Re: [Drip] New Version Notification for draft-ietf-drip-arch-21.txt

Robert Moskowitz <rgm@labs.htt-consult.com> Sun, 13 March 2022 01:43 UTC

Return-Path: <rgm@labs.htt-consult.com>
X-Original-To: tm-rid@ietfa.amsl.com
Delivered-To: tm-rid@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E63313A10E6 for <tm-rid@ietfa.amsl.com>; Sat, 12 Mar 2022 17:43:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level:
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ToxT1NjiaAba for <tm-rid@ietfa.amsl.com>; Sat, 12 Mar 2022 17:43:45 -0800 (PST)
Received: from z9m9z.htt-consult.com (z9m9z.htt-consult.com [23.123.122.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EEBBE3A10E5 for <tm-rid@ietf.org>; Sat, 12 Mar 2022 17:43:44 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by z9m9z.htt-consult.com (Postfix) with ESMTP id 0495162574; Sat, 12 Mar 2022 20:42:50 -0500 (EST)
X-Virus-Scanned: amavisd-new at htt-consult.com
Received: from z9m9z.htt-consult.com ([127.0.0.1]) by localhost (z9m9z.htt-consult.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id qkXpG7kBFETj; Sat, 12 Mar 2022 20:42:12 -0500 (EST)
Received: from [192.168.160.11] (unknown [192.168.160.11]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by z9m9z.htt-consult.com (Postfix) with ESMTPSA id DCA3062434; Sat, 12 Mar 2022 20:42:09 -0500 (EST)
Content-Type: multipart/alternative; boundary="------------ghA5q1iW0vgiydOw0UtEtS1c"
Message-ID: <46d8d713-7451-aefa-d896-c41255d376ce@labs.htt-consult.com>
Date: Sat, 12 Mar 2022 20:42:58 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0
Content-Language: en-US
To: "Card, Stu" <stu.card@axenterprize.com>
Cc: shuai zhao <shuai.zhao=40ieee.org@dmarc.ietf.org>, tm-rid@ietf.org, Robert Moskowitz <rgm@htt-consult.com>, Adam Wiethuechter <adam.wiethuechter@axenterprize.com>, Laura Welch <laura.welch@axenterprize.com>, Andrei Gurtov <gurtov@acm.org>, "Eric Vyncke (evyncke)" <evyncke@cisco.com>, Mohamed Boucadair <mohamed.boucadair@orange.com>, Daniel Migault <mglt.ietf@gmail.com>
References: <PH0PR17MB5728A3542D54DF0395C7F182F40B9@PH0PR17MB5728.namprd17.prod.outlook.com> <bfc9c10b-247a-6741-198c-883141eb9fa0@labs.htt-consult.com> <CAKM0pYOEQGrWyRSy2nOfZ4qwSzEhrv-d8guRX27XjCMrWBAJeQ@mail.gmail.com>
From: Robert Moskowitz <rgm@labs.htt-consult.com>
In-Reply-To: <CAKM0pYOEQGrWyRSy2nOfZ4qwSzEhrv-d8guRX27XjCMrWBAJeQ@mail.gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tm-rid/c3kFJXF-K2UJedZpv_wJU8Ap5Cg>
X-Mailman-Approved-At: Sun, 13 Mar 2022 23:25:27 -0700
Subject: Re: [Drip] New Version Notification for draft-ietf-drip-arch-21.txt
X-BeenThere: tm-rid@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Drone Remote Identification Protocol <tm-rid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tm-rid/>
List-Post: <mailto:tm-rid@ietf.org>
List-Help: <mailto:tm-rid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 13 Mar 2022 01:43:51 -0000


On 3/11/22 19:01, Card, Stu wrote:
> I was referring to 7.1 Finders & 7.2 CS-RID SDSP.

I did not think I caught that....

>
> SDSP (generically) is a term listed in the RFC 9153 glossary but 
> CS-RID SDSP is introduced in -arch.

So a "see below" would be sufficient.

> Non-participating UA are indeed entities but they have no _protocol_ 
> interactions in DRIP.

Good point so they do not, as such, belong in arch.

>
>
> On Fri, Mar 11, 2022, 08:16 Robert Moskowitz 
> <rgm@labs.htt-consult.com> wrote:
>
>
>
>     On 3/10/22 15:08, shuai zhao wrote:
>>     Dear DRIP,
>>     Thanks AD’s detailed review to help us produce a solid draft.
>>     Arch-21 addresses more than 30+ comments. Many thanks to
>>     co-author’s dedication.  Also, great appreciation for Laura’s
>>     help for text improvement.
>>     See inline confirmations (SZ/)  regarding which comments have
>>     been addressed in 21.
>>     There are only two items left which need a bit more explanations.
>>     @rgm@labs.htt-consult.com <mailto:rgm@labs.htt-consult.com>
>>     1.Sec 7 " it adds two more entity types." Which ones ?
>>     SZ/ @rgm@labs.htt-consult.com
>>     <mailto:rgm@labs.htt-consult.com>Please specify.
>
>     I don't think these are the exact words I used on whatever
>     comment, but that is probably not important.
>
>     Actually 3 entity types:
>
>     Entity 1:
>
>     Finders
>
>     Entity 2:
>
>     Although 9153 does define SDSP, it is not in the DRIP
>     architecture.  CS-RID specifically defines a SDSP that correlates
>     the harvested information, performs multilateration when possible
>     and feeds the information into the UTM.
>
>     Entity 3:
>
>     The second is non-broadcasting UA discovered by 'visual'
>     harvesting (via camera, LIDAR, etc.).
>
>
>     So the added entity types are:  SPDP and non-RID UA.
>
>     So how to say that here.
>
>
>     ... it adds the following entity types:
>
>     *   Remote ID Finders
>     *   A Supplemental Data Service Provider (SDSP) to correlate UA
>     observations and forward to UTM.
>     *   non-RID UA or "hidden" UA.
>
>
>>     2.Sec 10 is very light and mainly focus on the private keys
>>     except for the false flag issue (which deserves its own
>>     paragraph). Nothing is said about privacy
>>     SZ/ Does it mean we should remove this section?
>>     @rgm@labs.htt-consult.com <mailto:rgm@labs.htt-consult.com>
>>     anything new you can add?
>
>     I missed this.  I could have added more, basically lifting text
>     from drip-rid.  Let's see what I might do here and not open a
>     whole can of worms for review and comments.
>
>     ================
>
>     The security provided by asymmetric cryptographic techniques depends
>     upon protection of the private keys.  It may be necessary for the GCS
>     to have the key pair to register the HHIT to the USS.  Thus it may
>     be the GCS
>     that generates the key pair and delivers it to the UA, making the
>     GCS a part of
>     the key security boundary.  Leakage of the private key either from
>     the UA or GCS
>     to the component manufacturer is a valid concern and steps need to
>     be in
>     place to ensure safe keeping of the private key.
>
>     The size of the public key hash in the HHIT is also of concern. 
>     It is well within
>     current server array technology to compute another key pair that
>     hashes to the
>     same HHIT.  Thus an adversary could impersonate a validly
>     registered UA.
>     This attack would only be exposed when the HI in DRIP
>     authentication message
>     is checked back to the USS and found not to match.
>
>     Finally, the RID sender of a small harmless UA (or the entire UA)
>     could be carried
>     by a larger dangerous UA as a "false flag."  Compromise of a
>     registry private key
>     could do widespread harm.  Key revocation procedures are as yet to be
>     determined.  These risks are in addition to those involving Operator
>     key management practices.
>
>     ============================
>
>     There is probably more I can extract from drip-rid security
>     considerations, but this may be enough for the highlights here.
>
>>     Best,
>>     Shuai
>>     -----Original Message-----
>>     From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
>>     <mailto:&lt;evyncke@cisco.com&gt;>
>>     Date: Wednesday, February 2, 2022 at 02:42
>>     To: "Stuart W. Card" <stu.card@axenterprize.com>
>>     <mailto:&lt;stu.card@axenterprize.com&gt;>om>, "tm-rid@ietf.org"
>>     <mailto:&quot;tm-rid@ietf.org&quot;> <tm-rid@ietf.org>
>>     <mailto:&lt;tm-rid@ietf.org&gt;>
>>     Cc: "adam.wiethuechter@axenterprize.com"
>>     <mailto:&quot;adam.wiethuechter@axenterprize.com&quot;>
>>     <adam.wiethuechter@axenterprize.com>
>>     <mailto:&lt;adam.wiethuechter@axenterprize.com&gt;>om>,
>>     "rgm@labs.htt-consult.com"
>>     <mailto:&quot;rgm@labs.htt-consult.com&quot;>
>>     <rgm@labs.htt-consult.com>
>>     <mailto:&lt;rgm@labs.htt-consult.com&gt;>om>, "shuaiizhao(Shuai
>>     Zhao)" <shuaiizhao@tencent.com>
>>     <mailto:&lt;shuaiizhao@tencent.com&gt;>om>, "gurtov@acm.org"
>>     <mailto:&quot;gurtov@acm.org&quot;> <gurtov@acm.org>
>>     <mailto:&lt;gurtov@acm.org&gt;>
>>     Subject: [Internet]Re: [Drip] AD review for draft-ietf-drip-arch-20
>>         Hello Stu, and thanks for your quick reply.
>>         Elided the text where we agree, and comments added with EV>
>>         Regards
>>         -éric
>>         On 02/02/2022, 04:37, "Stuart W. Card"
>>     <stu.card@axenterprize.com>
>>     <mailto:&lt;stu.card@axenterprize.com&gt;> wrote:
>>             Thanks Eric!
>>             I agree with 90% of what you have written, and thanks for
>>     catching not
>>             only several nits but also several areas where we were
>>     unclear.
>>             It won't surprise you that I'll offer friendly rebuttal
>>     on a few points
>>             as well as answers to a few questions.
>>         EV> it was expected and happy to read them
>>            Abstract: try to add RFC 9153 after the "requirements
>>     document" else put I-D.ietf-drip-reqs
>>     SZ/ Added RFC9153 as a normative reference.  Or is it okay to
>>     change all reference from "I-D.ietf-drip-reqs" to "RFC 9153"
>>     since RFC9153 is published? @Eric Vyncke (evyncke)
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             On 2/1/2022 11:29 AM, Eric Vyncke (evyncke) wrote:
>>             > ...
>>             > Sec 1: s/Unmanned Aircraft System Remote Identification
>>     and tracking
>>             > (UAS RID)/ Unmanned Aircraft System (UAS) Remote
>>     Identification (RID)/
>>             > to be consistent with the title of section 1.1
>>             The acronym UAS RID really does expand with "and
>>     tracking" in most of
>>             the key documents, including the original Aviation
>>     Rulemaking Committee
>>             final report (on which almost everyone based their
>>     subsequent efforts)
>>             and ASTM F3411.
>>         EV> feel free to keep "and tracking"; my point was rather to
>>     introduce UAS and RID acronyms just after their expansion, not
>>     globally
>>     SZ/ agreed with @Eric Vyncke (evyncke), added as recommended.
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>            Sec 1.1: prefix "FAA" with "USA-based" ?
>>     SZ/ I Don’t think that is necessary. Not like EASA that Europe
>>     comes with its acronym. FAA should be well-known to person who is
>>     in aerospace domain. Let me know what others option and we can
>>     definitely emphasis on that.
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>            Sec 1.1: the use of "commercial" is usually understand as
>>     for consumer (i.e., recreative use) while I afraid that here it
>>     is more for commercial aviation activities as opposed to
>>     recreative ones. Worth clarifying or using a different word than
>>     commercial
>>     SZ/ I understood the question. However here we pretty much
>>     copy/paste from FAA final rule. In FAA document, the definition
>>     of commercial, non-commercial, amateur-build UAS and recreational
>>     are not well defined. I would suggest we keep the FAA languages.
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             > ...
>>             > Sec 1.2.1 is it "received UAS ID" or "received UAS RID"
>>     ? If "ID", is it
>>             > worth explaining why "ID" is used here?
>>             RID is the _process_, not the identity, not the
>>     identifier. In F3411,
>>             the identifier is the "UAS ID".
>>         EV> fair point, the difference is clear in the -reqs
>>     document. Now, I wonder whether the reader would benefit from a
>>     repetition of the definitions of ID vs. RID in this document.
>>     Perhaps in § 3.3 ?
>>     SZ/ I suggest adding the following clarification in 1.1. Since
>>     that is where arch- starts to introduce some more details about
>>     RID, not the ID itself.
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>     Currently
>>     "
>>     1.1.  Overview of Unmanned Aircraft System (UAS) Remote ID (RID) and
>>           Standardization
>>        UAS Remote Identification (RID) is an application enabler for
>>     a UAS
>>        to be identified by Unmanned Aircraft Systems Traffic Management
>>        (UTM) and UAS Service Supplier (USS) (Appendix A) or third parties
>>        entities such as law enforcement.  Many considerations (e.g.,
>>     safety)
>>        dictate that UAS be remotely identifiable.
>>     "
>>     Suggested changes
>>     "
>>     1.1.  Overview of Unmanned Aircraft System (UAS) Remote ID (RID) and
>>           Standardization
>>        UAS Remote Identification (RID) is an application enabler
>>     which consists of UAS ID verification process for a UAS
>>        to be identified by Unmanned Aircraft Systems Traffic Management
>>        (UTM) and UAS Service Supplier (USS) (Appendix A) or third parties
>>        entities such as law enforcement.  Many considerations (e.g.,
>>     safety)
>>        dictate that UAS be remotely identifiable.
>>     "
>>             Sec 1.2.1 please expand LOS at first use in " RF LOS"
>>     (perhaps also expand "RF") at the expanse of readability
>>     SZ/ updated in -21.
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             Sec 1.2.1 " link based ID" same question about "ID" vs.
>>     "RID" (there should also be a '-' as in "link-based")
>>     SZ/ updated to "link-based".  Later comments regarding not using
>>     RID/ID alone should clarify
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             Sec 1.2.2 " GNSS" expand at first use
>>     SZ/ updated to "e.g. their respective Global Navigation Satellite
>>     System (GNSS) derived locations."
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             Sec 1.2.2 add a note somewhere about the "4-D airspace"
>>     as not everyone is aware of the change of rules based on time of
>>     the day
>>     SZ/ @Card, Stu, I am looking for input from you about this
>>     comment.  "4-D" was defined in RFC9153, should we repeat the
>>     definition here? So maybe I did not understand Eric's concern.
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             Sec 1.2.2 increment the year in " currently (in the year
>>     of 2021)"
>>     SZ/ Make sense to me.  Updated to 2022
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             > ...
>>             > Section 1.2: this section appears as FAA-only. While
>>     this is not too
>>             > good for the IETF, this could be OK but the document
>>     must be clear that
>>             > section 1.2 is the US FAA position, not a global one.
>>             It was based on F3411 and intended to be generic. Indeed,
>>     FAA does not
>>             yet permit Network RID as a means of compliance with its
>>     RID rule. Is
>>             there something specific here that conflicts with a
>>     European or other
>>             non-US concept?
>>         EV> my concern is about the applicability of an IETF
>>     document, which needs to be defined. May I suggest to add some
>>     pre-amble in sec 1.2 stating that the following sub-sections are
>>     applicable / related to F3411 ? The title of section 1.2 could
>>     also include F3411 to be clear about its applicability.
>>     SZ/ How about changing the title of section 1.2, from "Overview
>>     of Types of UAS Remote ID" to "Overview of Types of UAS Remote ID
>>     from FAA"
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>              Sec 3: I would move this section as a sub-section of 1.2.2
>>     SZ/ I assume Eric meant section 1.3 here, not Section 3.  So, if
>>     it is Section 1.3, I have no issues of moving it under section
>>     1.2, since the assumption of Section 1.3 is under the network RID.
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>              Sec 1.4 is " general UAS RID usage scenario" really
>>     general ? I.e., is it applicable outside of US FAA/CA CAA ?
>>     SZ/ I believe that’s what we think DRIP architecture should look
>>     like. Should be change the sentence from " general UAS RID usage
>>     scenario "  to " DRIP UAS RID usage scenario"? @Card, Stu?
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>              Sec 1.4: please expand V2I, V2V, and DAA
>>     SZ/ updated the following definitions for Figure 4 and removed
>>     "(for brevity in this figure)".
>>     "
>>     DAA:  Detect And Avoid
>>     GPOD: General Public Observer Device
>>     PSOD: Public Safety Observer Device
>>     V2I:  Vehicle-to-Infrastructure
>>     V2V:  Vehicle-to-Vehicle
>>     "
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             > ...
>>             > Sec 3.1: why only crypto abbreviations ? There are so
>>     many aeronautical
>>             > acronyms that they should be there as well and this §
>>     3.1 should be
>>             > moved ahead just after §1 (assuming that §1.1 and
>>     others become
>>             > top-level sections)
>>             We weren't focusing specifically on crypto, but listed
>>     only those
>>             acronyms that weren't defined in -reqs, which is the DRIP
>>     terminology
>>             reference.
>>         EV> text of sec 3.3 should then be included in this section
>>     for consistency
>>     SZ/ I think its fine to move current section 3 "Terms and
>>     Definitions" up to section 2, which is what I have done in -21.
>>     Please let me know if that is going to be an issue for you all. I
>>     have also added " This document uses terms defined in
>>     [I-D.ietf-drip-reqs]." At the beginning of abbreviation to
>>     address Eric's comment.
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             Sec 3.2 add reference to HIP
>>     SZ/ I am not sure section 3.2 is the right place to add HIP
>>     reference since HIP was not even mentioned.  The place where we
>>     should is in section 4.
>>     " It justifies and explains the use of Hierarchical Host Identity
>>     Tags  (HHITs) [RFC7401] as self-asserting IPv6 addresses suitable
>>     as a UAS ID type  and more generally as trustworthy multipurpose
>>     remote identifiers."
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>              Sec 4: please specify that this section is only
>>     applicable to US FAA (if so)
>>     SZ/ I don’t have a clear answer for that. I am assuming the
>>     design of DRIP RID is for "general" purpose, which is not only
>>     for FAA-based RID. @Card, Stu?
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>              Sec 4 at multiple places, the text is rather dense and
>>     dry, could there be some figures to help understanding ?
>>     SZ/ rewriting each of the sentence in this section might be
>>     tough. It might be better to point out which part needs some
>>     tuning/figures.
>>             Sec 4.1: the last paragraph is a single sentence of 7
>>     lines...Please consider rewriting in an easier to read paragraph.
>>     SZ/ updated as following:
>>     " Likewise, the maximum ASTM RID {{F3411}} Authentication Message
>>     payload is 201 bytes for most authentication types. A type 5 is
>>     also added in this revision for IETF and other SDOs to develop
>>     Specific Authentication Methods as extensions to ASTM RID. One
>>     byte out of 201 bytes is consumed to index the sub-type which
>>     leaves only 200 for DRIP authentication payloads, including one
>>     or more DRIP entity identifiers and associated authentication data."
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             > ...
>>             > Sec 4.2: what is the difference between "RID" "Remote
>>     ID" and "ID" ?
>>             > please try to use a consistent vocabulary. Same later
>>     for "cryptographic ID"
>>             I'm not sure we were consistent. What we should be doing:
>>               "RID" never used alone
>>               "UAS RID" ::= "Unmanned Aircraft System[s] Remote
>>     Identification and
>>             tracking"
>>               "ID" never used alone
>>               "UAS ID" ::= "Unmanned Aircraft System Identifier"
>>         EV> happy if the document is reviewed to ensure that "ID" and
>>     "RID" are never used alone.
>>     SZ/ based current comments, I think we agree to replace all "RID"
>>     with "UAS RID", "ID" with "UAS ID", right?  There are some places
>>     such as Net-RID, I don’t think we need to replace those right?
>>     Currently in -21, I have done all the replacement, but I need
>>     second eyes to make sure all replacements are done correctly.
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             Sec 4.2: unsure whether "HI" was defined before
>>     SZ/  It was expanded in its first usage for sure. Bu in -21, I
>>     also add "HI" in "abbreviations" section for completeness.
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>            Sec 4.2: I cannot parse " This is in contrast to general
>>     IDs (...) as the subject in an X.509 certificate."
>>     SZ/ @Robert Moskowitz@Robert Moskowitz I will need Bob's help here.
>>           Sec 4.2: " by avoiding an explicit encoding technology like
>>     ASN.1 or CBOR", so what encoding should be used ?
>>     SZ/ @Robert Moskowitz@Robert Moskowitz Needs Bob's input.
>>             > ...
>>             > Sec 4.4: what is the meaning of "extant" ?
>>             "still in existence" which is probably not what we want
>>     here. Bob?
>>         EV> learned a new word, suggest using simple wording ;-)
>>     SZ/ updated to "existing", let me know everyone knows a better
>>     word for replacement.  Or "obvious" or.......
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             > ...
>>             > Sec 5: what are "public and private UAS information" ?
>>     The different
>>             > types of info were not defined earlier in the document
>>     or provide a
>>             > forward reference to sec 5.1 & 5.2
>>             We should cite the definition in -reqs PRIV-1 "private
>>     information
>>             (i.e., any and all information designated by neither
>>     cognizant authority
>>             nor the information owner as public, e.g., personal data)."
>>         EV> indeed, easier for the reader
>>     SZ/ Updated as " DRIP registries hold both public and private UAS
>>     information (See PRIV-1 in {{I-D.ietf-drip-reqs}}) resulting from
>>     the DRIP identifier registration process."
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>            Sec 5.1.1 s/ public registry/ public information registry/
>>     SZ/ Updated.
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             > ...
>>             > Sec 5.1.1 should "opaque" be used rather than "silent"
>>     in "they may be
>>             > silent to the Observer" ?
>>             What was meant was that an Observer might actually _see_
>>     (with eyes) an
>>             aircraft, and if it was participating in RID, but Network
>>     RID only, not
>>             Broadcast, the Observer would not _receive_ any RID
>>     messages, instead
>>             would have to query a Net-RID DP for any aircraft in the
>>     vicinity.
>>         EV> then indeed 'opaque' is the wrong word but I am not sure
>>     that 'silent' is better. No proposal of mine though :(
>>     SZ/ @Card, Stu, what is your final word choice? __
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>           Sec 5.1.2 after reading this §, it is still unclear to me
>>     what are the private information...
>>     SZ/ Do you mean section 5.2?  If it is 5.2, I updated the first
>>     paragraph of section 5 as Stu suggest above: " DRIP registries
>>     hold both public and private UAS information (See PRIV-1 in
>>     {{I-D.ietf-drip-reqs}}) resulting from the DRIP identifier
>>     registration process.". Does it solve the confusion?
>>             > ...
>>             > Sec 6: I was unable to find a definition of
>>     "trustworthiness" in
>>             > [I-D.ietf-drip-reqs]
>>             You got me. :-) We use the word in -reqs section 12 on
>>     page 10, we imply
>>             generally what we want but we never define it. I use the
>>     word frequently
>>             (not just in the context of UAS RID and DRIP), and I
>>     identify several
>>             dimensions of it (reliability, scalability, security,
>>     etc.), but I have
>>             never actually attempted to define it rigorously. I am
>>     afraid to try.
>>             Perhaps we should reword this so it doesn't imply that we
>>     have a formal
>>             definition?
>>         EV> good idea, simply enumerate (reliability, scalability,
>>     ...) rather than using "as specified in " ;-)
>>     SZ/ @Card, Stu it seems to me you may have a solution for this
>>     comment?
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             Sec 6: " DET (DRIP Entity Tag which is an HHIT-based UA
>>     ID)" should be at least written as "DRIP Entity Tag (DET), which
>>     is an HHIT-based UAS RID." And it probably deserves a definition
>>     / introduction on its own (perhaps in § 3.1)
>>     SZ/  I agree. Updated as suggested.
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             Sec 7 " One obvious opportunity is to enhance the
>>     architecture with gateways from Broadcast RID to Network RID.",
>>     while I do not disagree, this section is not the right place to
>>     open the discussion. This should be in the § 1 (with perhaps a
>>     forward reference to § 7)
>>     SZ/ @Robert Moskowitz @Robert Moskowitzneed input from Bob.
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>            Sec 7 " crowd-sourced" indeed many ADS-B receivers are run
>>     by amateurs (like my own) for flightradar24, flightaware, ...
>>     perhaps add a reference ?
>>     SZ/ @Eric, do you have a specific reference to add? Not sure I
>>     understood your comment correctly.
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>            Sec 7 " it adds two more entity types." Which ones ?
>>     SZ/ @Robert Moskowitz @Robert Moskowitz Please specify.
>>     > ...
>>             > Sec 7.1 this should really be part of the overall
>>     architecture of section 1
>>             The "CS-RID Finder" defined in 7.1 and the "CS-RID SDSP"
>>     defined in 7.2
>>             are _additions_: they are not part of UAS RID as
>>     contemplated by anyone
>>             other than the DRIP WG; they are not even part of basic
>>     DRIP, but an
>>             extension.
>>             > ...
>>             > Sec 8 "DRIP contact" is nice indeed but same comment as
>>     for the CS-RID:
>>             > this should really be part of the global architecture
>>     description and
>>             > not pushed at the end
>>             This is another extension relative to UAS RID but I think
>>     fundamental to
>>             our DRIP approach, so yes we should briefly introduce it
>>     earlier, before
>>             elaborating upon it here.
>>     EV> yes, please introduce those parts (CS-RID & contact) earlier
>>     in the document.
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>         EV> As F3411 is the basis this I-D, should those extensions
>>     be clearly identified as not included in F3411 ?
>>     SZ/ @Card, Stu, I feel like more discussion is needed regarding
>>     how to address this section. Please let me know what is your
>>     thinking.
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             Sec 7.2 " multilateration" should briefly be described,
>>     perhaps in the terminology section
>>     SZ/ @Card, Stu "multilateration" was not described in req. Should
>>     we do it here?
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>             >
>>             > Sec 8: should be less descriptive and perhaps not even
>>     mention HIP & BEET
>>             This really goes back to what has been a fundamental
>>     recurring debate
>>             since we started DRIP: is it based on HHITs and thus
>>     related closely to
>>             (although not entirely dependent upon) HIP; or is it
>>     generic? So far, no
>>             one has come to the DRIP WG and proposed anything other
>>     than the HHIT
>>             based approach. We are far along with that approach.
>>     Given the use of
>>             that approach, the contact requirement is trivially
>>     satisfied by using a
>>             HIP initiated BEET; there is no need to reinvent any wheels.
>>         EV> I also like the HHIT approach and the extension of DRIP
>>     contact. But I believe that mentioning HIP & BEET is venturing
>>     too much in a detailed solution especially since there is not
>>     even a draft about it. HIP may be mentioned as a potential
>>     solution but no more as its mention puts constraints on the work
>>     of the DRIP WG. I strongly suggest to remove " An Observer
>>     equipped with HIP can... V2X communications (e.g., [MAVLink]),
>>     etc" and possibly also the last sentence.
>>             Thanks again. I will wait for responses from my
>>     co-authors and our
>>             editor before proposing any more replacement language to
>>     clarify these
>>             points where our meaning did not come through.
>>     SZ/ @Card, Stu should we trim down the details regarding HIP/BEET?
>>     *SZ/ -21 has addressed this issue. Consider this is closed. *
>>         EV> that is the goal of review by a pair of fresh eyes. As
>>     soon as a revised I-D is uploaded, then I will initiate the IETF
>>     Last Call. We can still hope to get this I-D approved by the IESG
>>     before IETF-113 (end of March 2022)
>>             Sec 10 is very light and mainly focus on the private keys
>>     except for the false flag issue (which deserves its own
>>     paragraph). Nothing is said about privacy
>>     SZ/ Does it mean we should remove this section? @Robert
>>     Moskowitz@Robert Moskowitz anything new you can add?
>>
>>
>
>     -- 
>     Robert Moskowitz
>     Owner
>     HTT Consulting
>     C: 248-219-2059
>     F: 248-968-2824
>     E: rgm@labs.htt-consult.com
>
>     There's no limit to what can be accomplished if it doesn't matter
>     who gets the credit
>     -- 
>     Tm-rid mailing list
>     Tm-rid@ietf.org
>     https://www.ietf.org/mailman/listinfo/tm-rid
>

-- 
Standard Robert Moskowitz
Owner
HTT Consulting
C:248-219-2059
F:248-968-2824
E:rgm@labs.htt-consult.com

There's no limit to what can be accomplished if it doesn't matter who 
gets the credit