Re: [Tm-rid] charter draft v4

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Fri, 17 January 2020 22:38 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: tm-rid@ietfa.amsl.com
Delivered-To: tm-rid@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F08012006B for <tm-rid@ietfa.amsl.com>; Fri, 17 Jan 2020 14:38:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.497
X-Spam-Level:
X-Spam-Status: No, score=-14.497 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=V1U7+ugh; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=rRB3kCt1
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZVEwNyMp38aR for <tm-rid@ietfa.amsl.com>; Fri, 17 Jan 2020 14:38:54 -0800 (PST)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 66A5A120026 for <tm-rid@ietf.org>; Fri, 17 Jan 2020 14:38:54 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=47097; q=dns/txt; s=iport; t=1579300734; x=1580510334; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=Uy9suJCfJI9vzgNn3ycofoWDU5rIPjUbbZLdh7HVyAs=; b=V1U7+ughGvL0bRIEdyXSXISNvXM92dzpMMrO2eVoZ7sBfzdkYllPEj29 xgRv3j4GiCeJkTLao8LqBAIMniGFr3ppYbjE3GOv9CSIGoDQxWTjY151I rJdGoDWH7KvBJT+6ERwQAPPFDvbMwNWAMsaaRJwDPcYPIi0zhAJkmMQYZ U=;
IronPort-PHdr: 9a23:+XbHah8ufs6tY/9uRHGN82YQeigqvan1NQcJ650hzqhDabmn44+8ZB7E/fs4iljPUM2b8P9Ch+fM+4HYEW0bqdfk0jgZdYBUERoMiMEYhQslVcObGEvwL/PCZC0hF8MEX1hgrDm2
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AHCgCfNiJe/5pdJa1LEAEJHAEBAQEBBwEBEQEEBAEBgXuBJS8pJwVsWCAECyqEEYFegWgDinqCX4EBlw2BQoEQA1QJAQEBDAEBJwYCAQGDCnFFAheBcyQ4EwIDDQEBBAEBAQIBBQRthTcMhV4BAQEBAQISER0BASwLAQ8CAQgRAwECIQEJAgICMB0IAgQBDQUigwQBgX1NAy4BDjqiAAKBOYhhdYEygn8BAQWBLwERAkABgwAYggwDBoE2ilGBQxqBQT+BEScgghc1PoJkAQEBAQEBGIEPDQEnGgkNC4JYMoIsjUwofoFhhVwkiU2PMAqCOYc9hUOELIUEG4JHMIdWhESJe4FmjGWBd4FJgwKEFpIkAgQCBAUCDgEBBYFpIkSBFHAVOyoBgg0BATIJRxgNh10kCwEXgQQBAgmCQIF/glo7giODGwF0AgGBJow+AQE
X-IronPort-AV: E=Sophos;i="5.70,331,1574121600"; d="scan'208,217";a="707562854"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 17 Jan 2020 22:38:52 +0000
Received: from XCH-RCD-005.cisco.com (xch-rcd-005.cisco.com [173.37.102.15]) by rcdn-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id 00HMcqgL017101 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 17 Jan 2020 22:38:53 GMT
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by XCH-RCD-005.cisco.com (173.37.102.15) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 17 Jan 2020 16:38:52 -0600
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 17 Jan 2020 17:38:50 -0500
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 17 Jan 2020 16:38:50 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=a5XgWBl4ahXF/zBg5OXzYa+N/vxEYziRa3rWMoI6lzlbLFRcdXwSz85rdFcjMlouWOmX7kTnlaVx47eby3817rkY89J3hlL5FlKU1PHhh91LOjPrlsxAuk/JzFvDe5nDc/2TMISbC9LYarG7f00KufAyxueuHANwjCl8z9ku7/tQkPRYhzSEOnyPzdP8MpB5sHMPzzq/8h+FgxupSFb8u1ySpuijzlKz6K2NJGYny0bozeoFuxcg/5YanUY5Q0B9QdMMqpDf8OrDKk2xp67fF6fmYAVzex25+s2ucMNvKi1PJXvNFpjN0PylzQH4WZmiWNbYAnw3IZkwv1Z15+6L2Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Uy9suJCfJI9vzgNn3ycofoWDU5rIPjUbbZLdh7HVyAs=; b=Yiy1e404mKZcsQ9iElYbwWutGk9UJ0hLfqgZLeT157TbqAXF2RS/sa6+kRynpwQCT1qradZ2TSQCDa+NVylmJEfj5twWK15CJPf9lcfd0TKQ0AQWFRAB4iHizWVDgUGDCNutyxzEUFQPjbcJ/wzVnmzkLUIYEbJLXVRKfEDWCyJwGsRzaOgPJLmxOWG1bMcOJG6HPjgx9n6pd59y1m1twBEFyp5gIcT/g4tA5kCCKzrZF9HGVly2NAlHWV2LXdsSG6b3l1nQWzaDQ8FXOzKL/Rdye2RA1z0DevfPSbAfzVH7smw806WZTJzpreQE+8FZRB4OM94fEn6BxaYLQz+/Wg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Uy9suJCfJI9vzgNn3ycofoWDU5rIPjUbbZLdh7HVyAs=; b=rRB3kCt16F9RjMmsv2JKjhLZf7LVWl2kMbpSTHqZC3n8xqUO3eDnVEaZZKT5fg8fEyGwRTBlenT4M4i/9rBUz+8M34xqxBEIQ0pg868C8KCsbKlR1/IP7PYian3Z9bebbLTcX9hvO4jtFsETzvnl2OD0r3Kbi7zRVq9ooD7SFVQ=
Received: from DM5PR11MB1753.namprd11.prod.outlook.com (10.175.88.141) by DM5PR11MB1305.namprd11.prod.outlook.com (10.168.107.149) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2644.19; Fri, 17 Jan 2020 22:38:49 +0000
Received: from DM5PR11MB1753.namprd11.prod.outlook.com ([fe80::9528:bb7a:843e:5ea3]) by DM5PR11MB1753.namprd11.prod.outlook.com ([fe80::9528:bb7a:843e:5ea3%12]) with mapi id 15.20.2644.021; Fri, 17 Jan 2020 22:38:49 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: "Card, Stu" <stu.card@axenterprize.com>, "tm-rid@ietf.org" <tm-rid@ietf.org>
CC: ryoung <ryoung@one-atm.net>, Seth Rao <seth@secreliant.com>, Andy Thurling <athurling@nuair.org>, Monica Pearson <Monica.pearson@secreliant.com>
Thread-Topic: [Tm-rid] charter draft v4
Thread-Index: AQHVx+bqv8TtPDECLkSvwWfLsygvB6fvjrkA
Date: Fri, 17 Jan 2020 22:38:48 +0000
Message-ID: <388D0E9F-800E-4AB5-878F-8278E1F84DC1@cisco.com>
References: <CAKM0pYNzuouXg0V=2dT3DoVrDAuvvdNNvecjz8Vi=XRjST2GMA@mail.gmail.com>
In-Reply-To: <CAKM0pYNzuouXg0V=2dT3DoVrDAuvvdNNvecjz8Vi=XRjST2GMA@mail.gmail.com>
Accept-Language: fr-BE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.21.0.200113
authentication-results: spf=none (sender IP is ) smtp.mailfrom=evyncke@cisco.com;
x-originating-ip: [2001:420:c0c1:36:c893:fd9f:ece5:7ebe]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 681a7a8f-92ef-4a10-5ad0-08d79b9e053b
x-ms-traffictypediagnostic: DM5PR11MB1305:
x-microsoft-antispam-prvs: <DM5PR11MB13052949CF95DD801DCDF683A9310@DM5PR11MB1305.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7691;
x-forefront-prvs: 0285201563
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(396003)(39860400002)(366004)(376002)(346002)(189003)(199004)(4326008)(2616005)(66574012)(54906003)(110136005)(6512007)(478600001)(966005)(64756008)(66556008)(36756003)(186003)(66446008)(316002)(86362001)(76116006)(66946007)(81156014)(91956017)(66476007)(6486002)(81166006)(5660300002)(33656002)(71200400001)(6506007)(16799955002)(8676002)(8936002)(53546011)(2906002); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR11MB1305; H:DM5PR11MB1753.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: qOekPglSf951cxMmA2rXtW7Ryccd3kVHRK6cfN4C5iuRqPyLvqhHPw6KtrEo4Tg4EtbriVVkEvQJB0li2ROlqHD4svih8Z4aYkLsvZAgtTQixHS7WWJcRfud+/t5M+hnTdwl4yX0/obyJtuSepXtH9VbDmWM6ewSfvAMgj7X5MWs1/D28TQynPBiArwst3o4EwaFBiMO9ZgqLPu7Ff4KgF/ZpxwOgIoivvoe4ibvoH+kwT5mcRh9b9qt5wYF6YLMr9bMMI74CB4v7piGmwV9EhsaTlrf7Ck2fOn79ZICx7qIF/NpoYuEfeg4Z43GsHU4fOQM33hPb8F85BhL6v/vezrnWEiq9FAaKSqxUMtJcW71hfOTx1DNQ7l5Xd/z4QVDGNS7yWADWa4t9tzR2zWjaeBlwsiBC1VqHMz5BRHVb71VOJjW4uuwK40Q4S6c6eormDwkQIM4otRDgRMJNs5FljSDqeIIzrVdYCDfGO3Hu7E=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_388D0E9F800E4AB5878F8278E1F84DC1ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 681a7a8f-92ef-4a10-5ad0-08d79b9e053b
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Jan 2020 22:38:48.9399 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: iosaeqHhuy/wNoQfADajFvW6eRqtSWxNaNyoMIh9y3L3dzhFNAiRVky507VbNtYeZPOI0WDfjN0SUA3ZtafUgQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR11MB1305
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.15, xch-rcd-005.cisco.com
X-Outbound-Node: rcdn-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tm-rid/Y7jgT9zhwNSS3C0d2toRz1N2VvA>
Subject: Re: [Tm-rid] charter draft v4
X-BeenThere: tm-rid@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Trustworthy Multipurpose RemoteID <tm-rid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tm-rid/>
List-Post: <mailto:tm-rid@ietf.org>
List-Help: <mailto:tm-rid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Jan 2020 22:38:58 -0000

Dear TMRID members,

In order to move forward with the creation of the TMRIG WG, I have copied the charter into the IETF ‘datatracker’, this is the first step.

https://datatracker.ietf.org/doc/charter-ietf-tmrid/

I personally find it still difficult to read and it lacks the list of current drafts. May I ask this mailing list to improve this text? I would love to propose it to the IESG internal review in time to potentially be a WG in Vancouver.

Regards

-éric


From: Tm-rid <tm-rid-bounces@ietf.org> on behalf of "Card, Stu" <stu.card@axenterprize.com>
Date: Friday, 10 January 2020 at 19:51
To: "tm-rid@ietf.org" <tm-rid@ietf.org>
Cc: ryoung <ryoung@one-atm.net>, Seth Rao <seth@secreliant.com>, Andy Thurling <athurling@nuair.org>, Monica Pearson <Monica.pearson@secreliant.com>
Subject: [Tm-rid] charter draft v4

all --

I have attempted to address all comments received; see revised charter draft v4 below.

Unfortunately, the lists of milestones, drafts, acronyms and references made it still longer (although the body text of the charter itself is now clearer and more succinct). I generally have not listed all the potentially relevant RFCs as there could be many and presumably anyone reading an IETF Working Group charter knows how to use the datatracker.

While I have identified all the other SDOs of which I am aware with whom we may need liaison, actually getting a liaison agreement is both above my pay grade and difficult before we have a charter (i.e. why would ASTM take us seriously until we have a WG).

I appreciate your reviews of earlier drafts. Your comments made this much better!

Please review this latest draft at your earliest convenience as the need for trustworthy, immediately actionable UAS RID is urgent, the FAA NPRM comment period expires at the end of February, ASTM is resuming work to revise their standard accordingly, and IETF 107 in Vancouver is in March. :-)

Other than updating and substantially expanding my proposed Applicability Statement (draft-card-tmrid-uas-00), what is next to get this moving, specifically through IESG chartering and generally forward?

Thanks all!

==

Trustworthy Multipurpose Remote Identification (TM-RID) Proposed WG Charter v4

CAAs [1] worldwide have initiated rule making for UAS [2] RID [3]. The US FAA [4] has published a NPRM [5].  CAAs currently promulgate performance-based regulations that do not mandate specific techniques, but rather cite industry consensus technical standards as acceptable means of compliance. One key standard is ASTM WK65041 [6].  Network RID defines a set of information for UAS to make available globally indirectly via the Internet. Broadcast RID defines a set of messages for UA [7] to send locally directly one-way over Bluetooth or Wi-Fi. WK65041 addresses how to neither populate/query registries, ensure trustworthiness of information nor make it instantly useful.

TM-RID’s goal is to make RID immediately actionable, in both Internet and local-only connected scenarios, especially emergencies, in severely constrained UAS environments [8], balancing legitimate (e.g. public safety) authorities’ Need To Know trustworthy information with UAS operators’ privacy. To accomplish this, TM-RID will liaise with SDOs [9] and complement their standards with IETF work to meet this urgent need. An Applicability Statement RFC for UAS RID, showing how to use IETF standardized technologies for this purpose, will be a central work product. Technical Specification RFCs will address any necessary enhancements of specific supporting protocols. TM-RID potentially could be applied to verifiably identify other types of registered things reported to be in specified physical locations, but the urgent motivation and clear initial focus is UAS.

One possible approach leverages Internet domain name registration business models, infrastructure and standards, including EPP [10], RDAP [11] and DNS [12], plus the HIP [13] HIT [14], with UTM [15] system USS [16] as registries. This provides stronger privacy and authenticity than other FAA NPRM / ASTM standard UAS ID Types (static manufacturer assigned hardware serial number per [17] or dynamic single-use USS assigned UUID [18]), but would necessitate several HIP enhancements (all with applicability beyond UAS RID); prototypes using DNS to reverse lookup UAS RID information from a broadcast HIT have been successfully flown. Any comprehensive approach should –

- Verifiably identify all entities in the UTM ecosystem – UA, GCS [19], observer devices, registries, USS, et al – presumably using public key operations to:
= prove ownership of the claimed ID;
= authenticate other claims made via RID (e.g. location) as signed by the owner of that ID; and
= provide observers [w/o Internet connectivity] locally verifiable proof that ID is in a known registry.

- Enable all observers to use a received ID to look up minimal public information.

- Enable only strongly authenticated, policy authorized observers to look up more extensive private information (including operator PII [20]) needed for legitimate (e.g. public safety or security) purposes in access controlled registries (e.g. as with Internet domain names [21]).

Proposed milestones, accelerated to meet urgent UAS RID safety/security need –

2020 MAR: Present contemplated technical approach and solicit alternative approaches.
draft-wiethuechter-tmrid-auth-04<https://datatracker.ietf.org/doc/draft-wiethuechter-tmrid-auth/>
draft-card-tmrid-uas-00<https://datatracker.ietf.org/doc/draft-card-tmrid-uas/>
2020 JUL: Select technical approach from those proposed in sufficient detail to enable assessment.
2020 NOV: Drafts initially essential for UAS RID to IESG (within one year of the FAA NPRM).

Potential milestones in collaboration with the HIP WG, supporting UAS RID and other applications –

2020 MAR new cryptographic algorithms: Extremely compact keys and signatures (such as are enabled by EdDSA and Keccak functions) are needed for severely constrained [UAS] environments.
draft-moskowitz-hip-new-crypto-03<https://datatracker.ietf.org/doc/draft-moskowitz-hip-new-crypto/>
draft-moskowitz-orchid-cshake-00<https://datatracker.ietf.org/doc/draft-moskowitz-orchid-cshake/>

2020 MAR HHIT [22]: Enable scalable trustable [UA] registration and information retrieval (e.g. RDAP, DNS) by adding optional structure to the currently flat space of HITs / ORCHIDs [23] derived from and compactly (as IPv6 addresses) representing HIs [24] ([self-generated] public keys).
draft-moskowitz-hip-hierarchical-hit-03<https://datatracker.ietf.org/doc/draft-moskowitz-hip-hierarchical-hit/>

2020 JUL registration extensions:  Prevent registration of duplicate HHITs, populate registries with IDs and associated data, update DNS and provide proof of authenticity.
draft-moskowitz-hip-hhit-registries-01<https://datatracker.ietf.org/doc/draft-moskowitz-hip-hhit-registries/>

2020 JUL OAuth investigation: Explore and if feasible document, HIP as an OAuth method [for UTM].

2021 MAR proxies: Enable any observer of a [UA] “thing” to contact an intermediary that will either deny or facilitate secure communications with the operator of the thing, while maintaining the privacy of the operator’s location and PII to all but authorized parties, per policy.

2021 JUL multicast: To securely and efficiently communicate with a group, multicast to their ephemeral (and likely multiple per host) IP addresses, starting from individual and/or group HITs.

Acronyms and references:

[1] Civil Aviation Authority
[2] Unmanned Aircraft System[s]
[3] Remote Identification
[4] United States Federal Aviation Administration
[5] Notice of Proposed Rule-Making https://www.federalregister.gov/documents/2019/12/31/2019-28100/remote-identification-of-unmanned-aircraft-systems
[6] ASTM International F38 Committee Work Item WK65041 “Standard Specification for UAS Remote ID and Tracking” https://www.astm.org/DATABASE.CART/WORKITEMS/WK65041.htm
[7] Unmanned Aircraft
[8] UAS Identification and Tracking Aviation Rulemaking Committee Recommendations Final Report 2017 SEP 30 https://www.faa.gov/regulations_policies/rulemaking/committees/documents/media/UAS%20ID%20ARC%20Final%20Report%20with%20Appendices.pdf
[9] Standards Development Organizations including American National Standards Institute (ANSI), ASTM International (formerly American Society for Testing and Materials), Consumer Technology Association (CTA), International Civil Aviation Organization (ICAO), RTCA (formerly Radio Technical Commission for Aeronautics), et al
[10] Extensible Provisioning Protocol
[11] Registry Data Access Protocol
[12] Domain Name System
[13] Host Identity Protocol
[14] Host Identity Tag
[15] UAS Traffic Management
[16] UAS Service Supplier[s]
[17] ANSI/CTA-2063-A https://standards.cta.tech/apps/group_public/project/details.php?project_id=587
[18] Universally Unique Identifier, e.g. RFC 4122
[19] Ground Control Station[s]
[20] Personally Identifiable Information
[21] https://www.arin..net/resources/registry/whois/rdap/<https://www.arin.net/resources/registry/whois/rdap/>
[22] Hierarchical HIT
[23] Overlay Routable Cryptographic Hash Identifier
[24] Host Identity