Re: [Tm-rid] Proposed WG Charter v2

"Card, Stu" <stu.card@axenterprize.com> Thu, 02 January 2020 22:01 UTC

Return-Path: <stu.card@axenterprize.com>
X-Original-To: tm-rid@ietfa.amsl.com
Delivered-To: tm-rid@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 89FE112004D for <tm-rid@ietfa.amsl.com>; Thu, 2 Jan 2020 14:01:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=axenterprize.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CMxe6wSjIfVu for <tm-rid@ietfa.amsl.com>; Thu, 2 Jan 2020 14:01:06 -0800 (PST)
Received: from mail-il1-x12a.google.com (mail-il1-x12a.google.com [IPv6:2607:f8b0:4864:20::12a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 68EB9120096 for <tm-rid@ietf.org>; Thu, 2 Jan 2020 14:01:06 -0800 (PST)
Received: by mail-il1-x12a.google.com with SMTP id f10so35161061ils.8 for <tm-rid@ietf.org>; Thu, 02 Jan 2020 14:01:06 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=axenterprize.com; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=un1t5kAXmaio0KksvsgAUFg7BPbpw6Vv5VkVQcwXnss=; b=B7Zv5n3AzPc4lmXsXc5q/wqIjPmj0rluJghBYDIUgA/vl03jR0SHiZzQf3UIrFiTBa uSVYYsyzrOs4EqU7C7LU9GuuSfw75u7DYFnQRpzP1JLBM+uu2ThB9QJIpg9z3CI01p+f pmVS8F+LF/k3CsWJfmj57UD/iSbTHUhQs9eLA=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=un1t5kAXmaio0KksvsgAUFg7BPbpw6Vv5VkVQcwXnss=; b=brWcBIvH4KBXu5Vts9EmMBmZaDb12tY3m5zzYJqNXRHGQniu3gfVsJj/GJAutBeJHu 3Pd7y+C9cnwJLasSVTyjdYsum5xTI8+g/4ugnaeCBeDJHXHCus62CJUPh/3cY5K2wToE pXF4PBYDkiHW4X1G5+niAAJCedZeDNfZXl+MwvzQFAu2MbaqrxJq9Hxkg/oH8I8qztWI 3Q89Gqi+yy6gv3k/Q9mxWaGxmJIDTgOYe/t7N4t1U8OB+8CA4fqgnamCVPp20X80AGNl aAmwI9iusGqWIO0vqVkPyivR/e88La3M3sH0e20/elo/c00BiOrPdi5/zNCd4YUii4UR EJmw==
X-Gm-Message-State: APjAAAU/101hUkQTx9X/BiBYsmV+q32Dj2/LC/f/BW0paK+dypzB6U33 xT0HURiShOpgjVwT0RVjS8ZhX1u99Yp6f67tLssOpBgXNKo=
X-Google-Smtp-Source: APXvYqxvrQy1tSZyx1ETp5ExQg0Wch78shqBJVf+bldBWDAUhvWtyspTm6C4Eho3m9Mf+fQEjSz5K4IuBQbhkWjiyEo=
X-Received: by 2002:a92:9a47:: with SMTP id t68mr68028942ili.155.1578002465386; Thu, 02 Jan 2020 14:01:05 -0800 (PST)
MIME-Version: 1.0
References: <579d29aa-e3d7-9886-91b6-46641eb1f944@labs.htt-consult.com> <5feb3288-b366-3580-0b1d-1134769bb305@labs.htt-consult.com> <22730.1575295477@localhost> <CAKM0pYPm0avmt3ULQX4j2PJC2d-f7GtjLgezQO1WB6L3uF4OgA@mail.gmail.com>
In-Reply-To: <CAKM0pYPm0avmt3ULQX4j2PJC2d-f7GtjLgezQO1WB6L3uF4OgA@mail.gmail.com>
From: "Card, Stu" <stu.card@axenterprize.com>
Date: Thu, 02 Jan 2020 17:00:57 -0500
Message-ID: <CAKM0pYM+_hxGK19Fc2NA0jFgVEiyzJfB46iWUsP7ciod=0XQNQ@mail.gmail.com>
To: tm-rid@ietf.org
Cc: ryoung <ryoung@one-atm.net>
Content-Type: multipart/alternative; boundary="000000000000678cf8059b2f54bc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tm-rid/_fPePFHB-wSb0gI9jAwpV59jlyI>
Subject: Re: [Tm-rid] Proposed WG Charter v2
X-BeenThere: tm-rid@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Trustworthy Multipurpose RemoteID <tm-rid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tm-rid/>
List-Post: <mailto:tm-rid@ietf.org>
List-Help: <mailto:tm-rid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Jan 2020 22:01:09 -0000

Week turned into month but here's my attempt. All please review and comment.

Trustworthy Multipurpose Remote Identification (TM-RID) Proposed WG Charter
v3



Civil Aviation Authorities (CAAs) worldwide (e.g. United States Federal
Aviation Administration, FAA), have initiated rule making for Unmanned
Aircraft Systems (UAS) Remote Identification (RID).  CAAs currently
promulgate performance-based regulations that do not mandate specific
techniques, but rather cite industry consensus technical standards as
acceptable means of compliance. One key standard here is ASTM International
F38 Committee Work Item WK65041, “Standard Specification for UAS Remote ID
and Tracking”.  ASTM Network RID defines a set of information for UAS to
make available globally indirectly via the Internet. ASTM Broadcast RID
defines a set of messages for Unmanned Aircraft (UA) to send locally
directly one-way over Bluetooth or IEEE 802.11. WK65041 addresses neither
how to ensure trustworthiness of RID information nor how to make it
instantly useful.



TM-RID’s goal is to make RID *immediately actionable*, in both Internet and
local-only connected scenarios, especially emergencies, in severely
constrained UAS environments, balancing legitimate (e.g. public safety)
authorities’ Need To Know *trustworthy* information with UAS operators’
*privacy*. To accomplish this, TM-RID will liaise with ASTM, CTA, ICAO,
RTCA, *et al* and complement their standards with IETF work to meet this
urgent need. An Applicability Statement RFC for UAS RID, showing how to use
IETF standardized technologies for this purpose, will be a central work
product. Other Technical Specification RFCs will address enhancements of
specific supporting protocols. Prototypes using the contemplated technical
approach have already been successfully flown.



The Host Identity Protocol (HIP) Host Identity Tag (HIT) is uniquely
ideally suited to serving as an UAS ID Type. A  HIT, an Overlay Routable
Cryptographic Hash Identifier (ORCHID), is derived from and compactly (as
an IPv6 address) represents a Host Identity (HI), a [self-generated] public
key. HITs can verifiably identify all entities in the UAS Traffic
Management (UTM) ecosystem: UA, Ground Control Stations (GCS), observer
devices, registries, etc. TM-RID will specify how to leverage HITs –



- Provide strong RID authentication by using the HI in public key
operations to:

= prove ownership of the claimed ID (HIT);

= authenticate other claims made via RID (e.g. location) as signed by the
owner of that ID; and

= provide observers [w/o Internet connectivity] locally verifiable proof
that ID is in a known registry.



- Use DNS to enable observers to use a received HIT to look up minimal
public ID information.



- Use access controlled RDAP to enable authorized observers to look up more
extensive private information (including operator Personally Identifiable
Information, PII) needed for legitimate (e.g. public safety or security)
purposes from an Internet domain name (Whois) or similar registry.



This provides stronger privacy than other FAA Notice of Proposed Rulemaking
(NPRM) / ASTM standard UAS ID Types, while providing greater assurance of
authenticity to authorized observers, but necessitates several HIP
enhancements –



- Hierarchical HIT (HHIT): Enable scalable and trustable UA registration
and information retrieval (e.g. with DNS and RDAP) by adding optional
structure to the (currently flat) HIT/ORCHID space.



- registration extensions:  Prevent registration of duplicate HHITs,
populate registries with IDs and associated data, update DNS, support
Rendez-Vous Servers (RVS) and provide proof of authenticity.



- proxies: Enable any party observing an UA to contact a RVS or other
intermediary that will either deny or facilitate secure communications with
the party controlling the UA, while maintaining the privacy of the latter’s
identity, location and other information to all but authorized parties, per
policy.



- multicast: To securely and efficiently communicate with a group,
multicast to their ephemeral (and likely multiple per host) IP addresses,
starting from individual and/or group HITs.



- new cryptographic algorithms: Extremely compact keys and signatures (such
as are enabled by EdDSA and Keccak functions) are needed for severely
constrained [UAS] environments.



TM-RID potentially could be applied to verifiably identify other types of
registered things reported to be in specified physical locations, but the
urgent motivation and clear initial focus is UAS. TM-RID enhancements to
HIP will be generic: of these, only HHITs with their associated
registration procedures and compact crypto are vital to support UAS RID;
HIP proxies and HIP multicast are stretch goals. Some UTM concepts envision
using OAuth for GCS and personnel; HIP as an OAuth method also will be
investigated. The Applicability Statement and the Technical Specifications
initially essential for UAS RID will be published within one year of the
2019 DEC 31 FAA NPRM.



On Mon, Dec 2, 2019 at 12:31 PM Card, Stu <stu.card@axenterprize.com> wrote:

> I will try wordsmithing this week.
>
> On Mon, Dec 2, 2019, 09:04 Michael Richardson <mcr+ietf@sandelman.ca>
> wrote:
>
>>
>> I am enthusiatic about this work, although I don't anticipate being able
>> to
>> be more than a bystandard on this.
>>
>> Robert Moskowitz <rgm@labs.htt-consult.com> wrote:
>>     > TM-RID will build upon the Host Identity Tag (HIT) from the Host
>> Identity
>>     > Protocol (HIP) as an RID and augment it and supporting HIP and
>> other IETF
>>     > technologies to add trustworthiness to the ASTM messaging suite.
>>
>> I think that this sentence needs editing.  Too many ".. and"
>>
>>     > The goal is
>>     > to provide trustworthiness both in an Internet connected
>> environment and
>>     > emergency, unconnected situations within the highly constrained
>> environment
>>     > of UAS.
>>
>> I think that a reference for the nature of the constrained environment
>> might
>> be in order.
>>
>>     > The Host Identity Tag (HIT) is ideally, in fact uniquely, suited to
>> work
>>     > within this RID effort.  The Host Identity (HI) behind the HIT can
>> be used to
>>     > sign Broadcast Authentication Messages, thus proving ownership of
>> the RID
>>     > (HIT) and signed messages.  HITs provide significantly superior
>> privacy
>>     > compared to other allowed RID types while providing greater
>> assurance to
>>     > authorized observers that they are accessing the proper PII for the
>> UA.
>>
>> This wanders into solution space, and I think it would be better to omit
>> this.
>>
>>     > TM-RID will create specifications for HIP-augmented ASTM RID
>> messages..
>>     > Initially this will consist of additional RID Authentication
>> Messages that
>>     > use the HI in public key signing operations: to prove UAS ownership
>> of a
>>     > Hierarchical HIT (HHIT); to authenticate other claims made via RID,
>> such as
>>     > position and velocity, as having been made by the owner of that
>> HHIT; and to
>>     > provide observers lacking current Internet connectivity with locally
>>     > verifiable UAS proof-of-registration objects.
>>
>> removing some of the solutions, leaving the requirements:
>>
>> TM-RID will create specifications to prove UAS ownership of a
>> Hierarchical HIT (HHIT); providing a framework to authenticate other
>> claims, such as
>> position and velocity, as having been made by the owner of that HHIT; and
>> to
>> provide observers lacking current Internet connectivity with locally
>> verifiable UAS proof-of-registration objects.
>>
>> I would have written this as numbered points.
>>
>>     > For this, HIP would be amended to be used effectively in this
>> environment:
>>
>> I think you could put a period instead of : and omit the next three
>> paragraphs.
>>
>>     > HHITs are envisioned to identify all components in the UAS/UTM (UAS
>> Traffic
>>     > Management) environment: UA, Command Consoles, Observer devices, and
>>     > Registries.  This will entail further work as experience is gained
>> in using
>>     > HIP for UAS RID.  For example, some (UTM) systems envision using
>> OAuth for
>>     > Ground Control Systems (GCS) and authorized safety personnel.  HIP
>> as an
>>     > OAuth method may help in merging HIP into these systems.
>>
>>     > The workgroup will need to liaison with the various SDOs working in
>> the UAS
>>     > regulation space.
>>
>> Please if you could list those SDOs?
>> Do we need to do liason agreements with them?  I would be happier if that
>> was
>> part of the plan.
>>
>> How will we engage with implementers?  I.e. how are we going to get
>> running-code?
>>
>>
>>
>> --
>> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
>>  -= IPv6 IoT consulting =-
>>
>>
>>
>> --
>> Tm-rid mailing list
>> Tm-rid@ietf.org
>> https://www.ietf.org/mailman/listinfo/tm-rid
>>
>