Re: [Tm-rid] Draft charter

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Fri, 11 October 2019 16:21 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: tm-rid@ietfa.amsl.com
Delivered-To: tm-rid@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 509B0120018 for <tm-rid@ietfa.amsl.com>; Fri, 11 Oct 2019 09:21:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=PqGLcZKS; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=wbaMeIKD
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QpfEI-sLO5g5 for <tm-rid@ietfa.amsl.com>; Fri, 11 Oct 2019 09:21:12 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BC7B3120013 for <tm-rid@ietf.org>; Fri, 11 Oct 2019 09:21:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=38237; q=dns/txt; s=iport; t=1570810871; x=1572020471; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=/aSRgCLifE0zZ4y8cAADCty6DKlI8x8ROQnYpJW2ZcU=; b=PqGLcZKSV2RW39Xn2kxwyoKUxViYl5qYm3e1Me2LDgpgIxWwXSiQs4lM PVuEk83Y2CpRGijoDjb03yj1VsmHgf85MD7fBtirrIgmPlFflqYQdJYuD 6aX1AAkDDpKk6Ar8nvdgKU4IXySWCsm0Cf8UJRyHwjgWqLpxUzFpKCnfu A=;
IronPort-PHdr: 9a23:EPcCFRJcjNuAV6SLpdmcpTVXNCE6p7X5OBIU4ZM7irVIN76u5InmIFeBvad2lFGcW4Ld5roEkOfQv636EU04qZea+DFnEtRXUgMdz8AfngguGsmAXEDlPfjhbCESF8VZX1gj9Ha+YgBY
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0C0AAA8q6Bd/5tdJa1cBgMaAQEBAQEBAQEBAwEBAQERAQEBAgIBAQEBgXuBHC9QBWxWIAQLKoNjQINHA4pKglyXfYFCgRADVAkBAQEMAQEYAQoKAgEBhEACF4JHIzgTAgMJAQEEAQEBAgEFBG2FLQyFSwEBAQQBAQoGER0BASoCCwEPAgEGAhEDAQIhBwMCAgIlCxQJCAIEDgUbB4MAAYF5TQMuAQIMlkOQYgKBOIhhdYEygn0BAQWCSYI+GIIXAwaBNIwOGIFAP4ERJx+CTD6CYQEBgS4BCAMBBgE2CQEMCRGCRzKCLIxugwGFN4pVjF5uCoIilRkbgjqLeoZdhC+QRJcgAgQCBAUCDgEBBYFpImdxcBU7KgGCQVAQFIFPDBeDUIUUhT4BdIEpjVQBDheCLgEB
X-IronPort-AV: E=Sophos;i="5.67,284,1566864000"; d="scan'208,217";a="354914383"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 11 Oct 2019 16:21:10 +0000
Received: from XCH-ALN-006.cisco.com (xch-aln-006.cisco.com [173.36.7.16]) by rcdn-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id x9BGL9ej011482 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 11 Oct 2019 16:21:10 GMT
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by XCH-ALN-006.cisco.com (173.36.7.16) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 11 Oct 2019 11:21:07 -0500
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 11 Oct 2019 12:21:03 -0400
Received: from NAM05-BY2-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 11 Oct 2019 11:21:03 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=aflPlH41Fbs7IrhmTV9KTrAkCiDBbfasvaF3zQn2sfx/poHNJuQ1ms/q82pkhnPILErZA5rBbowimCjvRxYr73DpaPgPa+EP+TGtKYY1CeoNxZCzUL+W+XhDMB0hjyo8MAEGrQnMMZeZPZzJonO4w1ogJw9j29z6rG2Dw2I1l0JmbBR7BAK+yAThQvb822hRDcsOwFgjq5bx18px0tpv4jCcKg35rmeaMVsP8KuzgYzJccngDcZfMjfVJsQVxzrTqgPodLC3RXf8K/vmUEfehwsd1pSUNwwsoNVIxmrvYyjKp9O72Y1FBZTwOdxVwBlbAKZHA94e/0uokEzNuzZ4LA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/aSRgCLifE0zZ4y8cAADCty6DKlI8x8ROQnYpJW2ZcU=; b=aW7g8RiiEtIIC2QJPZE7YLJhvW0ba/MCFkIpZcyLxxS3kLkMuOMxgakjIQEQwiYnsqfKiun+2jEizA8vDIj2uAgPov9KMMsE+8Qs/WMYNMXjIQ4iie2hZC38CUISjJPjzX+ai7TCiH+3ZYVn/Qs6fkbX/MfWfcGYQIHaBhTCq2DwdGsuGWYs0CIesDoBUITl9JQwRZEtvg2sU781YnzpruqQaPUO/DbhQ2T8AUY41LfkYwfWFb8GTOoTDa0WtN6uBb1HUb1lAi6x7SVv+ZtdH55y1JbRe8IQFofQ8GuvZy/PssK86YRfkd8+8UvAL0F94dkJPQoW6mRtK9rswvmyTA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/aSRgCLifE0zZ4y8cAADCty6DKlI8x8ROQnYpJW2ZcU=; b=wbaMeIKDjuKUPhTPun9323NVNmCoZ8HaSBNuCxoY9Rjzbw7a20n5uFRaqg6nmxPwGAmHM4HQ5lbxd+tsbr2EWXq0glHcd5KPVHVPSKml3glAUJ9BDv2DSnEY8CgSJ1b654auXjc7nakq6AhzlFN2rn/GlJWOmnxLRaQv6Og8E/I=
Received: from MN2PR11MB4144.namprd11.prod.outlook.com (20.179.150.210) by MN2PR11MB4287.namprd11.prod.outlook.com (52.135.37.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2347.16; Fri, 11 Oct 2019 16:21:02 +0000
Received: from MN2PR11MB4144.namprd11.prod.outlook.com ([fe80::e4f8:d335:c018:c62a]) by MN2PR11MB4144.namprd11.prod.outlook.com ([fe80::e4f8:d335:c018:c62a%7]) with mapi id 15.20.2347.021; Fri, 11 Oct 2019 16:21:02 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: "Card, Stu" <stu.card@axenterprize.com>
CC: Robert Moskowitz <rgm@labs.htt-consult.com>, "tm-rid@ietf.org" <tm-rid@ietf.org>
Thread-Topic: [Tm-rid] Draft charter
Thread-Index: AQHVdUNvnNd8vCGuaUOEPASXQD5/WKdJjqeAgAovpACAAF8TgIAAQLwAgAAbwoCAAVzigA==
Date: Fri, 11 Oct 2019 16:21:01 +0000
Message-ID: <499ED790-2F91-49FF-966E-50092D3DF943@cisco.com>
References: <0fc9d954-a9af-b590-afb2-64ad2594f552@labs.htt-consult.com> <d9b29364-c5ec-0391-6acf-10b15410855c@labs.htt-consult.com> <D9509822-DA8D-4622-BE7E-E1216DE75202@cisco.com> <d0927f52-5d71-a095-d2b5-5e6ae7cbd04f@labs.htt-consult.com> <42ABC343-DFD6-4EFF-8E1A-95E9EE1CB1EE@cisco.com> <CAKM0pYNGYS2Mc4eOXMMUnrKXTz0Ho0_16Jc4ij1CGJeMdpcDdQ@mail.gmail.com>
In-Reply-To: <CAKM0pYNGYS2Mc4eOXMMUnrKXTz0Ho0_16Jc4ij1CGJeMdpcDdQ@mail.gmail.com>
Accept-Language: fr-BE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.1d.0.190908
authentication-results: spf=none (sender IP is ) smtp.mailfrom=evyncke@cisco.com;
x-originating-ip: [2001:420:c0c1:36:a040:b440:1c4e:5bca]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 37aea41b-0c7b-431e-10f0-08d74e670222
x-ms-traffictypediagnostic: MN2PR11MB4287:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <MN2PR11MB4287B01E0E12C9BB92C3BF29A9970@MN2PR11MB4287.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0187F3EA14
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(979002)(4636009)(39860400002)(346002)(136003)(366004)(396003)(376002)(63294003)(199004)(189003)(966005)(54906003)(5660300002)(33656002)(102836004)(66574012)(58126008)(186003)(25786009)(36756003)(6506007)(606006)(76176011)(99286004)(316002)(71200400001)(71190400001)(86362001)(14454004)(478600001)(53546011)(476003)(6486002)(6436002)(6116002)(14444005)(2616005)(46003)(236005)(4326008)(6916009)(229853002)(446003)(11346002)(7736002)(256004)(2906002)(6246003)(81156014)(8676002)(8936002)(81166006)(486006)(54896002)(6512007)(6306002)(66476007)(64756008)(66446008)(76116006)(66946007)(66556008)(91956017)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4287; H:MN2PR11MB4144.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: dzu3RotNECOAKiYoBaafHtlHCexgaLGzZMtwIm/P4sSSbxgd2qzF2/UbL1aLuQcC2H1f3oqWie1Te66zm/2LgbRO1lUfOotYFJx772IPgG8/va/MMpErzCnmxj0+O6a06EzhcT8aKmpI2FEkXPv6SeQETcAfddNzOWOGQRUwwoAVjGmemocJklw6YdbPS9aDBQWxj/N1w1JClxx7O9ZcEaOYA3QwgDHvberyiTR1aU7A/a7HDfv1ef6tIexmsCPBmRfID1uWZcd2aKX1Uqj0iGAFV2gyCYiDlFpqqqBOobW6TWNTiBme9UIfKJaOc7xdS15NvFT8sHS4K64vX2VLRX5D+KKqThvmKOrIBQ+lXS8gvGaf5tDDOghKYuvTY7Ty9vm+nlX8Hw8zTPeGl2cmnpierlwXIqeGCXIXAUeSxKnKlQVfTOoJJ1jVMmjJZX+A2PhtE08ZOmWEHGG//doOzA==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_499ED7902F9149FF966E50092D3DF943ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 37aea41b-0c7b-431e-10f0-08d74e670222
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Oct 2019 16:21:01.9330 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: YEf3daof7LFL3Vtvg76EuCCdZxCJ9DWRz5QFARgoo6hBeUWGxThHkHdIw9iU74oCaLHhf38P4LjHsgCMstFEAQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4287
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.16, xch-aln-006.cisco.com
X-Outbound-Node: rcdn-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tm-rid/ob7yrNCptHxPHX7NzfplvdbMZ9o>
Subject: Re: [Tm-rid] Draft charter
X-BeenThere: tm-rid@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Trustworthy Multipurpose RemoteID <tm-rid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tm-rid/>
List-Post: <mailto:tm-rid@ietf.org>
List-Help: <mailto:tm-rid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Oct 2019 16:21:16 -0000

Actually, we do not need a _solution_ for privacy _now_ but rather a consideration section in one document and esp on the BoF agenda (which is accepted as you may have seen in a different email)

-éric

From: "Card, Stu" <stu.card@axenterprize.com>
Date: Thursday, 10 October 2019 at 23:32
To: Eric Vyncke <evyncke@cisco.com>
Cc: Robert Moskowitz <rgm@labs.htt-consult.com>, "tm-rid@ietf.org" <tm-rid@ietf.org>
Subject: Re: [Tm-rid] Draft charter

The privacy issue is debated among FAA, pilots, et al. Clearly, duly constituted authority needs to be able to look up the operator etc. from info provided by RID. However, the guy who just doesn't like UAS should not be facilitated in his harassment of their legitimate operators. So while the ID that is transmitted by/for the UA will be in plaintext for all to read, the lookup from that to the pilot's bag of meat ID may be restricted. Even knowing what organization is the operator is too much info: Amazon could use it to learn Walmart delivery patterns. These registry issues are critical & so far have been punted by ASTM (in fairness they admit openly to having punted so far).

On Thu, Oct 10, 2019, 16:10 Eric Vyncke (evyncke) <evyncke@cisco.com<mailto:evyncke@cisco.com>> wrote:
Bob,

I hope that your breakfast was a good one ;-)

More seriously, the privacy issue simply needs to be addressed by a document (or part of a document). If regulations say ‘no privacy’, then this is also a statement. But, I would believe that it is also privacy towards ‘normal citizens’ but again I can be wrong about the FAA rules. TM-RID needs a privacy consideration.

Per your previous email, yes: I meant that IESG wants to ensure that HIP is the right solution and no other layer-2 or layer-3 techniques fit the requirements. So, another document to be prepared for this specific TM-RID use case.

So, all “i” must be dotted and “t” crossed ;-)

Regards

-éric

From: Tm-rid <tm-rid-bounces@ietf.org<mailto:tm-rid-bounces@ietf.org>> on behalf of Robert Moskowitz <rgm@labs.htt-consult.com<mailto:rgm@labs.htt-consult.com>>
Date: Thursday, 10 October 2019 at 19:27
To: Eric Vyncke <evyncke@cisco.com<mailto:evyncke@cisco.com>>, "tm-rid@ietf.org<mailto:tm-rid@ietf.org>" <tm-rid@ietf.org<mailto:tm-rid@ietf.org>>
Subject: Re: [Tm-rid] Draft charter

Eric,

In the area of privacy, there are conflicting issues.

In the USofA, NO civil UAV can have privacy of its Identity.  The FAA 'owns' all airspace at 1' above the ground, if I have that right (and Stu will correct me).  Thus according to law, a person does not have any claim to privacy flying a UAV over their own property.

Think about it.  Just because it is on their property does not mean it is not interacting with others.

So no privacy of ID or basic associated information.

And to proper authorities more information.

This is not to say that the ID is forever.  Some use cases can justify an ID per flight/mission.  The delivery services (read UPS, FedEX) have already identified and justified the need of ID per mission.  But again, for that delivery, the fact that the UAV belongs to delivery service Q will be available.

NetworkID takes this farther.  It is not just the UAV in your VLOS (Visual Line of Sight), but also those that were there in the last 60s or MAY be there in the next 60s.  It could also, for authorized personnel, extend out further.

Now when we get to C2 (Command and Control), there are some privacy aspects, but again the operator of a UAV (why it is called UAS for system) has limited privacy.  To authorized personnel the operators location MUST be known.  There is a Self-ID broadcast message part of the basic BT messages, but it is informational only (like a Realtor saying which property s/he is videoing for a posting).

Bob
On 10/10/19 4:21 AM, Eric Vyncke (evyncke) wrote:
Bob and others,

During the BoF approval call with IESG & IAB, the TM-RID BoF has been approved as a non-WG-forming BoF as the charter is not completely mature (see below).

It was also preferred to have TM-RID as a stand-alone WG: based on experience, a dedicated/focus group is lighter and more efficient. So, HIP is unchanged but all work done around HIP for TM-RID will end up (like now) into HIP WG.

The TM-RID charter will have to be discussed in the BoF meeting in Singapore and must include a privacy statement/work item. The IAB/IESG feedback was also that the current charter is too much on HIP and would like to explore whether other technologies (including layer-2 ones) could be applicable.

All the above does not prevent the current work on TM-RID related drafts of course.

So, let’s talk in Singapore at the BoF

-éric

From: Tm-rid <tm-rid-bounces@ietf.org><mailto:tm-rid-bounces@ietf.org> on behalf of Robert Moskowitz <rgm@labs.htt-consult.com><mailto:rgm@labs.htt-consult.com>
Date: Friday, 4 October 2019 at 00:48
To: "tm-rid@ietf.org"<mailto:tm-rid@ietf.org> <tm-rid@ietf.org><mailto:tm-rid@ietf.org>
Subject: Re: [Tm-rid] Draft charter





Updated charter:

Governmental agencies worldwide, including the United States Federal Aviation Administration (FAA), are embarking on rule making processes to define Remote Identification (RID) requirements for Unmanned Aircraft Systems (UAS). ASTM International (formerly the American Society for Testing and Materials) F38 Committee Work Item WK65041, “Standard Specification for UAS Remote ID and Tracking”, addresses such anticipated requirements. Broadcast RID defines a set of messages for UAS to send one-way over Bluetooth or IEEE 802.11. Network RID defines how the same information (and potentially more) can be made available via the Internet. The ASTM draft does not address how to ensure or at least assess trustworthiness of information communicated via RID.



The Host Identity Protocol (HIP) Host Identity Tag (HIT) is ideally suited to work within this RID effort. For each Unmanned Aircraft (UA), a HIT can consolidate the 4-tuple of (UA ID, UA physical location, UA onboard host ID, UA onboard host logical location [IP address list]) to a 3-tuple (HIT, UA physical location, UA onboard host logical location) and thereby provide significant benefits.



For HIP to be used effectively in this environment, it needs updates.



- Hierarchical HITs (HHIT) enabling scalable and trustable registration: HHIT was part of the original design of HIP, but was dropped for lack of a clear use case. RID messages containing HHITs will enable use of DNS to access information about the UAS.



- expanded HIP Registration for HHITs: This registration process will provide proof of authenticity and prevent duplicate HHITs from occurring. Further, these Registries will provide the UAS DNS information and other services (including support of RVS for Network RID and related applications).



- new cryptographic algorithms: Extremely compact keys and signatures (such as are enabled by EdDSA and Keccak functions) are needed to meet the severely constrained UAS environment.


Additionally, tm-rid will offer specifications for HIP-augmented ASTM RID messages. Initially this will consist of additional RID Authentication Messages that use the HI in public key signing operations: to prove UAS ownership of the HHIT; to authenticate other claims made via RID, such as position and velocity, as having been made by the owner of that HHIT; and to provide observers lacking current Internet connectivity with locally verifiable UAS proof-of-registration objects.



Further work will emerge as experience is gained in using HIP for UAS RID. For example, some UAS Traffic Management (UTM) systems envision using OAuth for Ground Control Systems (GCS) and authorized safety personnel. HIP as an OAuth method may help in merging HIP into these systems.



The goal is to complete these updates to HIP by the end of 2020.



--
Robert Moskowitz
Owner
HTT Consulting
C:      248-219-2059
F:      248-968-2824
E:      rgm@labs.htt-consult.com<mailto:rgm@labs.htt-consult.com>

There's no limit to what can be accomplished if it doesn't matter who gets the credit
--
Tm-rid mailing list
Tm-rid@ietf.org<mailto:Tm-rid@ietf.org>
https://www.ietf.org/mailman/listinfo/tm-rid