< draft-ietf-drip-auth-07.txt   draft-ietf-drip-auth-08.txt >
DRIP Working Group A. Wiethuechter (Editor) DRIP Working Group A. Wiethuechter (Editor)
Internet-Draft S. Card Internet-Draft S. Card
Intended status: Standards Track AX Enterprize, LLC Intended status: Standards Track AX Enterprize, LLC
Expires: 21 October 2022 R. Moskowitz Expires: 28 October 2022 R. Moskowitz
HTT Consulting HTT Consulting
19 April 2022 26 April 2022
DRIP Authentication Formats & Protocols for Broadcast Remote ID DRIP Authentication Formats & Protocols for Broadcast Remote ID
draft-ietf-drip-auth-07 draft-ietf-drip-auth-08
Abstract Abstract
This document describes how to include trust into the ASTM Remote ID This document describes how to include trust into the ASTM Remote ID
specification defined in ASTM F3411 under Broadcast Remote ID (RID). specification defined in ASTM F3411 under Broadcast Remote ID (RID).
It defines a few message schemes (sent within the Authentication It defines a few message schemes (sent within the Authentication
Message) that can be used to authenticate past messages sent by a Message) that can be used to authenticate past messages sent by a
unmanned aircraft (UA) and provide proof of UA trustworthiness even unmanned aircraft (UA) and provide proof of UA trustworthiness even
in the absence of Internet connectivity at the receiving node. in the absence of Internet connectivity at the receiving node.
skipping to change at page 1, line 37 skipping to change at page 1, line 37
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on 21 October 2022. This Internet-Draft will expire on 28 October 2022.
Copyright Notice Copyright Notice
Copyright (c) 2022 IETF Trust and the persons identified as the Copyright (c) 2022 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/ Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document. license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights Please review these documents carefully, as they describe your rights
skipping to change at page 2, line 26 skipping to change at page 2, line 26
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. DRIP Requirements Addressed . . . . . . . . . . . . . . . 3 1.1. DRIP Requirements Addressed . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1. Required Terminology . . . . . . . . . . . . . . . . . . 4 2.1. Required Terminology . . . . . . . . . . . . . . . . . . 4
2.2. Definitions . . . . . . . . . . . . . . . . . . . . . . . 4 2.2. Definitions . . . . . . . . . . . . . . . . . . . . . . . 4
3. Background . . . . . . . . . . . . . . . . . . . . . . . . . 4 3. Background . . . . . . . . . . . . . . . . . . . . . . . . . 4
3.1. Problem Space and Focus . . . . . . . . . . . . . . . . . 4 3.1. Problem Space and Focus . . . . . . . . . . . . . . . . . 4
3.2. Reasoning for IETF DRIP Authentication . . . . . . . . . 4 3.2. Reasoning for IETF DRIP Authentication . . . . . . . . . 4
3.3. ASTM Authentication Message . . . . . . . . . . . . . . . 5 3.3. ASTM Authentication Message . . . . . . . . . . . . . . . 5
3.3.1. Authentication Page . . . . . . . . . . . . . . . . . 5 3.3.1. Authentication Page . . . . . . . . . . . . . . . . . 5
3.3.2. DRIP Constraints . . . . . . . . . . . . . . . . . . 8 3.3.2. ASTM Constraints . . . . . . . . . . . . . . . . . . 8
4. Forward Error Correction . . . . . . . . . . . . . . . . . . 8 4. Forward Error Correction . . . . . . . . . . . . . . . . . . 8
4.1. Encoding . . . . . . . . . . . . . . . . . . . . . . . . 8 4.1. Encoding . . . . . . . . . . . . . . . . . . . . . . . . 8
4.1.1. Single Page FEC . . . . . . . . . . . . . . . . . . . 8 4.1.1. Single Page FEC . . . . . . . . . . . . . . . . . . . 8
4.1.2. Multiple Page FEC . . . . . . . . . . . . . . . . . . 9 4.1.2. Multiple Page FEC . . . . . . . . . . . . . . . . . . 9
4.2. Decoding . . . . . . . . . . . . . . . . . . . . . . . . 12 4.2. Decoding . . . . . . . . . . . . . . . . . . . . . . . . 12
4.2.1. Single Page FEC . . . . . . . . . . . . . . . . . . . 12 4.2.1. Single Page FEC . . . . . . . . . . . . . . . . . . . 12
4.2.2. Multiple Page FEC . . . . . . . . . . . . . . . . . . 12 4.2.2. Multiple Page FEC . . . . . . . . . . . . . . . . . . 12
4.3. FEC Limitations . . . . . . . . . . . . . . . . . . . . . 13 4.3. FEC Limitations . . . . . . . . . . . . . . . . . . . . . 13
5. Broadcast Attestation Structure . . . . . . . . . . . . . . . 13 5. Broadcast Attestation Structure . . . . . . . . . . . . . . . 13
6. DRIP Authentication Formats . . . . . . . . . . . . . . . . . 15 6. DRIP Authentication Formats . . . . . . . . . . . . . . . . . 15
skipping to change at page 5, line 10 skipping to change at page 5, line 10
trustworthy communications over Broadcast RID is an important part of trustworthy communications over Broadcast RID is an important part of
the chain of trust for a UAS ID. No existing formats (defined in the chain of trust for a UAS ID. No existing formats (defined in
[F3411] or other organizations leveraging this feature) provide the [F3411] or other organizations leveraging this feature) provide the
functionality to satisfy this goal resulting in the work reflected in functionality to satisfy this goal resulting in the work reflected in
this document. this document.
3.3. ASTM Authentication Message 3.3. ASTM Authentication Message
The ASTM Authentication Message (Message Type 0x2) is a unique The ASTM Authentication Message (Message Type 0x2) is a unique
message in the Broadcast [F3411] standard as it is the only one that message in the Broadcast [F3411] standard as it is the only one that
is paged. is larger than the Bluetooth 4 frame size. To address this, it is
defined as a set of "pages" that each fits into a single Bluetooth 4
broadcast frame. For other media these pages are still used but all
in a single frame.
3.3.1. Authentication Page 3.3.1. Authentication Page
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+ +---------------+---------------+---------------+---------------+
| Page Header | | | Page Header | |
+---------------+ | +---------------+ |
| | | |
| | | |
skipping to change at page 5, line 35 skipping to change at page 5, line 38
Page Header: (1 byte) Page Header: (1 byte)
Authentication Type (4 bits) Authentication Type (4 bits)
Page Number (4 bits) Page Number (4 bits)
Authentication Payload: (23 bytes per page) Authentication Payload: (23 bytes per page)
Authentication Payload, including headers. Null padded. Authentication Payload, including headers. Null padded.
Figure 1: Standard ASTM Authentication Message Page Figure 1: Standard ASTM Authentication Message Page
A single Authentication Page is akin to a TCP or UDP packet. For A single Authentication Page is akin to a UDP packet. For
Authentication Pages the structure is further wrapped by outer ASTM Authentication Pages the structure is further wrapped by outer ASTM
framing and the specific link framing (Bluetooth or Wi-Fi). framing and the specific link framing (Bluetooth or Wi-Fi).
3.3.1.1. Authentication Type 3.3.1.1. Authentication Type
[F3411] has the following subset of Authentication Type's defined and [F3411] has the following subset of Authentication Type's defined and
that can be used in the Page Header: that can be used in the Page Header:
+=====================+================================+ +=====================+================================+
| Authentication Type | Description | | Authentication Type | Description |
skipping to change at page 8, line 5 skipping to change at page 8, line 5
Figure 2 is the abstract view of the data fields found in the Figure 2 is the abstract view of the data fields found in the
Authentication Message as defined by [F3411]. This data is placed Authentication Message as defined by [F3411]. This data is placed
into Figure 1's Authentication Payload, spanning multiple pages. into Figure 1's Authentication Payload, spanning multiple pages.
When Additional Data is being sent, a single unsigned byte When Additional Data is being sent, a single unsigned byte
(Additional Data Length) directly follows the Authentication Data / (Additional Data Length) directly follows the Authentication Data /
Signature and has the length, in bytes, of the following Additional Signature and has the length, in bytes, of the following Additional
Data. For DRIP, this field is used to carry Forward Error Correction Data. For DRIP, this field is used to carry Forward Error Correction
as defined in Section 4. as defined in Section 4.
3.3.2. DRIP Constraints 3.3.2. ASTM Constraints
To keep consistent formatting across the different transports (Legacy To keep consistent formatting across the different transports (Legacy
and Extended) and their independent restrictions the authentication and Extended) and their independent restrictions the authentication
data being sent is REQUIRED to fit within the page limit of the most data being sent is REQUIRED to fit within the page limit of the most
constrained existing transport can support. Under Broadcast RID the constrained existing transport can support. Under Broadcast RID the
transport that can hold the least amount of authentication data is transport that can hold the least amount of authentication data is
Bluetooth 5 and Wi-Fi BEACON at 9-pages. Bluetooth 5 and Wi-Fi BEACON at 9-pages.
As such DRIP transmitters are REQUIRED to adhere to the following As such DRIP transmitters are REQUIRED to adhere to the following
when using the Authentication Message: when using the Authentication Message:
1. Authentication Data / Signature data MUST fit in a 9-pages (Page 1. Authentication Data / Signature data MUST fit in a 9 pages (Page
Numbers 0 through 8). Numbers 0 through 8).
2. The Length field in the Authentication Headers (which denotes the 2. The Length field in the Authentication Headers (which denotes the
length in bytes of Authentication Data / Signature only) MUST NOT length in bytes of Authentication Data / Signature only) MUST NOT
exceed the value of 201. exceed the value of 201.
4. Forward Error Correction 4. Forward Error Correction
For Broadcast RID, Forward Error Correction (FEC) is provided by the For Broadcast RID, Forward Error Correction (FEC) is provided by the
lower layers in Extended Transports (Bluetooth 5.X, Wi-Fi NaN, and lower layers in Extended Transports (Bluetooth 5.X, Wi-Fi NaN, and
skipping to change at page 19, line 48 skipping to change at page 19, line 48
. . . .
| | | |
+---------------+---------------+---------------+---------------+ +---------------+---------------+---------------+---------------+
Broadcast Attestation: (136-bytes) Broadcast Attestation: (136-bytes)
HDA over UA. Generated by a DRIP Registry during Session ID HDA over UA. Generated by a DRIP Registry during Session ID
registration. registration.
Figure 8: DRIP Link Figure 8: DRIP Link
This DRIP format MUST be used in conjunction with the DRIP Manifest This DRIP format MUST be used in conjunction with another DRIP SAM
with the hash of the DRIP Link message and other dynamic data (such Type (such as Manifest or Wrapper) that contains data that is
as the Location Message (Message Type 0x2)). guaranteed to be unique and easily cross checked by the receiving
device. A good candidate for this is using the DRIP Wrapper to
encapsulate a Location Message (Message Type 0x2).
6.3.2.1. Link Limitations 6.3.2.1. Link Limitations
See Section 10.2 for details on why this structure is not dynamically See Section 10.2 for details on why this structure is not dynamically
signed. signed.
6.3.3. DRIP Wrapper 6.3.3. DRIP Wrapper
This SAM Type is used to wrap and sign over a list of other [F3411] This SAM Type is used to wrap and sign over a list of other [F3411]
Broadcast RID messages. It MUST use the Broadcast Attestation Broadcast RID messages. It MUST use the Broadcast Attestation
skipping to change at page 33, line 13 skipping to change at page 33, line 13
<https://www.rfc-editor.org/info/rfc9153>. <https://www.rfc-editor.org/info/rfc9153>.
[drip-rid] Moskowitz, R., Card, S. W., Wiethuechter, A., and A. [drip-rid] Moskowitz, R., Card, S. W., Wiethuechter, A., and A.
Gurtov, "UAS Remote ID", Work in Progress, Internet-Draft, Gurtov, "UAS Remote ID", Work in Progress, Internet-Draft,
draft-ietf-drip-uas-rid-01, 9 September 2020, draft-ietf-drip-uas-rid-01, 9 September 2020,
<https://www.ietf.org/archive/id/draft-ietf-drip-uas-rid- <https://www.ietf.org/archive/id/draft-ietf-drip-uas-rid-
01.txt>. 01.txt>.
Appendix A. Authentication State Diagrams & Color Scheme Appendix A. Authentication State Diagrams & Color Scheme
ASTM Authentication has really only 3 states: None, Invalid or Valid. ASTM Authentication has only 3 states: None, Invalid or Valid. This
This is because under ASTM the idea is that Authentication is done by is because under ASTM the idea is that Authentication is done by an
an external service hosted somewhere on the Internet so it is assumed external service hosted somewhere on the Internet so it is assumed
you will always get some sort of answer back. With DRIP this you will always get some sort of answer back. With DRIP this
classification becomes more complex with the support of "offline" classification becomes more complex with the support of "offline"
scenarios where the receiver does not have Internet connectivity. scenarios where the receiver does not have Internet connectivity.
With the use of asymmetric keys this means the public key (PK) must With the use of asymmetric keys this means the public key (PK) must
somehow be obtained - [drip-registries] gets more into detail how somehow be obtained - [drip-registries] gets more into detail how
these keys are stored on DNS and one reason for DRIP Authentication these keys are stored on DNS and one reason for DRIP Authentication
is to send PK's over Broadcast RID. is to send PK's over Broadcast RID.
There are two keys of interest: the PK of the UA and the PK of the There are two keys of interest: the PK of the UA and the PK of the
HDA (or Registry). This document gives a clear way to send the PK of HDA (or Registry). This document gives a clear way to send the PK of
 End of changes. 11 change blocks. 
15 lines changed or deleted 20 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/