﻿<?xml version='1.0' encoding='utf-8'?>
<?rfc toc="yes" ?>
<?rfc symrefs="yes" ?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes" ?>
<?rfc subcompact="no" ?>
<?rfc iprnotified="no" ?>
<?rfc strict="no" ?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" consensus="true" docName="draft-moskowitz-drip-efficient-a2g-comm-06"
	category="std" ipr="trust200902" obsoletes="" submissionType="IETF"
	xml:lang="en" tocInclude="true" symRefs="true" sortRefs="true" version="3">

<front> <title abbrev="A2G Communications">Efficient Air-Ground Communications</title>
    <seriesInfo name="Internet-Draft" value="draft-moskowitz-drip-efficient-a2g-comm-06"/>
	<author fullname="Robert Moskowitz" initials="R" surname="Moskowitz">
    <organization>HTT Consulting</organization>
    <address>
      <postal> 
	    <street></street>
        <city>Oak Park</city>
        <region>MI</region>
        <code>48237</code>
        <country>USA</country>
      </postal>
      <email>rgm@labs.htt-consult.com</email>
	</address>
	</author>
	<author fullname="Stuart W. Card" initials="S." surname="Card">
	<organization>AX Enterprize</organization>
	<address>
	  <postal>
	    <street>4947 Commercial Drive</street>
	    <city>Yorkville</city>
	    <region>NY</region>
	    <code>13495</code>
	    <country>USA</country>
	  </postal>
	  <email>stu.card@axenterprize.com</email>
	</address>
	</author>
	<author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
	<organization>Linköping University</organization>
	<address>
	  <postal>
		<street>IDA</street>
		<city>Linköping</city>
		<code>58183</code>
		<country>Sweden</country>
	  </postal>
	  <email>gurtov@acm.org</email>
	</address>
	</author>
    <date year="2026" />
   <area>Internet</area>
   <workgroup>DRIP</workgroup>
    <keyword>RFC</keyword>
     <keyword>Request for Comments</keyword>
     <keyword>I-D</keyword>
     <keyword>Internet-Draft</keyword>
     <keyword>DRIP</keyword>
<abstract>
<t>
	This document defines protocols to provide efficient air-ground 
	communications without associated need for aircraft to maintain 
	stateful connection to any tower infrastructure.  Instead, a secure 
	source-routed ground infrastructure will not only provide the 
	needed routing intelligence, but also reliable packet delivery 
	through inclusion of Automatic Repeat reQuest (ARQ) and Forward 
	Error Correction (FEC) protocols to address both reliable wireless 
	packet delivery, and assured terrestrial packet delivery.
</t>
</abstract>
</front>
<middle>   
<section numbered="true" toc="default"> <name>Introduction</name>
<t> 
	The goal of this design approach is to place minimal network 
	intelligence in the aircraft and even the wireless towers.  
	Practically all the networking intelligence is placed within the 
	Ground Station (GS).  The target application is uncrewed aircraft 
	communications, but could equally applied to all aircraft.
</t>
<t>
	The justification for this approach is intelligence in the aircraft 
	has disproportional costs to that in the GS; there are many factors 
	in this claim.  Lower intelligence requirements in the towers will 
	make the technology more attractive to tower owners, provided there 
	is an associated functional payment mechanism for them for the 
	service.
</t>
<t>
	The wireless downlink from the aircraft is treated as a broadcast 
	message, with every receiving tower forwarding messages to the GS. 
	The GS, in turns, notes which towers are in contact with the 
	aircraft and sends uplink messages through them to the aircraft. 
	There is no need for complex aircraft/tower connection 
	technologies.  At most, for billing purposes, the towers are aware 
	of aircraft and GS that will use their connectivity services via 
	their source IP addresses.
</t>
</section>
<section anchor="terms" numbered="true" toc="default"> <name>Terms and Definitions</name>
<section numbered="true" toc="default"> <name>Requirements Terminology</name>
	<t>
		The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL 
		NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", 
		"MAY", and "OPTIONAL" in this document are to be interpreted as 
		described in BCP 14 <xref target="RFC2119" /> <xref 
		target="RFC8174" /> when, and only when, they appear in all 
		capitals, as shown here.
	</t>
</section>
<section numbered="true" toc="default"> <name>Definitions</name>
	<dl newline="true" spacing="normal">
		<dt>A2G</dt>
		<dd>
			Communications from an aircraft to some ground equipment.  
			Also somethings GS.
		</dd>
 	</dl>
</section>
</section>
<section anchor="Reqs" numbered="true" toc="default"> <name>Enabling and Enhancing Functions</name>
<t>
	The following is a list of enabling and enhancing functions.
</t>
<section anchor="Enabling_req" numbered="true" toc="default"> <name>Enabling Requirements</name>
<t>
	The aircraft:
</t>
	<ul spacing="normal">
		<li>
			Support end-to-end secure communications with the GS and 
			start the operation with the pre-configured GS IP address.  
			The aircraft sends the first message, to the GS, to 
			establish the routing knowledge in the GS,
		</li>
		<li>
			Use a fixed IP address for itself for the duration of the 
			operation, and
		</li>
		<li>
			be able to process multiple copies of messages from the GS, 
			received potentially from multiple towers.
		</li>
	</ul>
<t>
	The tower:
</t>
	<ul spacing="normal">
		<li>
			Support digital signing of messages from the aircraft, and 
			the tower’s IP address, and forward these objects to the 
			GS.
		</li>
	</ul>
<t>
	The GS:
</t>
	<ul spacing="normal">
		<li>
			Support end-to-end secure communications with the aircraft,
		</li>
		<li>
			support processing multiple copies of messages from the aircraft,
		</li>
		<li>
			support digital signing by the tower, and
		</li>
		<li>
			maintain a list/map of towers forwarding aircraft messages 
			from the aircraft for messaging to the aircraft.  The list 
			of trusted tower IP addresses is constructed from within 
			the tower signed objects.
		</li>
	</ul>
</section>
<section anchor="Enh_sec__req" numbered="true" toc="default"> <name>Enhancing Security Requirement</name>
<t>
	The GS should:
</t>
	<ul spacing="normal">
		<li>
			Support digital signing for the tower to trust messages from the GS.
		</li>
	</ul>
</section>
<section anchor="Enh_perf__req" numbered="true" toc="default"> <name>Enhancing Performance Requirements</name>
<t>
	The aircraft may:
</t>
	<ul spacing="normal">
		<li>
			Support uplink usage optimizations like FEC and ARQ (e.g., 
			NORM <xref target="RFC5740" />), and
		</li>
		<li>
			support GS IP address mobility (e.g. via HIP, <xref 
			target="RFC7401" format="default"/>).
		</li>
	</ul>
<t>
	The tower may:
</t>
	<ul spacing="normal">
		<li>
			Include information like timestamp and its GPS-derived 
			location (and accuracy of same) in the signed object 
			delivered to the GS,
		</li>
		<li>
			may be IP address mobile, if so, then MUST provide its IP 
			address within the signed object,
		</li>
		<li>
			support multicast and DETNET <xref target="RFC8938" /> for 
			efficient and reliable communications with the GS, and
		</li>
		<li>
			use a subscription model to filter messages supported for 
			forwarding.  If done with a list of registered IP addresses 
			it MUST support GS IP address mobility.
		</li>
	</ul>
<t>
	The GS may:
</t>
	<ul spacing="normal">
		<li>
			Support intelligent operation routing and tower contact 
			information to select towers to use to send messages to the 
			aircraft,
		</li>
		<li>
			support tower subscription for tower communication filtering,
		</li>
		<li>
			support multicast and DETNET for efficient communications 
			with the towers,and
		</li>
		<li>
			support FEC and ARQ for efficient use of uplinks to the aircraft.
		</li>
	</ul>
</section>
</section>
<section anchor="Bck-Dis" numbered="true" toc="default"> <name>Background Discussion</name>
<t>
	The following considers the possible technologies, some challenges, 
	and final proposed solution.
</t>
<section anchor="Prbm_n_ipnip" numbered="true" toc="default"> <name>The problem and simple solution using IPnIP</name>
<t>
	Internet Protocol (IP) transmissions from the aircraft to ground, 
	though unicast in construction (i.e. IP destination/source paired), 
	are really broadcasts, as a practical matter, to all available 
	towers.  Such towers can simply send the packets on their way and 
	they will naturally get routed, i.e. relayed, to the GS which 
	correspondingly simply recognizes and processes potential multiple 
	receipts via the many relaying towers.  The problem is only the 
	uplink: how to get IP transmissions from the GS to the aircraft.
</t>
<t>
	The GS needs to ‘know’ which towers can likely transmit up to the 
	aircraft and how to route packets through them.  A simple solution 
	is to use IP-in-IP (IPnIP) tunneling protocol <xref 
	target="RFC1853" format="default"/>.  Here, each receiving tower 
	wraps the downlink message in IPnIP with the outer source address 
	being the the tower’s address.  The aircraft always uses a fixed 
	source address (e.g. their respective DET <xref target="RFC9374" 
	format="default"/>). The GS maintains an IPnIP tunneling table for 
	each aircraft DET of the tower addresses. Packets inbound to the GS 
	update this table (stale entries are purged) and the IPnIP service 
	unwraps and forwards the inner content back through the IP kernel 
	for sending up to the application.  Packets outbound to the 
	aircraft address get routed internally to the IPnIP process which 
	ends up sending out multiple copies to each of the tower addresses 
	in the table. Each receiving tower then simply unwarps and uplinks 
	the content to the aircraft.
</t>
<t>
	Though this approach works, it has security and traffic management 
	challenges.  First and foremost, the aircraft must know the GS IP 
	address.  It either needs to be fixed or the aircraft needs a 
	separate process to update its knowledge of the GS address.  The GS 
	should have the aircraft address prior to operation start or can 
	simply learn them through received messages.
</t>
<t>
	There are two security issues associated with the GS processing 
	messages from any random aircraft address: 
</t>
	<ul spacing="normal">
		<li>
			either these addresses are preset (e.g. registered DET), or 
			there is some process for the GS to dynamically learn which 
			to trust.
		</li>
		<li>
			a larger security challenge is why should the GS trust the 
			address for the towers as a route to the aircraft.  A 
			malicious source could provide bad tower addresses 
			resulting in loss of aircraft contact at worst, or 
			consumption, through DOS attacks, of both GS processing 
			resources and tower uplink bandwidth.
		</li>
	</ul>
<t>
	An additional challenge for the GS is determining which set of 
	towers to use to send messages uplinked to the aircraft.  Which of 
	the towers last sending messages from the aircraft are still in RF 
	reach of the aircraft and are there now towers better able to 
	message the aircraft?  If the GS can trust the towers and know 
	their GPS location and the signal strengths of messages from the 
	aircraft, the GS can use this map along with the map of the planned 
	operation to better select towers for uplinking messages.
</t>
<t>
	With all these stated concerns, the IPnIP approach should only be 
	used for PoC and general testing.  It presents too good of a DOS 
	attack scenario for production deployments.
</t>
</section>
<section anchor="Impv_Tw_trst" numbered="true" toc="default"> <name>Improved tower trust through digital signing</name>
<t>
	Trust in tower messaging can be achieved by each tower 
	cryptographically signing the received aircraft messages before 
	forwarding them to the GS.  This must be a specific signed object, 
	perhaps in COSE format <xref target="RFC8152" format="default"/>. 
	Not only would it contain the aircraft message with the tower’s 
	digital ID and signature, it should also minimally include a 
	timestamp, the tower’s GPS location plus GPS accuracy, and signal 
	strength.  With this information, a process on the GS can put the 
	tower on a map with the planned aircraft flight plan.  If three or 
	more towers forwarded the message, the GS can also multilaterate 
	the aircraft location for accurate location on the map.  This 
	information would allow the GS to predict which towers are still in 
	range, or soon in range (i.e. predicting new towers for 
	communications) of the aircraft for uplink messaging.
</t>
<t>
	This signing method is preferable to secure tunnels from the tower 
	to the GS as there will be thousands of GS using a small number of 
	towers.  How should tunnels be set up and torn down recognizing the 
	cost to the tower system?  It is preferable for the towers to be 
	stateless in their forwarding to the GS.  Also, it is questionable 
	whether the GS should sign messages for the uplink.  Doing so would 
	potentially place the burden of processing cost on the tower, and 
	analysis would be needed to avoid denial of service (DOS) attacks 
	against towers and their uplink capacity.
</t>
<t>
	The inclusion of GPS accuracy supports improved mobile tower 
	multilateration.  The timestamp also enables multilateration, in 
	aging towers out of the reachable list of towers against the flight 
	plan.
</t>
<t>
	Thus, inbound processing on the GS would first place tower 
	information into the aircraft reachable table mentioned above, then 
	forward the aircraft message up to the application.  For outbound, 
	the aircraft address could result in passing the message to an 
	IPnIP service for simple forwarding to the tower as above, but as 
	mentioned above IPnIP has DOS risks.
</t>
</section>
<section anchor="Inc_mbl_gs" numbered="true" toc="default"> <name>Inclusion of mobile ground systems</name>
<t>
	If the air-ground communications are secured with the Host Identity 
	Protocol (HIP, <xref target="RFC7401" format="default"/>), the HIP 
	mobility function can update the aircraft with any changes in the 
	GS IP address.  DTLS 1.3 <xref target="RFC9147" format="default"/> 
	can be used only if the aircraft is the server as DTLS supports 
	client, not server, mobility and the aircraft can learn of new GS 
	addressing as it processes uplinked messages from the new 
	addresses.
</t>
<t>
	In any case, the aircraft address should be its DET and be 
	unchanging for the flight duration.
</t>
</section>
<section anchor="Impv_uplk" numbered="true" toc="default"> <name>Improved uplink reliability</name>
<t>
	If three or more towers provide the uplink, the GS can use Forward 
	Error Correction (FEC) and send the fragments to different towers. 
	The aircraft need only receive the proper set of fragments to 
	reconstruct the full message.  This both reduces the packet size on 
	the uplink, conserving uplink capacity and increases both ground 
	and wireless delivery reliability.  Static Context Header 
	Compression (SCHC, <xref target="RFC8724" format="default"/>) 
	should also be used to reduce the size of the aircraft-ground 
	messages.  SCHC Automatic Repeat reQuest (ARQ) may also be used and 
	will soon directly support FEC.
</t>
<t>
	The ground communications path reliability can be further improved 
	through use of a subset of Deterministic Networking (DETNET) (tbd) 
	and Bit Indexing Explicit Replication (BIER) multicasting from the 
	GS to the towers.
</t>
</section>
<section anchor="Alt_tw_gs_tnl" numbered="true" toc="default"> <name>Alternative dedicated Tower-GS tunneling</name>
<t>
	There will be areas where significant traffic exists between a 
	tower (or group of towers) and a GS.  An example of such an area is 
	around an aerodrome and its supporting systems.  Here it makes 
	performance sense that a secure tunneling technology (e.g ESP, 
	<xref target="RFC4303" format="default"/>) be used between the 
	tower(s) and GS(s) rather than digitally signing individual 
	messages.  Often, in such cases the ground network can be deployed 
	to ensure reliable delivery.
</t>
</section>
</section>
<section anchor="A2G_msg" numbered="true" toc="default"> <name>Aircraft to GS Messaging</name>
<t>
	The aircraft and GS MAY have a pre-configured secure connection 
	using technologies like DTLS, IPsec, or HIP.  The aircraft SHOULD 
	use its DET as its IPv6 address, and underlying HI for the 
	rawPublicKey to establish the connection.  Examples of this type of 
	secure aircraft to GS is discussed in <xref 
	target="I-D.moskowitz-drip-secure-nrid-c2" format="default"/>.
</t>
<t>
	There is a bit of chicken-and-egg here if the initial connection 
	setup is not over a single link, as DETs are not easy to route over 
	an IPv6 network.  In such a case a tunnel, as discussed later, 
	needs to be in place between the first hop from the aircraft (e.g. 
	WiFi Access Point) and the GS.
</t>
<t>
	In some instances, a pre-established aircraft-GS session is not 
	practical (e.g. aircraft to airport traffic control).  A variant of 
	<xref target="I-D.moskowitz-drip-a2x-adhoc-session" 
	section="3.2" format="default"/> (Compressed UA Signed Evidence of 
	the A2X message) can be sent to the pre-configured GS IPv6 address:
</t>
<table anchor="u2g-sgn-tbl"> <name>101+n Byte Aircraft Signed A2G message</name>
  <thead>
    <tr>
      <th>Bytes</th>
      <th>Name</th>
      <th>Explanation</th>
    </tr>
  </thead>
  <tbody>
    <tr>
      <td>16</td>
      <td>DET of Aircraft</td>
      <td>DRIP Entity Tag of Aircraft</td>
    </tr>
    <tr>
      <td>16</td>
      <td>Destination Address</td>
      <td>IPv6 address of GS</td>
    </tr>
    <tr>
      <td>4</td>
      <td>VNA Timestamp</td>
      <td>Timestamp denoting recommended time to trust Evidence</td>
    </tr>
    <tr>
      <td>1</td>
      <td>Message ID</td>
      <td>A2G Message ID Number</td>
    </tr>
    <tr>
      <td>n</td>
      <td>A2G Message</td>
      <td>Actual A2G Message</td>
    </tr>
    <tr>
      <td>64</td>
      <td>Signature by Aircraft</td>
      <td>Signature over preceding fields using the keypair of the Aircraft DET</td>
    </tr>
  </tbody>
</table>
<t>
	This message is a SCHC compressed IPv6/UDP datagram.  The signature 
	is on the whole datagram.  The wireless transport will have some 
	mechanism (e.g. SCHC as Ethertype) to trigger the SCHC rule 
	processing to compress the datagram for transmission.  Depending on 
	the wireless technology there will be a 1-byte SCHC RuleID after 
	the SCHC Ethertype (or equivalent).  If the IP Header is sent 
	without SCHC compression, then SCHC will need to be the Next Header 
	in the IPv6 Header and the SCHC RuleID will immediately follow the IPv6 Header.
</t>
<t>
	The full uncompressed message is:	
</t>
<table anchor="ipv6-u2g-sgn-tbl"> <name>IPv6 117+m+n Byte Aircraft Signed A2G message</name>
  <thead>
    <tr>
      <th>Bytes</th>
      <th>Name</th>
      <th>Explanation</th>
    </tr>
  </thead>
  <tbody>
    <tr>
      <td>40</td>
      <td>IPv6 Header</td>
      <td>IPv6 Header from Aircraft to GS</td>
    </tr>
    <tr>
      <td>8</td>
      <td>UDP Header</td>
      <td>Full UDP Header</td>
    </tr>
    <tr>
      <td>4</td>
      <td>VNA Timestamp</td>
      <td>Timestamp denoting recommended time to trust Evidence</td>
    </tr>
    <tr>
      <td>1</td>
      <td>Message ID</td>
      <td>A2G Message ID Number</td>
    </tr>
    <tr>
      <td>n</td>
      <td>A2G Message</td>
      <td>Actual A2G Message</td>
    </tr>
    <tr>
      <td>64</td>
      <td>Signature by Aircraft</td>
      <td>Signature over preceding fields using the keypair of the Aircraft DET</td>
    </tr>
  </tbody>
</table>
<t>
	Any tower that receives these messages and has a tunnel to the 
	destination IPv6 address uses it to forward the message to the GS. 
	The GS will use the aircraft DET to retrieve, via DNS, the HDA 
	Endorsement of the DET.  This will provide the aircraft HI to 
	validate the signature.
</t>
<t>
	A tower MAY validate the signature by using the aircraft DET to 
	retrieve via DNS the HDA Endorsement of the aircraft DET.  The 
	tower may choose to leave this validation to the GS as it is 
	terrestrial network that may be DOSed from wireless transmissions.
</t>
<section anchor="t2g_tunnel" numbered="true" toc="default"> <name>The Tower to GS tunnel</name>
<t>
	It is impractical for most towers to maintain long-lived static 
	tunnels as described in <xref target="Alt_tw_gs_tnl" 
	format="default"/>.  Too many towers will need to forward messages 
	to too many GS for static tunneling.  Rather, per-packet tunneling 
	will be frequently used.  These tunnels are the Aircraft-GS packets 
	wrapped in a signed IPv6 datagram from the tower's IPv6 address to 
	the GS's address that is in the A-GS packet:
</t>
<table anchor="ipv6-t2g-sgn-tbl"> <name>IPv6 117+n Byte Aircraft Signed tunnel message</name>
  <thead>
    <tr>
      <th>Bytes</th>
      <th>Name</th>
      <th>Explanation</th>
    </tr>
  </thead>
  <tbody>
    <tr>
      <td>40</td>
      <td>IPv6 Header</td>
      <td>IPv6 Header from Tower to GS</td>
    </tr>
    <tr>
      <td>8</td>
      <td>UDP Header</td>
      <td>Full UDP Header</td>
    </tr>
    <tr>
      <td>16</td>
      <td>DET of Tower</td>
      <td>DRIP Entity Tag of Tower</td>
    </tr>
    <tr>
      <td>4</td>
      <td>VNA Timestamp</td>
      <td>Timestamp from tower denoting recommended time to trust Evidence</td>
    </tr>
    <tr>
      <td>m</td>
      <td>Tower Location</td>
      <td>Optional tower location</td>
    </tr>
    <tr>
      <td>m</td>
      <td>A2G Message</td>
      <td>Full A2G Message</td>
    </tr>
    <tr>
      <td>64</td>
      <td>Signature by Tower</td>
      <td>Signature over preceding fields using the keypair of the Tower DET</td>
    </tr>
  </tbody>
</table>
<t>
	The GS will use the tower DET to retrieve, via DNS, the HDA 
	Endorsement of the tower.  This will provide the tower HI to 
	validate the signature.
</t>
<t>
	The UDP Destination Port can be the indicator of the presence of 
	the Tower Location information.  If absent, this information needs 
	to be accessible via DNS using the Tower's DET (or pre-configured 
	in the GS).  If the tower is physically mobile, this information 
	SHOULD be included.
</t>
<t>
	The GS MUST be able to handle multiple copies of the A2G message. 
	It MUST use the Tower location information to maintain a mapping 
	for routing messages to the aircraft.  It MAY use knowledge of the 
	aircraft's planned flight to adjust this routing information as to 
	which tower's are likely to be within reach of the aircraft.
</t>
<t>
	
</t>
</section>
</section>
<section anchor="G2A_msg" numbered="true" toc="default"> <name>GS to Aircraft Messaging</name>
<t>
	In most cases, the GS to aircraft messaging is the mirror of 
	aircraft to GS.  The important difference is how the GS selects 
	towers for forwarding G2A messages and how the towers pre-process 
	these messages before using precious wireless bandwidth in sending 
	messages.
</t>
<t>
	The GS uses some process to select towers from the list of towers 
	last forwarding aircraft messages to the GS plus knowledge of the 
	aircraft flight and other towers in the area.
</t>
<t>
	The GS to tower tunnel is the mirror of <xref target="t2g_tunnel" 
	format="default"/> without the location information.  The tower 
	SHOULD validate the authenticity of the GS via DNS retrieved HDA 
	Endorsement of the GS DET.  It MAY also filter messages based on 
	having recently received aircraft to GS messages.
</t>
<t>
	The tower takes the G2A message from within the tunnel, adding any 
	needed wireless heading and transmits the datagram.
</t>
<t>
	The aircraft MUST be able to process multiple copies of an G2A 
	message coming from multiple towers.
</t>
</section>
<section anchor="IANA" numbered="true" toc="default"> <name>IANA Considerations</name>
<t>
	TBD
</t>
</section>
<section anchor="security-considerations" numbered="true" toc="default"> <name>Security Considerations</name>
<t>
	TBD
</t>
</section>
</middle>
<back>
<displayreference target="I-D.moskowitz-drip-a2x-adhoc-session" to="drip-a2x-adhoc-session"/>
<displayreference target="I-D.moskowitz-drip-secure-nrid-c2" to="drip-secure-nrid-c2"/>
<references> <name>References</name>
<references title="Normative References">
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9374.xml"/>
</references>
<references title="Informative References">
	<xi:include href="https://datatracker.ietf.org/doc/bibxml3/draft-moskowitz-drip-a2x-adhoc-session.xml"/>
	<xi:include href="https://datatracker.ietf.org/doc/bibxml3/draft-moskowitz-drip-secure-nrid-c2.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1853.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4303.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5740.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7401.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8152.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8724.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8938.xml"/>
	<xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9147.xml"/>
</references>
</references>
<section numbered="false" toc="default"> <name>Acknowledgments</name>
<t>
	Adam Wiethuechter of AX Enterprize provided review and 
	implementation insights.  Michael Baum provided extensive review of 
	the contents in chapters 3 and 4 in a prior white paper.
</t>
</section>
</back>
</rfc>
