[Tm-rid] charter draft v4
"Card, Stu" <stu.card@axenterprize.com> Fri, 10 January 2020 18:50 UTC
Return-Path: <stu.card@axenterprize.com>
X-Original-To: tm-rid@ietfa.amsl.com
Delivered-To: tm-rid@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 472B81200DB for <tm-rid@ietfa.amsl.com>; Fri, 10 Jan 2020 10:50:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=axenterprize.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BFNHa8bCzdZj for <tm-rid@ietfa.amsl.com>; Fri, 10 Jan 2020 10:50:21 -0800 (PST)
Received: from mail-il1-x143.google.com (mail-il1-x143.google.com [IPv6:2607:f8b0:4864:20::143]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 424AF12001E for <tm-rid@ietf.org>; Fri, 10 Jan 2020 10:50:19 -0800 (PST)
Received: by mail-il1-x143.google.com with SMTP id x5so2570445ila.6 for <tm-rid@ietf.org>; Fri, 10 Jan 2020 10:50:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=axenterprize.com; s=google; h=mime-version:from:date:message-id:subject:to:cc; bh=31VKBAbSvV8gs27rz6pUtz9z+0IPVZBpbGjEA6DzV88=; b=kq7Dc2PbXGtv8oPKx9KRcdcCglkPDkFN4XClSqN9PI9ss7S2T2WsdZgRjaFT6bUc7t C+HQvsVEWJVJgQaxiz4uMj4CqAZcIP/0/pjFiMtSbooY2nSXXO34DlfCoA6i/hCWH8ou ZuFP47uW4+WpkvVpdmRNX+YcUy6gQZkbkQyRw=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=31VKBAbSvV8gs27rz6pUtz9z+0IPVZBpbGjEA6DzV88=; b=sB8YQic7uTUF6Dtj5ZpwL+A+RCXmF3oNYfNs1kLjp/0Pj6A/sWVvZUIcqDuVqobjyV CAoeKzwpfUYAnjiyGuGBYQ6LIC+1z0kVh+O5sn6gSz2soBMB3KynhW5EHZiZkILGY+B/ ghur0LGNWGnwNdl472Xt+cvLMGLYbeZPxzdUj59JMRC+NHdDlVlRLXJb3ixxYbyqNUb1 NwMT9hXVr8oaGTxWab8y3UjTKumipywBE+J5VQn0d7HNdtXzNfV4cwMkyLt9HvFr/SOF eFKOAD6HUdY33NFl6Ax759eFydVtwsYcoohLxgzu17qTiiV46K5lFzhUO74ClUxZZq2r uqzg==
X-Gm-Message-State: APjAAAXSNoxHd68hav5RYgsr/HEo+0BdwJd8rdV+fy6djJwNN48BXb8M eWGrb5Hf9WQNFgFcev55fzQO0M2shRpi5CvWIcvMlPDCLgs=
X-Google-Smtp-Source: APXvYqwQ58IOJ++Bqsgzu/onhm+OdCs0ye+fPi1JzQ129U1q4agDcbC1uR3R8hqeYi0UfYZwYsrVKxD2GoSvlLF+GcY=
X-Received: by 2002:a92:9f4e:: with SMTP id u75mr3748885ili.116.1578682217860; Fri, 10 Jan 2020 10:50:17 -0800 (PST)
MIME-Version: 1.0
From: "Card, Stu" <stu.card@axenterprize.com>
Date: Fri, 10 Jan 2020 13:50:13 -0500
Message-ID: <CAKM0pYNzuouXg0V=2dT3DoVrDAuvvdNNvecjz8Vi=XRjST2GMA@mail.gmail.com>
To: tm-rid@ietf.org
Cc: Seth Rao <seth@secreliant.com>, Monica Pearson <Monica.pearson@secreliant.com>, ryoung <ryoung@one-atm.net>, Andy Thurling <athurling@nuair.org>
Content-Type: multipart/alternative; boundary="000000000000cf2a55059bcd9817"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tm-rid/arbeLu0Wmf-pJ3dxwppkpwK__Go>
Subject: [Tm-rid] charter draft v4
X-BeenThere: tm-rid@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Trustworthy Multipurpose RemoteID <tm-rid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tm-rid/>
List-Post: <mailto:tm-rid@ietf.org>
List-Help: <mailto:tm-rid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jan 2020 18:50:28 -0000
all -- I have attempted to address all comments received; see revised charter draft v4 below. Unfortunately, the lists of milestones, drafts, acronyms and references made it still longer (although the body text of the charter itself is now clearer and more succinct). I generally have not listed all the potentially relevant RFCs as there could be many and presumably anyone reading an IETF Working Group charter knows how to use the datatracker. While I have identified all the other SDOs of which I am aware with whom we may need liaison, actually getting a liaison agreement is both above my pay grade and difficult before we have a charter (i.e. why would ASTM take us seriously until we have a WG). I appreciate your reviews of earlier drafts. Your comments made this much better! Please review this latest draft at your earliest convenience as the need for trustworthy, immediately actionable UAS RID is urgent, the FAA NPRM comment period expires at the end of February, ASTM is resuming work to revise their standard accordingly, and IETF 107 in Vancouver is in March. :-) Other than updating and substantially expanding my proposed Applicability Statement (draft-card-tmrid-uas-00), what is next to get this moving, specifically through IESG chartering and generally forward? Thanks all! == Trustworthy Multipurpose Remote Identification (TM-RID) Proposed WG Charter v4 CAAs [1] worldwide have initiated rule making for UAS [2] RID [3]. The US FAA [4] has published a NPRM [5]. CAAs currently promulgate performance-based regulations that do not mandate specific techniques, but rather cite industry consensus technical standards as acceptable means of compliance. One key standard is ASTM WK65041 [6]. Network RID defines a set of information for UAS to make available globally indirectly via the Internet. Broadcast RID defines a set of messages for UA [7] to send locally directly one-way over Bluetooth or Wi-Fi. WK65041 addresses how to neither populate/query registries, ensure trustworthiness of information nor make it instantly useful. TM-RID’s goal is to make RID *immediately actionable*, in both Internet and local-only connected scenarios, especially emergencies, in severely constrained UAS environments [8], balancing legitimate (e.g. public safety) authorities’ Need To Know *trustworthy* information with UAS operators’ *privacy*. To accomplish this, TM-RID will liaise with SDOs [9] and complement their standards with IETF work to meet this urgent need. An Applicability Statement RFC for UAS RID, showing how to use IETF standardized technologies for this purpose, will be a central work product. Technical Specification RFCs will address any necessary enhancements of specific supporting protocols. TM-RID potentially could be applied to verifiably identify other types of registered things reported to be in specified physical locations, but the urgent motivation and clear initial focus is UAS. One possible approach leverages Internet domain name registration business models, infrastructure and standards, including EPP [10], RDAP [11] and DNS [12], plus the HIP [13] HIT [14], with UTM [15] system USS [16] as registries. This provides stronger privacy and authenticity than other FAA NPRM / ASTM standard UAS ID Types (static manufacturer assigned hardware serial number per [17] or dynamic single-use USS assigned UUID [18]), but would necessitate several HIP enhancements (all with applicability beyond UAS RID); prototypes using DNS to reverse lookup UAS RID information from a broadcast HIT have been successfully flown. Any comprehensive approach should – - Verifiably identify all entities in the UTM ecosystem – UA, GCS [19], observer devices, registries, USS, *et al* – presumably using public key operations to: = prove ownership of the claimed ID; = authenticate other claims made via RID (e.g. location) as signed by the owner of that ID; and = provide observers [w/o Internet connectivity] locally verifiable proof that ID is in a known registry. - Enable all observers to use a received ID to look up minimal public information. - Enable only strongly authenticated, policy authorized observers to look up more extensive private information (including operator PII [20]) needed for legitimate (e.g. public safety or security) purposes in access controlled registries (e.g. as with Internet domain names [21]). Proposed milestones, accelerated to meet urgent UAS RID safety/security need – 2020 MAR: Present contemplated technical approach and solicit alternative approaches. draft-wiethuechter-tmrid-auth-04 <https://datatracker.ietf.org/doc/draft-wiethuechter-tmrid-auth/> draft-card-tmrid-uas-00 <https://datatracker.ietf.org/doc/draft-card-tmrid-uas/> 2020 JUL: Select technical approach from those proposed in sufficient detail to enable assessment. 2020 NOV: Drafts initially essential for UAS RID to IESG (within one year of the FAA NPRM). Potential milestones in collaboration with the HIP WG, supporting UAS RID and other applications – 2020 MAR new cryptographic algorithms: Extremely compact keys and signatures (such as are enabled by EdDSA and Keccak functions) are needed for severely constrained [UAS] environments. draft-moskowitz-hip-new-crypto-03 <https://datatracker.ietf.org/doc/draft-moskowitz-hip-new-crypto/> draft-moskowitz-orchid-cshake-00 <https://datatracker.ietf.org/doc/draft-moskowitz-orchid-cshake/> 2020 MAR HHIT [22]: Enable scalable trustable [UA] registration and information retrieval (e.g. RDAP, DNS) by adding optional structure to the currently flat space of HITs / ORCHIDs [23] derived from and compactly (as IPv6 addresses) representing HIs [24] ([self-generated] public keys). draft-moskowitz-hip-hierarchical-hit-03 <https://datatracker.ietf.org/doc/draft-moskowitz-hip-hierarchical-hit/> 2020 JUL registration extensions: Prevent registration of duplicate HHITs, populate registries with IDs and associated data, update DNS and provide proof of authenticity. draft-moskowitz-hip-hhit-registries-01 <https://datatracker.ietf.org/doc/draft-moskowitz-hip-hhit-registries/> 2020 JUL OAuth investigation: Explore and if feasible document, HIP as an OAuth method [for UTM]. 2021 MAR proxies: Enable any observer of a [UA] “thing” to contact an intermediary that will either deny or facilitate secure communications with the operator of the thing, while maintaining the privacy of the operator’s location and PII to all but authorized parties, per policy. 2021 JUL multicast: To securely and efficiently communicate with a group, multicast to their ephemeral (and likely multiple per host) IP addresses, starting from individual and/or group HITs. Acronyms and references: [1] Civil Aviation Authority [2] Unmanned Aircraft System[s] [3] Remote Identification [4] United States Federal Aviation Administration [5] Notice of Proposed Rule-Making https://www.federalregister.gov/documents/2019/12/31/2019-28100/remote-identification-of-unmanned-aircraft-systems [6] ASTM International F38 Committee Work Item WK65041 “Standard Specification for UAS Remote ID and Tracking” https://www.astm.org/DATABASE.CART/WORKITEMS/WK65041.htm [7] Unmanned Aircraft [8] UAS Identification and Tracking Aviation Rulemaking Committee Recommendations Final Report 2017 SEP 30 https://www.faa.gov/regulations_policies/rulemaking/committees/documents/media/UAS%20ID%20ARC%20Final%20Report%20with%20Appendices.pdf [9] Standards Development Organizations including American National Standards Institute (ANSI), ASTM International (formerly American Society for Testing and Materials), Consumer Technology Association (CTA), International Civil Aviation Organization (ICAO), RTCA (formerly Radio Technical Commission for Aeronautics), *et al* [10] Extensible Provisioning Protocol [11] Registry Data Access Protocol [12] Domain Name System [13] Host Identity Protocol [14] Host Identity Tag [15] UAS Traffic Management [16] UAS Service Supplier[s] [17] ANSI/CTA-2063-A https://standards.cta.tech/apps/group_public/project/details.php?project_id=587 [18] Universally Unique Identifier, e.g. RFC 4122 [19] Ground Control Station[s] [20] Personally Identifiable Information [21] https://www.arin.net/resources/registry/whois/rdap/ [22] Hierarchical HIT [23] Overlay Routable Cryptographic Hash Identifier [24] Host Identity
- [Tm-rid] charter draft v4 Card, Stu
- Re: [Tm-rid] charter draft v4 Michael Richardson
- Re: [Tm-rid] charter draft v4 ryoung
- Re: [Tm-rid] charter draft v4 Card, Stu
- Re: [Tm-rid] charter draft v4 Card, Stu
- Re: [Tm-rid] charter draft v4 Seth Rao
- Re: [Tm-rid] charter draft v4 Eric Vyncke (evyncke)