resource Record | 5.2. UAS Broadcast RID Resource Record | |||
| The UAS Broadcast RID Resource Record (BRID, RRType 68) is a format | The UAS Broadcast RID Resource Record (BRID, RRType 68) is a format | |||
| to hold public information typically sent over UAS Broadcast RID that | to hold information typically sent over UAS Broadcast RID that is | |||
| is static. It can act as a data source if information is not | static. It can act as a data source if information is not received | |||
| received over Broadcast RID or for cross validation. The primary | over Broadcast RID or for cross validation. The primary function for | |||
| function for DRIP is to include of one or more Broadcast Endorsements | DRIP is to include of one or more Broadcast Endorsements as defined | |||
| as defined in [RFC9575] in the auth field. These Endorsements are | in [RFC9575] in the auth field. These Endorsements are generated by | |||
| generated by the registrar upon successful registration and broadcast | the registrar upon successful registration and broadcast by the | |||
| by the entity. | entity. | |||
| The data MUST be encoded in CBOR [RFC8949] bytes. The CDDL [RFC8610] | The data MUST be encoded in CBOR [RFC8949] bytes. The CDDL [RFC8610] | |||
| of the data is provided in Figure 5. | of the data is provided in Figure 5. | |||
| 5.2.1. Text Representation | 5.2.1. Text Representation | |||
| The data are represented in base64 [RFC4648] and may be divided into | The data are represented in base64 [RFC4648] and may be divided into | |||
| any number of white-space-separated substrings, down to single base64 | any number of white-space-separated substrings, down to single base64 | |||
| digits, which are concatenated to obtain the full object. These | digits, which are concatenated to obtain the full object. These | |||
| substrings can span lines using the standard parenthesis. Note that | substrings can span lines using the standard parenthesis. Note that | |||
| the data has internal subfields but these do not appear in the master | the data has internal subfields but these do not appear in the zone | |||
| file representation; only a single logical base64 string will appear. | file representation; only a single logical base64 string will appear. | |||
| 5.2.1.1. Presentation Representation | 5.2.1.1. Presentation Representation | |||
| The data MAY, for display purposes only, be represented using the | The data MAY, for display purposes only, be represented using the | |||
| Extended Diagnostic Notation as defined in Appendix G of [RFC8610]. | Extended Diagnostic Notation as defined in Appendix G of [RFC8610]. | |||
| All byte strings longer than a length of 20 SHOULD be displayed as | All byte strings longer than a length of 20 SHOULD be displayed as | |||
| base64 when possible. | base64 when possible. | |||
| 5.2.2. Field Descriptions | 5.2.2. Field Descriptions | |||
| skipping to change at line 616 ¶ | skipping to change at line 616 ¶ | |||
| Table 1: RAA Ranges | Table 1: RAA Ranges | |||
| 6.2.1.1. RAA Allocation Fields | 6.2.1.1. RAA Allocation Fields | |||
| Value: The RAA value delegated for this entry. | Value: The RAA value delegated for this entry. | |||
| Name: Name of the delegated RAA. For the ISO 3166-1 Countries | Name: Name of the delegated RAA. For the ISO 3166-1 Countries | |||
| (Section 6.2.1.4), this should be the name of the country. | (Section 6.2.1.4), this should be the name of the country. | |||
| Policy Reference: A publicly accessible link to the requirements for | Reference: A publicly accessible link to the policy requirements for | |||
| prospective HDA operators to register under this RAA. This field | prospective HDA operators to register under this RAA. This field | |||
| is OPTIONAL. | is OPTIONAL. | |||
| Contact: Contact details of the administrator of this RAA that | Contact: Contact details of the administrator of this RAA that | |||
| prospective HDA operators can make informational queries to. | prospective HDA operators can make informational queries to. | |||
| 6.2.1.2. RAA Registration Form | 6.2.1.2. RAA Registration Form | |||
| Value: | Value: | |||
| Name: | Name: | |||
| Policy Reference: | Reference: | |||
| Contact: | Contact: | |||
| NS RRType Content (HDA=0): | NS RRType Content (HDA=0): | |||
| NS RRType Content (HDA=4096): | NS RRType Content (HDA=4096): | |||
| NS RRType Content (HDA=8192): | NS RRType Content (HDA=8192): | |||
| NS RRType Content (HDA=12288): | NS RRType Content (HDA=12288): | |||
| Figure 6: RAA Delegation Request Form | Figure 6: RAA Delegation Request Form | |||
| The NS RRType Content (HDA=X) fields are used by IANA to perform the | The NS RRType Content (HDA=X) fields are used by IANA to perform the | |||
| DNS delegations under 3.0.0.1.0.0.2.ip6.arpa.. See Section 6.2.1.3 | DNS delegations under 3.0.0.1.0.0.2.ip6.arpa.. See Section 6.2.1.3 | |||
| skipping to change at line 669 ¶ | skipping to change at line 669 ¶ | |||
| 6.2.1.4. ISO 3166-1 Countries Range | 6.2.1.4. ISO 3166-1 Countries Range | |||
| The mapping between ISO 3166-1 Numeric Nation Codes and RAAs is | The mapping between ISO 3166-1 Numeric Nation Codes and RAAs is | |||
| specified and documented by IANA. Each Nation is assigned 4 RAAs | specified and documented by IANA. Each Nation is assigned 4 RAAs | |||
| that are left to the national authority for their purpose. For RAAs | that are left to the national authority for their purpose. For RAAs | |||
| under this range, a shorter prefix of 2001:3x:xx00::/40 MAY be | under this range, a shorter prefix of 2001:3x:xx00::/40 MAY be | |||
| delegated to each CAA, which covers all 4 RAAs (and reserved HDAs) | delegated to each CAA, which covers all 4 RAAs (and reserved HDAs) | |||
| assigned to them. | assigned to them. | |||
| This range is set to IESG Approval (Section 4.10 of [RFC8126]) and | The registration policy for this range is set to IESG Approval | |||
| IANA will liaise with the ICAO to verify the authenticity of | (Section 4.10 of [RFC8126]) and IANA will liaise with the ICAO to | |||
| delegation requests (using Figure 6) by CAAs. | verify the authenticity of delegation requests (using Figure 6) by | |||
| CAAs. | ||||
| 6.2.1.5. Private Range | 6.2.1.5. Private Range | |||
| If nibble-reversed lookup in DNS is desired, it can only be provided | If nibble-reversed lookup in DNS is desired, it can only be provided | |||
| by private DNS servers as zone delegations from the global root will | by private DNS servers as zone delegations from the global root will | |||
| not be performed for this address range. Thus the RAAs (with its | not be performed for this address range. Thus the RAAs (with its | |||
| subordinate HDAs) in this range may be used in like manner and IANA | subordinate HDAs) in this range may be used in like manner and IANA | |||
| will not delegate any value in this range to any party (as per | will not delegate any value in this range to any party (as per | |||
| Private Use, Section 4.1 of [RFC8126]). | Private Use, Section 4.1 of [RFC8126]). | |||
| One anticipated acceptable use of the private range is for | One anticipated acceptable use of the private range is for | |||
| experimentation and testing prior to request allocation or assignment | experimentation and testing prior to request allocation or assignment | |||
| from IANA. | from IANA. | |||
| 6.2.2. HHIT Entity Type | 6.2.2. HHIT Entity Types | |||
| This document requests a new registry for HHIT Entity Type under the | This document requests a new registry for HHIT Entity Types under the | |||
| "Drone Remote ID Protocol" registry group | "Drone Remote ID Protocol" registry group | |||
| <https://www.iana.org/assignments/drip>. | <https://www.iana.org/assignments/drip>. | |||
| HHIT Entity Type: Numeric, field of the HHIT RRType to encode the | HHIT Entity Type: Numeric, field of the HHIT RRType to encode the | |||
| HHIT Entity Type. All entries in this registry are under the | HHIT Entity Type. All entries in this registry are under the | |||
| First Come First Served policy (Section 4.4 of [RFC8126]). | First Come First Served policy (Section 4.4 of [RFC8126]). | |||
| 6.2.2.1. HHIT Type Registry Fields | 6.2.2.1. HHIT Type Registry Fields | |||
| Value: HHIT Type value of the entry. | Value: HHIT Type value of the entry. | |||
| skipping to change at line 763 ¶ | skipping to change at line 764 ¶ | |||
| | 27 | Crowd Sourced RID Finder | RFC 9886 | | | 27 | Crowd Sourced RID Finder | RFC 9886 | | |||
| +-------+-------------------------------------------+-----------+ | +-------+-------------------------------------------+-----------+ | |||
| Table 2: HHIT Entity Type Initial Values | Table 2: HHIT Entity Type Initial Values | |||
| 7. Security Considerations | 7. Security Considerations | |||
| 7.1. DNS Operational and Registration Considerations | 7.1. DNS Operational and Registration Considerations | |||
| The Registrar and Registry are commonly used concepts in the DNS. | The Registrar and Registry are commonly used concepts in the DNS. | |||
| These components interface the DIME into the DNS hierarchy and thus | These components connect the DIME with the DNS hierarchy and thus | |||
| operation SHOULD follow best common practices, specifically in | operation SHOULD follow best common practices, specifically in | |||
| security (such as running DNSSEC) as appropriate except when national | security (such as running DNSSEC) as appropriate except when national | |||
| regulations prevent it. [BCP237] provides suitable guidance. | regulations prevent it. [BCP237] provides suitable guidance. | |||
| If DNSSEC is used, a DNSSEC Practice Statement SHOULD be developed | If DNSSEC is used, a DNSSEC Practice Statement SHOULD be developed | |||
| and published. It SHOULD explain how DNSSEC has been deployed and | and published. It SHOULD explain how DNSSEC has been deployed and | |||
| what security measures are in place. [RFC6841] documents a framework | what security measures are in place. [RFC6841] documents a framework | |||
| for DNSSEC policies and DNSSEC Practice Statements. A self-signed | for DNSSEC policies and DNSSEC Practice Statements. A self-signed | |||
| entity (i.e., an entity that self-signed its certificate as part of | entity (i.e., an entity that self-signed its certificate as part of | |||
| the HHIT RRType) MUST use DNSSEC. | the HHIT RRType) MUST use DNSSEC. | |||
| skipping to change at line 852 ¶ | skipping to change at line 853 ¶ | |||
| 8.1. Normative References | 8.1. Normative References | |||
| [F3411] ASTM International, "Standard Specification for Remote ID | [F3411] ASTM International, "Standard Specification for Remote ID | |||
| and Tracking", ASTM F3411-22A, DOI 10.1520/F3411-22A, July | and Tracking", ASTM F3411-22A, DOI 10.1520/F3411-22A, July | |||
| 2022, <https://www.astm.org/f3411-22a.html>. | 2022, <https://www.astm.org/f3411-22a.html>. | |||
| [ISO3166-1] | [ISO3166-1] | |||
| ISO, "Codes for the representation of names of countries | ISO, "Codes for the representation of names of countries | |||
| and their subdivisions - Part 1: Country code", | and their subdivisions - Part 1: Country code", | |||
| ISO 3166-1:2020, August 2020, | ISO 3166-1:2020, August 2020, | |||
| <https://www.iso.org/iso-3166-country-codes.html>. | <https://www.iso.org/standard/72482.html>. | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
| [RFC4648] Josefsson, S., "The Base16, Base32, and Base64 Data | [RFC4648] Josefsson, S., "The Base16, Base32, and Base64 Data | |||
| Encodings", RFC 4648, DOI 10.17487/RFC4648, October 2006, | Encodings", RFC 4648, DOI 10.17487/RFC4648, October 2006, | |||
| <https://www.rfc-editor.org/info/rfc4648>. | <https://www.rfc-editor.org/info/rfc4648>. | |||
| skipping to change at line 904 ¶ | skipping to change at line 905 ¶ | |||
| Housley, R., and W. Polk, "Internet X.509 Public Key | Housley, R., and W. Polk, "Internet X.509 Public Key | |||
| Infrastructure Certificate and Certificate Revocation List | Infrastructure Certificate and Certificate Revocation List | |||
| (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008, | (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008, | |||
| <https://www.rfc-editor.org/info/rfc5280>. | <https://www.rfc-editor.org/info/rfc5280>. | |||
| [RFC6841] Ljunggren, F., Eklund Lowinder, AM., and T. Okubo, "A | [RFC6841] Ljunggren, F., Eklund Lowinder, AM., and T. Okubo, "A | |||
| Framework for DNSSEC Policies and DNSSEC Practice | Framework for DNSSEC Policies and DNSSEC Practice | |||
| Statements", RFC 6841, DOI 10.17487/RFC6841, January 2013, | Statements", RFC 6841, DOI 10.17487/RFC6841, January 2013, | |||
| <https://www.rfc-editor.org/info/rfc6841>. | <https://www.rfc-editor.org/info/rfc6841>. | |||
| [RFC8005] Laganier, J., "Host Identity Protocol (HIP) Domain Name | ||||
| System (DNS) Extension", RFC 8005, DOI 10.17487/RFC8005, | ||||
| October 2016, <https://www.rfc-editor.org/info/rfc8005>. | ||||
| [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for | [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for | |||
| Writing an IANA Considerations Section in RFCs", BCP 26, | Writing an IANA Considerations Section in RFCs", BCP 26, | |||
| RFC 8126, DOI 10.17487/RFC8126, June 2017, | RFC 8126, DOI 10.17487/RFC8126, June 2017, | |||
| <https://www.rfc-editor.org/info/rfc8126>. | <https://www.rfc-editor.org/info/rfc8126>. | |||
| [RFC8610] Birkholz, H., Vigano, C., and C. Bormann, "Concise Data | [RFC8610] Birkholz, H., Vigano, C., and C. Bormann, "Concise Data | |||
| Definition Language (CDDL): A Notational Convention to | Definition Language (CDDL): A Notational Convention to | |||
| Express Concise Binary Object Representation (CBOR) and | Express Concise Binary Object Representation (CBOR) and | |||
| JSON Data Structures", RFC 8610, DOI 10.17487/RFC8610, | JSON Data Structures", RFC 8610, DOI 10.17487/RFC8610, | |||
| June 2019, <https://www.rfc-editor.org/info/rfc8610>. | June 2019, <https://www.rfc-editor.org/info/rfc8610>. | |||
| skipping to change at line 1455 ¶ | skipping to change at line 1460 ¶ | |||
| } | } | |||
| Figure 21: 2001:3f:fe00:a05:1308:2469:9a4b:c6b2 Decoded BRID | Figure 21: 2001:3f:fe00:a05:1308:2469:9a4b:c6b2 Decoded BRID | |||
| RRType CBOR | RRType CBOR | |||
| Acknowledgements | Acknowledgements | |||
| Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT | Thanks to Stuart Card (AX Enterprize, LLC) and Bob Moskowitz (HTT | |||
| Consulting, LLC) for their early work on the DRIP registries concept. | Consulting, LLC) for their early work on the DRIP registries concept. | |||
| Their early contributions laid the foundation for the content and | Their early contributions laid the foundation for the content and | |||
| processes of this architecture and document. | processes of this architecture and document. The authors would also | |||
| like to thank the DRIP chairs and AD, the reviewers from the various | ||||
| Directorates, and the members of the IESG at time of publication. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Adam Wiethuechter (editor) | Adam Wiethuechter (editor) | |||
| AX Enterprize, LLC | AX Enterprize, LLC | |||
| 4947 Commercial Drive | 4947 Commercial Drive | |||
| Yorkville, NY 13495 | Yorkville, NY 13495 | |||
| United States of America | United States of America | |||
| Email: adam.wiethuechter@axenterprize.com | Email: adam.wiethuechter@axenterprize.com | |||
| End of changes. 20 change blocks. | ||||
| 36 lines changed or deleted | 43 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||