| < draft-ietf-drip-auth-08.txt | draft-ietf-drip-auth-09.txt > | |||
|---|---|---|---|---|
| DRIP Working Group A. Wiethuechter (Editor) | DRIP Working Group A. Wiethuechter (Editor) | |||
| Internet-Draft S. Card | Internet-Draft S. Card | |||
| Intended status: Standards Track AX Enterprize, LLC | Intended status: Standards Track AX Enterprize, LLC | |||
| Expires: 28 October 2022 R. Moskowitz | Expires: 1 November 2022 R. Moskowitz | |||
| HTT Consulting | HTT Consulting | |||
| 26 April 2022 | 30 April 2022 | |||
| DRIP Authentication Formats & Protocols for Broadcast Remote ID | DRIP Authentication Formats & Protocols for Broadcast Remote ID | |||
| draft-ietf-drip-auth-08 | draft-ietf-drip-auth-09 | |||
| Abstract | Abstract | |||
| This document describes how to include trust into the ASTM Remote ID | This document describes how to include trust into the ASTM Remote ID | |||
| specification defined in ASTM F3411 under Broadcast Remote ID (RID). | specification defined in ASTM F3411 under Broadcast Remote ID (RID). | |||
| It defines a few message schemes (sent within the Authentication | It defines a few message schemes (sent within the Authentication | |||
| Message) that can be used to authenticate past messages sent by a | Message) that can be used to authenticate past messages sent by a | |||
| unmanned aircraft (UA) and provide proof of UA trustworthiness even | unmanned aircraft (UA) and provide proof of UA trustworthiness even | |||
| in the absence of Internet connectivity at the receiving node. | in the absence of Internet connectivity at the receiving node. | |||
| skipping to change at page 1, line 37 ¶ | skipping to change at page 1, line 37 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on 28 October 2022. | This Internet-Draft will expire on 1 November 2022. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2022 IETF Trust and the persons identified as the | Copyright (c) 2022 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
| license-info) in effect on the date of publication of this document. | license-info) in effect on the date of publication of this document. | |||
| Please review these documents carefully, as they describe your rights | Please review these documents carefully, as they describe your rights | |||
| skipping to change at page 2, line 23 ¶ | skipping to change at page 2, line 23 ¶ | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 1.1. DRIP Requirements Addressed . . . . . . . . . . . . . . . 3 | 1.1. DRIP Requirements Addressed . . . . . . . . . . . . . . . 3 | |||
| 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 2.1. Required Terminology . . . . . . . . . . . . . . . . . . 4 | 2.1. Required Terminology . . . . . . . . . . . . . . . . . . 4 | |||
| 2.2. Definitions . . . . . . . . . . . . . . . . . . . . . . . 4 | 2.2. Definitions . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 3. Background . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 3. Background . . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 3.1. Problem Space and Focus . . . . . . . . . . . . . . . . . 4 | 3.1. Problem Space and Focus . . . . . . . . . . . . . . . . . 4 | |||
| 3.2. Reasoning for IETF DRIP Authentication . . . . . . . . . 4 | 3.1.1. Broadcast RID RF Options . . . . . . . . . . . . . . 4 | |||
| 3.2. Reasoning for IETF DRIP Authentication . . . . . . . . . 5 | ||||
| 3.3. ASTM Authentication Message . . . . . . . . . . . . . . . 5 | 3.3. ASTM Authentication Message . . . . . . . . . . . . . . . 5 | |||
| 3.3.1. Authentication Page . . . . . . . . . . . . . . . . . 5 | 3.3.1. Authentication Page . . . . . . . . . . . . . . . . . 5 | |||
| 3.3.2. ASTM Constraints . . . . . . . . . . . . . . . . . . 8 | 3.3.2. ASTM Constraints . . . . . . . . . . . . . . . . . . 8 | |||
| 4. Forward Error Correction . . . . . . . . . . . . . . . . . . 8 | 4. Forward Error Correction . . . . . . . . . . . . . . . . . . 8 | |||
| 4.1. Encoding . . . . . . . . . . . . . . . . . . . . . . . . 8 | 4.1. Encoding . . . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 4.1.1. Single Page FEC . . . . . . . . . . . . . . . . . . . 8 | 4.1.1. Single Page FEC . . . . . . . . . . . . . . . . . . . 8 | |||
| 4.1.2. Multiple Page FEC . . . . . . . . . . . . . . . . . . 9 | 4.1.2. Multiple Page FEC . . . . . . . . . . . . . . . . . . 9 | |||
| 4.2. Decoding . . . . . . . . . . . . . . . . . . . . . . . . 12 | 4.2. Decoding . . . . . . . . . . . . . . . . . . . . . . . . 12 | |||
| 4.2.1. Single Page FEC . . . . . . . . . . . . . . . . . . . 12 | 4.2.1. Single Page FEC . . . . . . . . . . . . . . . . . . . 12 | |||
| 4.2.2. Multiple Page FEC . . . . . . . . . . . . . . . . . . 12 | 4.2.2. Multiple Page FEC . . . . . . . . . . . . . . . . . . 12 | |||
| skipping to change at page 4, line 42 ¶ | skipping to change at page 4, line 44 ¶ | |||
| 3. Background | 3. Background | |||
| 3.1. Problem Space and Focus | 3.1. Problem Space and Focus | |||
| The current standard for Remote ID does not, in any meaningful | The current standard for Remote ID does not, in any meaningful | |||
| capacity, address the concerns of trust in the UA space with | capacity, address the concerns of trust in the UA space with | |||
| communication in the Broadcast RID environment. This is a | communication in the Broadcast RID environment. This is a | |||
| requirement that will need to be addressed eventually for various | requirement that will need to be addressed eventually for various | |||
| different parties that have a stake in the UA industry. | different parties that have a stake in the UA industry. | |||
| 3.1.1. Broadcast RID RF Options | ||||
| A UA has the option of broadcasting using Bluetooth (4 and 5) or Wi- | ||||
| Fi (BEACON or NAN), see Section 7. With Bluetooth, FAA and other CAA | ||||
| mandate transmitting simultaneously over both 4 and 5. With Wi-Fi, | ||||
| use of BEACON is recommended. Wi-Fi NAN is another option, depending | ||||
| on CAA. | ||||
| Bluetooth 4 presents a payload size challenge in that it can only | ||||
| transmit 25 bytes of payload where the others all can support 252 | ||||
| byte payloads. | ||||
| 3.2. Reasoning for IETF DRIP Authentication | 3.2. Reasoning for IETF DRIP Authentication | |||
| The ASTM Authentication Message has provisions in [F3411] to allow | The ASTM Authentication Message has provisions in [F3411] to allow | |||
| for other organizations to standardize additional Authentication | for other organizations to standardize additional Authentication | |||
| formats beyond those explicitly in [F3411]. The standardization of | formats beyond those explicitly in [F3411]. The standardization of | |||
| specific formats to support the DRIP requirements in UAS RID for | specific formats to support the DRIP requirements in UAS RID for | |||
| trustworthy communications over Broadcast RID is an important part of | trustworthy communications over Broadcast RID is an important part of | |||
| the chain of trust for a UAS ID. No existing formats (defined in | the chain of trust for a UAS ID. No existing formats (defined in | |||
| [F3411] or other organizations leveraging this feature) provide the | [F3411] or other organizations leveraging this feature) provide the | |||
| functionality to satisfy this goal resulting in the work reflected in | functionality to satisfy this goal resulting in the work reflected in | |||
| skipping to change at page 5, line 38 ¶ | skipping to change at page 6, line 5 ¶ | |||
| Page Header: (1 byte) | Page Header: (1 byte) | |||
| Authentication Type (4 bits) | Authentication Type (4 bits) | |||
| Page Number (4 bits) | Page Number (4 bits) | |||
| Authentication Payload: (23 bytes per page) | Authentication Payload: (23 bytes per page) | |||
| Authentication Payload, including headers. Null padded. | Authentication Payload, including headers. Null padded. | |||
| Figure 1: Standard ASTM Authentication Message Page | Figure 1: Standard ASTM Authentication Message Page | |||
| A single Authentication Page is akin to a UDP packet. For | A single Authentication Message is akin to a UDP packet. The | |||
| Authentication Pages the structure is further wrapped by outer ASTM | Authentication Message is structured as a set of up to 16 pages. | |||
| framing and the specific link framing (Bluetooth or Wi-Fi). | Over Bluetooth 4, these pages are "fragmented" into separate | |||
| Bluetooth 4 broadcast frames. | ||||
| Either as a single Authentication Message or a set of fragmented | ||||
| Authentication Message Pages the structure(s) is further wrapped by | ||||
| outer ASTM framing and the specific link framing (Bluetooth or Wi- | ||||
| Fi). | ||||
| 3.3.1.1. Authentication Type | 3.3.1.1. Authentication Type | |||
| [F3411] has the following subset of Authentication Type's defined and | [F3411] has the following subset of Authentication Type's defined and | |||
| that can be used in the Page Header: | that can be used in the Page Header: | |||
| +=====================+================================+ | +=====================+================================+ | |||
| | Authentication Type | Description | | | Authentication Type | Description | | |||
| +=====================+================================+ | +=====================+================================+ | |||
| | 0x2 | Operator ID Signature | | | 0x2 | Operator ID Signature | | |||
| skipping to change at page 6, line 26 ¶ | skipping to change at page 6, line 41 ¶ | |||
| 3.3.1.1.1. Specific Authentication Method (SAM) | 3.3.1.1.1. Specific Authentication Method (SAM) | |||
| This document leverages Authentication Type 0x5, Specific | This document leverages Authentication Type 0x5, Specific | |||
| Authentication Method (SAM), defining a set of SAM Types in | Authentication Method (SAM), defining a set of SAM Types in | |||
| Section 6.3. Other Authentication Types are also used in DRIP and | Section 6.3. Other Authentication Types are also used in DRIP and | |||
| their use is defined in Section 6. | their use is defined in Section 6. | |||
| 3.3.1.2. Page Number | 3.3.1.2. Page Number | |||
| There is a technical maximum of 16-pages (indexed 0 to 15 in the Page | There is a technical maximum of 16 pages (indexed 0 to 15 in the Page | |||
| Header) that can be sent for a single Authentication Message, with | Header) that can be sent for a single Authentication Message, with | |||
| each page carrying a max 23-byte Authentication Payload. See | each page carrying a max 23-byte Authentication Payload. See | |||
| Section 3.3.2 for more details. | Section 3.3.2 for more details. | |||
| 3.3.1.3. Authentication Payload Field | 3.3.1.3. Authentication Payload Field | |||
| The following is shown in its complete format. | The following is shown in its complete format. | |||
| 0 1 2 3 | 0 1 2 3 | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| End of changes. 8 change blocks. | ||||
| 9 lines changed or deleted | 28 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||