<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-taylor-dtn-bp-arp-00" category="std" consensus="true" submissionType="IETF" updates="9758" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="BP-ARP">BP Address Resolution Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-taylor-dtn-bp-arp-00"/>
    <author fullname="Rick Taylor">
      <organization>Aalyria Technologies</organization>
      <address>
        <email>rtaylor@aalyria.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="15"/>
    <area>Internet</area>
    <workgroup>Delay/Disruption Tolerant Networking</workgroup>
    <keyword>bundle protocol</keyword>
    <keyword>address resolution</keyword>
    <keyword>convergence layer</keyword>
    <abstract>
      <?line 35?>

<t>This document specifies the Bundle Protocol Address Resolution Protocol
(BP-ARP), a mechanism for discovering the Node ID of a Bundle Protocol
Agent (BPA) that is reachable at a known Convergence Layer (CL) address.
BP-ARP enables a BPA to resolve CL-layer adjacency into BP-layer peer
relationships, bootstrapping higher-level protocols such as SAND. This
document updates RFC 9758 to allow externally received bundles destined
to the LocalNode administrative endpoint for registered administrative
record types.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ricktaylor.github.io/bp-arp/draft-taylor-dtn-bp-arp.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-taylor-dtn-bp-arp/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Delay/Disruption Tolerant Networking Working Group mailing list (<eref target="mailto:dtn@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/dtn/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/dtn/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ricktaylor/bp-arp"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="problem-statement">
        <name>Problem Statement</name>
        <t>In Bundle Protocol networks, a Convergence Layer Adapter (CLA) may
discover link-layer adjacency with another node without learning that
node's Node ID. For example:</t>
        <ul spacing="normal">
          <li>
            <t>A UDP-based CLA receives packets from a previously unknown IP address.</t>
          </li>
          <li>
            <t>A Bluetooth CLA discovers a nearby device.</t>
          </li>
          <li>
            <t>A satellite link becomes available to a ground station.</t>
          </li>
        </ul>
        <t>In these cases, the CLA knows <em>how</em> to reach the neighbour (CL address)
but not <em>who</em> they are (Node ID). Without the Node ID, the BPA cannot:</t>
        <ul spacing="normal">
          <li>
            <t>Install routes to the discovered node.</t>
          </li>
          <li>
            <t>Make forwarding decisions for bundles destined to that node.</t>
          </li>
          <li>
            <t>Participate in neighbour discovery protocols like SAND.</t>
          </li>
        </ul>
        <t>Additionally, some CL protocols convey only a single Node ID during
session establishment. For example, TCPCLv4 <xref target="RFC9174"/> exchanges one
Node ID per peer during contact header negotiation. A node that
supports multiple Node IDs — such as both an <tt>ipn</tt>-scheme and a
<tt>dtn</tt>-scheme Node ID — cannot advertise all of its identities through
the CL protocol alone. BP-ARP allows discovery of the complete set of
Node IDs associated with a peer, regardless of CL protocol limitations.</t>
      </section>
      <section anchor="relationship-to-sand">
        <name>Relationship to SAND</name>
        <t>The IETF SAND protocol <xref target="I-D.ietf-dtn-bp-sand"/> provides secure
advertisement and neighbourhood discovery at the Bundle Protocol layer.
However, SAND requires the ability to send bundles to discovered
neighbours. BP-ARP provides the bootstrap mechanism to resolve CL
addresses to Node IDs, enabling SAND to operate.</t>
        <artwork><![CDATA[
CLA discovers CL adjacency (Neighbour)
    -> BP-ARP resolves Neighbour -> Peer (learns Node ID)
        -> SAND can exchange topology information with known Peer
]]></artwork>
      </section>
      <section anchor="design-rationale">
        <name>Design Rationale</name>
        <t>BP-ARP is designed as a BPA-level operation, not a service-level one.
The question "what is your Node ID?" is directed at the BPA itself,
similar to how ICMP messages in IP are handled by the IP stack rather
than applications. BP-ARP resolves the singleton identity of a
specific node; it is analogous to ICMP, not IGMP. Group membership
discovery for multicast or anycast endpoints is out of scope.</t>
        <t>For this reason, BP-ARP uses the administrative endpoint rather than a
dedicated service endpoint.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<dl>
        <dt>Bundle Protocol Agent (BPA):</dt>
        <dd>
          <t>The node-level entity that implements the Bundle Protocol.</t>
        </dd>
        <dt>Convergence Layer Adapter (CLA):</dt>
        <dd>
          <t>A component that adapts the Bundle Protocol to a specific underlying
transport.</t>
        </dd>
        <dt>Convergence Layer Address (CL Address):</dt>
        <dd>
          <t>A transport-specific address used by a CLA (e.g., IP address + port
for TCP/UDP).</t>
        </dd>
        <dt>Endpoint Identifier (EID):</dt>
        <dd>
          <t>A name for a Bundle Protocol endpoint, using either the <tt>ipn</tt> or <tt>dtn</tt>
URI scheme, as defined in <xref target="RFC9171"/>, Section 4.2.5.1.</t>
        </dd>
        <dt>Node ID:</dt>
        <dd>
          <t>The EID that identifies a BPA as a whole, as distinct from any
application service endpoints. <xref target="RFC9171"/>, Section 3.1 defines the
Node ID as the endpoint that identifies the BPA itself. Each URI
scheme defines the Node ID as follows:
</t>
          <ul spacing="normal">
            <li>
              <t><tt>ipn</tt> scheme: The Node ID is the administrative endpoint, formed by
setting the service number to 0. For example, <tt>ipn:42.0</tt> or
<tt>ipn:1.42.0</tt> (with allocator). This is defined in <xref target="RFC9758"/>,
Section 3.3.</t>
            </li>
            <li>
              <t><tt>dtn</tt> scheme: The Node ID is the node name with no demux part. For
example, <tt>dtn://node42/</tt>. This is defined in <xref target="RFC9171"/>,
Section 4.2.5.1.1.</t>
            </li>
          </ul>
          <t>A node <bcp14>MAY</bcp14> have multiple Node IDs across different URI schemes. For
example, a node might be identified as both <tt>ipn:42.0</tt> and
<tt>dtn://node42/</tt>. Node IDs are by definition singleton endpoints that
uniquely identify a single BPA; multicast and anycast EIDs are not
Node IDs.</t>
        </dd>
        <dt>Peer:</dt>
        <dd>
          <t>A remote BPA with a known Node ID and reachable via a known CL
address.</t>
        </dd>
        <dt>Neighbour:</dt>
        <dd>
          <t>A CL adjacency where the CL address is known but the Node ID is
unknown.</t>
        </dd>
        <dt>Address Resolution:</dt>
        <dd>
          <t>The process of discovering the Node ID(s) associated with a
Neighbour's CL address.</t>
        </dd>
      </dl>
    </section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <section anchor="message-flow">
        <name>Message Flow</name>
        <artwork><![CDATA[
    Node A                                      Node B
    (knows B's CL address,                      (Node ID: ipn:42.0)
     doesn't know B's Node ID)
         |                                          |
         |  BP-ARP Request                          |
         |  src: ipn:17.0                           |
         |  dst: ipn:!.0                            |
         |  [sent to B's CL address]                |
         |----------------------------------------->|
         |                                          |
         |                         BP-ARP Response  |
         |                           src: ipn:42.0  |
         |                           dst: ipn:17.0  |
         |<-----------------------------------------|
         |                                          |
    Node A learns:                                  |
    B's Node ID is ipn:42.0                         |
]]></artwork>
      </section>
      <section anchor="addressing">
        <name>Addressing</name>
        <t>BP-ARP uses IPN addressing exclusively for the probe mechanism. The ARP
Request is sent to the LocalNode administrative endpoint <tt>ipn:!.0</tt>, and
the BP-ARP Response source is the responding node's <tt>ipn</tt>-scheme Node ID
(e.g., <tt>ipn:&lt;node&gt;.0</tt>). Nodes that do not support IPN addressing cannot
participate in BP-ARP.</t>
        <t>While the probe mechanism requires IPN addressing, the BP-ARP Response
payload carries the complete set of Node IDs for the responding node,
including <tt>dtn</tt>-scheme Node IDs (e.g., <tt>dtn://node42/</tt>) alongside
<tt>ipn</tt>-scheme Node IDs (e.g., <tt>ipn:42.0</tt>). This enables discovery of all
of a node's identities regardless of URI scheme, supporting dual-stack
deployments.</t>
        <section anchor="rfc9758-constraint">
          <name>RFC 9758 Constraint</name>
          <t><xref target="RFC9758"/>, Section 3.4.2 defines LocalNode as Node Number 2^32-1
(0xFFFFFFFF), represented as <tt>ipn:!.&lt;service&gt;</tt> or
<tt>ipn:4294967295.&lt;service&gt;</tt>.</t>
          <t>However, <xref target="RFC9758"/>, Section 5.4 states that "all externally received
bundles featuring LocalNode EIDs as a bundle source or bundle
destination <bcp14>MUST</bcp14> be discarded as invalid."</t>
          <t>This means LocalNode (<tt>ipn:!.0</tt>) cannot be used as the destination for
BP-ARP probes under current <xref target="RFC9758"/> rules. This specification updates
<xref target="RFC9758"/> to relax this restriction for BP-ARP bundles; see
<xref target="localnode-handling"/> for the full specification.</t>
        </section>
      </section>
    </section>
    <section anchor="normative-specification">
      <name>Normative Specification</name>
      <section anchor="administrative-record-type">
        <name>Administrative Record Type</name>
        <t>BP-ARP uses a single Administrative Record type (TBD1) for both
requests and responses. The bundle's destination EID distinguishes the
two:</t>
        <ul spacing="normal">
          <li>
            <t>A bundle destined to <tt>ipn:!.0</tt> is a BP-ARP Request.</t>
          </li>
          <li>
            <t>A bundle destined to a node's own administrative endpoint is a
BP-ARP Response.</t>
          </li>
        </ul>
        <t>This distinction is unambiguous: a receiving BPA always knows whether
the bundle was addressed to LocalNode or to its own Node ID.</t>
      </section>
      <section anchor="bp-arp-request">
        <name>BP-ARP Request</name>
        <t>A BP-ARP Request is a bundle with the following properties:</t>
        <section anchor="primary-block">
          <name>Primary Block</name>
          <ul spacing="normal">
            <li>
              <t>Source EID: The requesting node's administrative endpoint (e.g.,
<tt>ipn:&lt;node&gt;.0</tt>).</t>
            </li>
            <li>
              <t>Destination EID: <tt>ipn:!.0</tt> (LocalNode administrative endpoint).</t>
            </li>
            <li>
              <t>Bundle Processing Control Flags: Administrative record flag <bcp14>MUST</bcp14> be
set.</t>
            </li>
          </ul>
        </section>
        <section anchor="hop-count-extension-block">
          <name>Hop Count Extension Block</name>
          <t>BP-ARP Request bundles <bcp14>SHOULD</bcp14> include a Hop Count extension block (block
type 10, per <xref target="RFC9171"/>, Section 4.3.3). The hop limit <bcp14>SHOULD</bcp14> be set
to 1. This prevents the BP-ARP Request from being routed beyond the
immediate neighbour.</t>
        </section>
        <section anchor="request-payload-block">
          <name>Payload Block</name>
          <t>The payload block contains an Administrative Record with type TBD1.</t>
          <t>The payload content is either:</t>
          <ul spacing="normal">
            <li>
              <t>Empty: requesting the complete set of Node IDs from the responding
node.</t>
            </li>
            <li>
              <t>A CBOR array of already-known Node IDs: requesting only Node IDs not
included in the list (a delta query).</t>
            </li>
          </ul>
          <t>The payload format is defined in <xref target="arp-payload-cddl"/> using CDDL.</t>
        </section>
        <section anchor="transmission">
          <name>Transmission</name>
          <t>The bundle <bcp14>MUST</bcp14> be sent via the CLA to the specific CL address of the
Neighbour. The bundle <bcp14>MUST NOT</bcp14> be routed through normal RIB lookup. The
Hop Count limit of 1 provides defence-in-depth against mis-routing.</t>
        </section>
      </section>
      <section anchor="bp-arp-response">
        <name>BP-ARP Response</name>
        <t>Upon receiving a BP-ARP Request, a BPA <bcp14>MUST</bcp14> respond with a BP-ARP Response.</t>
        <section anchor="response-primary-block">
          <name>Primary Block</name>
          <ul spacing="normal">
            <li>
              <t>Source EID: The <tt>ipn</tt>-scheme Node ID of the responding node (e.g.,
<tt>ipn:&lt;node&gt;.0</tt>). This <bcp14>MUST NOT</bcp14> be <tt>ipn:!.0</tt>.</t>
            </li>
            <li>
              <t>Destination EID: The source EID from the BP-ARP Request.</t>
            </li>
            <li>
              <t>Bundle Processing Control Flags: Administrative record flag <bcp14>MUST</bcp14> be
set.</t>
            </li>
          </ul>
        </section>
        <section anchor="response-payload-block">
          <name>Payload Block</name>
          <t>The payload block contains an Administrative Record with type TBD1
(the same type as the request).</t>
          <t>If the BP-ARP Request payload was empty, the response payload <bcp14>MUST</bcp14> contain
a CBOR array of all Node IDs for the responding node, including Node
IDs of all supported URI schemes (e.g., both <tt>ipn</tt> and <tt>dtn</tt>). If the
BP-ARP Request payload contained a list of known Node IDs, the response
payload <bcp14>MUST</bcp14> contain only those Node IDs not present in the request
(the delta). If the requesting node already knows all Node IDs, the
response payload is an empty CBOR array.</t>
          <t>The response <bcp14>MUST</bcp14> contain only singleton Node IDs that uniquely identify
the responding BPA. Multicast, anycast, or other group EIDs <bcp14>MUST NOT</bcp14>
be included in the response payload.</t>
          <t>The payload format is defined in <xref target="arp-payload-cddl"/> using CDDL:</t>
          <figure anchor="arp-payload-cddl">
            <name>BP-ARP Payload Format</name>
            <sourcecode type="cddl"><![CDATA[
arp-payload = [* eid]
eid = $eid  ; As defined in RFC 9171 Section 4.2.5.1
]]></sourcecode>
          </figure>
          <t>An example response payload in CBOR diagnostic notation:</t>
          <figure anchor="arp-example">
            <name>Example BP-ARP Response Payload</name>
            <sourcecode type="cbor-diag"><![CDATA[
[
  [2, [1, 42, 0]],    / ipn:1.42.0 (3-element encoding) /
  [1, "//node42/"]    / dtn://node42/                   /
]
]]></sourcecode>
          </figure>
          <t>This example shows a node reporting both an <tt>ipn</tt>-scheme and a
<tt>dtn</tt>-scheme Node ID, demonstrating dual-stack identity discovery.</t>
        </section>
        <section anchor="processing">
          <name>Processing</name>
          <t>The requesting node associates all Node IDs in the response with the
Neighbour's CL address. The Neighbour is promoted to Peer with the
discovered Node IDs. Routes <bcp14>MAY</bcp14> be installed for each discovered Node
ID.</t>
          <t>A response to a delta query is additive: the requesting node combines
the previously known Node IDs with the newly received Node IDs.</t>
        </section>
      </section>
      <section anchor="localnode-handling">
        <name>LocalNode Address Handling</name>
        <t>This section specifies the update to <xref target="RFC9758"/>, Section 5.4.</t>
        <t>A BPA implementing BP-ARP:</t>
        <ul spacing="normal">
          <li>
            <t><bcp14>MUST</bcp14> accept bundles destined to <tt>ipn:!.0</tt> from external sources if:
            </t>
            <ul spacing="normal">
              <li>
                <t>The bundle is marked as an administrative record, AND</t>
              </li>
              <li>
                <t>The administrative record type is BP-ARP (type TBD1).</t>
              </li>
            </ul>
          </li>
          <li>
            <t><bcp14>MUST</bcp14> validate that such bundles are properly formatted.</t>
          </li>
          <li>
            <t><bcp14>MUST</bcp14> process valid BP-ARP Requests and generate BP-ARP Responses.</t>
          </li>
          <li>
            <t><bcp14>SHOULD</bcp14> apply rate limiting to prevent denial-of-service attacks.</t>
          </li>
          <li>
            <t><bcp14>MUST</bcp14> continue to discard other externally received LocalNode
destination EIDs unless specifically permitted by a registered
administrative record type.</t>
          </li>
        </ul>
      </section>
      <section anchor="bp-arp-policy">
        <name>BP-ARP Policy</name>
        <t>A BPA <bcp14>SHOULD</bcp14> provide a configurable policy that controls whether and
when BP-ARP resolution is performed. This allows administrators to select
an appropriate trust model for their deployment (see
<xref target="policy-configuration"/> for example configurations).</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="bpsec-authentication">
        <name>BPSec Authentication</name>
        <t>BP-ARP bundles <bcp14>SHOULD</bcp14> be authenticated using BPSec Block Integrity Block
(BIB) as defined in <xref target="RFC9172"/>.</t>
        <t>BP-ARP Request bundles <bcp14>SHOULD</bcp14> include a BIB targeting the payload block,
with the requesting node's administrative endpoint as the security
source. BP-ARP Response bundles <bcp14>SHOULD</bcp14> include a BIB targeting the payload
block, with the responding node's administrative endpoint as the
security source.</t>
        <t>BP-ARP assumes that key material is pre-placed and identity is already
established through out-of-band mechanisms. BP-ARP performs address
resolution only — mapping a CL address to Node IDs. It does not
establish trust relationships, exchange credentials, or perform identity
bootstrapping. Deployments requiring credential exchange or identity
verification <bcp14>SHOULD</bcp14> use SAND <xref target="I-D.ietf-dtn-bp-sand"/> after BP-ARP
resolution.</t>
      </section>
      <section anchor="relaxation-of-localnode-rule">
        <name>Relaxation of LocalNode Rule</name>
        <t>Accepting external bundles destined to <tt>ipn:!.0</tt> introduces potential
security risks:</t>
        <dl>
          <dt>Spoofing:</dt>
          <dd>
            <t>A malicious node could send false BP-ARP Responses.</t>
          </dd>
          <dt>Denial of Service:</dt>
          <dd>
            <t>Flooding with BP-ARP Requests could overwhelm a BPA.</t>
          </dd>
          <dt>Information Disclosure:</dt>
          <dd>
            <t>BP-ARP Responses reveal a node's Node IDs.</t>
          </dd>
        </dl>
        <t>Mitigations include BPSec BIB authentication (<xref target="bpsec-authentication"/>),
rate limiting on BP-ARP Request processing, validation that BP-ARP Requests
are properly formatted administrative records, and policy configuration
to disable BP-ARP in sensitive environments.</t>
      </section>
      <section anchor="trust-model">
        <name>Trust Model</name>
        <t>The BP-ARP policy configuration allows administrators to choose appropriate
trust levels for their deployment. For example, closed networks may
disable BP-ARP entirely and trust only CLA-provided Node IDs, while open
networks may use BP-ARP to resolve unknown neighbours. High-security
deployments may choose to always verify, even when the CLA provides
Node IDs.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="administrative-record-type-1">
        <name>Administrative Record Type</name>
        <t>This document requests allocation of a new Bundle Protocol
Administrative Record type from the "Bundle Administrative Record
Types" registry:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">BP-ARP</td>
            </tr>
          </tbody>
        </table>
        <t>A single type is used for both requests and responses. The bundle's
destination EID distinguishes the two: bundles destined to <tt>ipn:!.0</tt>
are requests; bundles destined to a node's own administrative endpoint
are responses.</t>
      </section>
      <section anchor="no-service-number-required">
        <name>No Service Number Required</name>
        <t>BP-ARP uses the existing administrative endpoint (<tt>ipn:X.0</tt>) and does
not require allocation of a new service number.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9171">
          <front>
            <title>Bundle Protocol Version 7</title>
            <author fullname="S. Burleigh" initials="S." surname="Burleigh"/>
            <author fullname="K. Fall" initials="K." surname="Fall"/>
            <author fullname="E. Birrane, III" initials="E." surname="Birrane, III"/>
            <date month="January" year="2022"/>
            <abstract>
              <t>This document presents a specification for the Bundle Protocol, adapted from the experimental Bundle Protocol specification developed by the Delay-Tolerant Networking Research Group of the Internet Research Task Force and documented in RFC 5050.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9171"/>
          <seriesInfo name="DOI" value="10.17487/RFC9171"/>
        </reference>
        <reference anchor="RFC9758">
          <front>
            <title>Updates to the 'ipn' URI Scheme</title>
            <author fullname="R. Taylor" initials="R." surname="Taylor"/>
            <author fullname="E. Birrane III" initials="E." surname="Birrane III"/>
            <date month="May" year="2025"/>
            <abstract>
              <t>This document updates the specification of the 'ipn' URI scheme previously defined in RFC 6260 and the IANA registries established in RFC 7116. It also updates the rules for the encoding and decoding of these URIs when used as an Endpoint Identifier (EID) in the Bundle Protocol version 7 (BPv7) as defined in RFC 9171. These updates clarify the structure and behavior of the 'ipn' URI scheme, define new encodings of 'ipn' scheme URIs, and establish the registries necessary to manage this scheme.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9758"/>
          <seriesInfo name="DOI" value="10.17487/RFC9758"/>
        </reference>
        <reference anchor="RFC9172">
          <front>
            <title>Bundle Protocol Security (BPSec)</title>
            <author fullname="E. Birrane, III" initials="E." surname="Birrane, III"/>
            <author fullname="K. McKeever" initials="K." surname="McKeever"/>
            <date month="January" year="2022"/>
            <abstract>
              <t>This document defines a security protocol providing data integrity and confidentiality services for the Bundle Protocol (BP).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9172"/>
          <seriesInfo name="DOI" value="10.17487/RFC9172"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9174">
          <front>
            <title>Delay-Tolerant Networking TCP Convergence-Layer Protocol Version 4</title>
            <author fullname="B. Sipos" initials="B." surname="Sipos"/>
            <author fullname="M. Demmer" initials="M." surname="Demmer"/>
            <author fullname="J. Ott" initials="J." surname="Ott"/>
            <author fullname="S. Perreault" initials="S." surname="Perreault"/>
            <date month="January" year="2022"/>
            <abstract>
              <t>This document describes a TCP convergence layer (TCPCL) for Delay-Tolerant Networking (DTN). This version of the TCPCL protocol resolves implementation issues in the earlier TCPCL version 3 as defined in RFC 7242 and provides updates to the Bundle Protocol (BP) contents, encodings, and convergence-layer requirements in BP version 7 (BPv7). Specifically, TCPCLv4 uses BPv7 bundles encoded by the Concise Binary Object Representation (CBOR) as its service data unit being transported and provides a reliable transport of such bundles. This TCPCL version also includes security and extensibility mechanisms.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9174"/>
          <seriesInfo name="DOI" value="10.17487/RFC9174"/>
        </reference>
        <reference anchor="I-D.ietf-dtn-bp-sand">
          <front>
            <title>Bundle Protocol (BP) Secure Advertisement and Neighborhood Discovery (SAND)</title>
            <author fullname="Brian Sipos" initials="B." surname="Sipos">
              <organization>The Johns Hopkins University Applied Physics Laboratory</organization>
            </author>
            <author fullname="Joshua Deaton" initials="J." surname="Deaton">
              <organization>Science Applications International Corporation</organization>
            </author>
            <date day="18" month="December" year="2025"/>
            <abstract>
              <t>   This document defines the Secure Advertisement and Neighborhood
   Discovery (SAND) protocol for Bundle Protocol version 7 (BPv7) within
   a delay-tolerant network (DTN).  This protocol defines a general
   purpose advertisement mechanism with an initial set of message and
   data types able to be advertised by participating nodes in a BPv7
   network.  The focus of this document is for advertisement to
   topological neighbors about local neighborhoods but can be expanded
   upon in the future through extension points.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-dtn-bp-sand-02"/>
        </reference>
      </references>
    </references>
    <?line 431?>

<section anchor="policy-configuration">
      <name>Policy Configuration</name>
      <t>The decision to perform BP-ARP resolution is a BPA configuration option,
not a CLA implementation choice. The following table illustrates example
policy settings:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Policy</th>
            <th align="left">Behavior</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">as-needed</td>
            <td align="left">Only probe if CLA provides no Node IDs (default)</td>
          </tr>
          <tr>
            <td align="left">always</td>
            <td align="left">Always probe, verify/augment CLA-provided Node IDs</td>
          </tr>
          <tr>
            <td align="left">never</td>
            <td align="left">Trust CLA, fail if no Node IDs provided</td>
          </tr>
        </tbody>
      </table>
      <t>This separation ensures:</t>
      <ul spacing="normal">
        <li>
          <t>CLAs report facts (what they learned from the CL layer).</t>
        </li>
        <li>
          <t>Administrators configure policy (trust model for deployment).</t>
        </li>
        <li>
          <t>The BP-ARP subsystem executes the configured policy.</t>
        </li>
      </ul>
    </section>
    <section anchor="cla-interface">
      <name>CLA Interface</name>
      <t>CLAs report discovered adjacencies to the BPA. A CLA provides:</t>
      <ul spacing="normal">
        <li>
          <t>The CL address of the discovered adjacency.</t>
        </li>
        <li>
          <t>Zero or more Node IDs, if the CLA learned them from the CL layer.</t>
        </li>
      </ul>
      <t>When the Node ID list is empty, the CLA has discovered CL adjacency but
does not know the Node ID (Neighbour). When the list is non-empty, the
CLA has learned one or more Node IDs, which may be incomplete due to CL
protocol limitations. For example, TCPCLv4 <xref target="RFC9174"/> exchanges a
single Node ID during contact header negotiation; a node with additional
Node IDs in other URI schemes cannot advertise them through TCPCLv4
alone.</t>
      <t>Multi-homing is supported: a single CL address may be associated with
multiple Node IDs.</t>
    </section>
    <section anchor="implementation-notes">
      <name>Implementation Notes</name>
      <section anchor="integration-with-bpa">
        <name>Integration with BPA</name>
        <t>The BP-ARP subsystem integrates with the BPA as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>CLA reports a new adjacency, optionally with a Node ID learned from
the CL layer.</t>
          </li>
          <li>
            <t>BPA checks BP-ARP policy configuration.</t>
          </li>
          <li>
            <t>If policy requires probing, the BP-ARP subsystem sends a Request to
<tt>ipn:!.0</tt> via the CLA. If a Node ID is already known, it may be
included in the request payload as a delta query.</t>
          </li>
          <li>
            <t>The BP-ARP subsystem receives a Response and extracts the Node ID from
the source field and any additional Node IDs from the payload.</t>
          </li>
          <li>
            <t>The Neighbour is promoted to Peer with all discovered Node IDs.</t>
          </li>
          <li>
            <t>The Routing Information Base (RIB) is updated with routes to the
new Peer.</t>
          </li>
        </ol>
      </section>
      <section anchor="generic-implementation">
        <name>Generic Implementation</name>
        <t>BP-ARP is implemented generically in the BPA core, not per-CLA:</t>
        <ul spacing="normal">
          <li>
            <t>The discovery probe is a BP-layer bundle (CL-agnostic).</t>
          </li>
          <li>
            <t>The CLA provides "send to CL address" capability.</t>
          </li>
          <li>
            <t>The BP-ARP subsystem orchestrates the resolution process.</t>
          </li>
          <li>
            <t>No duplicate resolution logic is needed in each CLA.</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks are due to Erik Kline and Brian Sipos of early review and discussion.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
