rfc9172v4.txt   rfc9172.txt 
Internet Engineering Task Force (IETF) E. Birrane, III Internet Engineering Task Force (IETF) E. Birrane, III
Request for Comments: 9172 K. McKeever Request for Comments: 9172 K. McKeever
Category: Standards Track JHU/APL Category: Standards Track JHU/APL
ISSN: 2070-1721 November 2021 ISSN: 2070-1721 January 2022
Bundle Protocol Security (BPSec) Bundle Protocol Security (BPSec)
Abstract Abstract
This document defines a security protocol providing data integrity This document defines a security protocol providing data integrity
and confidentiality services for the Bundle Protocol (BP). and confidentiality services for the Bundle Protocol (BP).
Status of This Memo Status of This Memo
skipping to change at line 30 skipping to change at line 30
received public review and has been approved for publication by the received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 7841. Internet Standards is available in Section 2 of RFC 7841.
Information about the current status of this document, any errata, Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc9172. https://www.rfc-editor.org/info/rfc9172.
Copyright Notice Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the Copyright (c) 2022 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Revised BSD License text as described in Section 4.e of the include Revised BSD License text as described in Section 4.e of the
Trust Legal Provisions and are provided without warranty as described Trust Legal Provisions and are provided without warranty as described
skipping to change at line 1339 skipping to change at line 1339
associated with non-operational user data or test data. associated with non-operational user data or test data.
* When a status report containing a security reason code is only * When a status report containing a security reason code is only
sent for security issues associated with non-operational security sent for security issues associated with non-operational security
contexts, or security contexts using non-operational contexts, or security contexts using non-operational
configurations, such as test keys. configurations, such as test keys.
Security reason codes are assigned in accordance with Section 11.2 Security reason codes are assigned in accordance with Section 11.2
and are as described below. and are as described below.
Missing Security Operation: Missing security operation:
This reason code indicates that a bundle was missing one or This reason code indicates that a bundle was missing one or
more required security operations. This reason code is more required security operations. This reason code is
typically used by a security verifier or security acceptor. typically used by a security verifier or security acceptor.
Unknown Security Operation: Unknown security operation:
This reason code indicates that one or more security operations This reason code indicates that one or more security operations
present in a bundle cannot be understood by the security present in a bundle cannot be understood by the security
verifier or security acceptor for the operation. For example, verifier or security acceptor for the operation. For example,
this reason code may be used if a security block references an this reason code may be used if a security block references an
unknown security context identifier or security context unknown security context identifier or security context
parameter. This reason code should not be used for security parameter. This reason code should not be used for security
operations for which the node is not a security verifier or operations for which the node is not a security verifier or
security acceptor; there is no requirement that all nodes in a security acceptor; there is no requirement that all nodes in a
network understand all security contexts, security context network understand all security contexts, security context
parameters, and security services for every bundle in a parameters, and security services for every bundle in a
network. network.
Unexpected Security Operation: Unexpected security operation:
This reason code indicates that a receiving node is neither a This reason code indicates that a receiving node is neither a
security verifier nor a security acceptor for at least one security verifier nor a security acceptor for at least one
security operation in a bundle. This reason code should not be security operation in a bundle. This reason code should not be
seen as an error condition: not every node is a security seen as an error condition: not every node is a security
verifier or security acceptor for every security operation in verifier or security acceptor for every security operation in
every bundle. In certain networks, this reason code may be every bundle. In certain networks, this reason code may be
useful in identifying misconfigurations of security policy. useful in identifying misconfigurations of security policy.
Failed Security Operation: Failed security operation:
This reason code indicates that one or more security operations This reason code indicates that one or more security operations
in a bundle failed to process as expected for reasons other in a bundle failed to process as expected for reasons other
than misconfiguration. This may occur when a security-source than misconfiguration. This may occur when a security-source
is unable to add a security block to a bundle. This may occur is unable to add a security block to a bundle. This may occur
if the target of a security operation fails to verify using the if the target of a security operation fails to verify using the
defined security context at a security verifier. This may also defined security context at a security verifier. This may also
occur if a security operation fails to be processed without occur if a security operation fails to be processed without
error at a security acceptor. error at a security acceptor.
Conflicting Security Operations: Conflicting security operation:
This reason code indicates that two or more security operations This reason code indicates that two or more security operations
in a bundle are not conformant with the BPSec specification and in a bundle are not conformant with the BPSec specification and
that security processing was unable to proceed because of a that security processing was unable to proceed because of a
BPSec protocol violation. BPSec protocol violation.
8. Security Considerations 8. Security Considerations
Given the nature of DTN applications, it is expected that bundles may Given the nature of DTN applications, it is expected that bundles may
traverse a variety of environments and devices that each pose unique traverse a variety of environments and devices that each pose unique
security risks and requirements on the implementation of security security risks and requirements on the implementation of security
skipping to change at line 1929 skipping to change at line 1929
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>. May 2017, <https://www.rfc-editor.org/info/rfc8174>.
[RFC8949] Bormann, C. and P. Hoffman, "Concise Binary Object [RFC8949] Bormann, C. and P. Hoffman, "Concise Binary Object
Representation (CBOR)", STD 94, RFC 8949, Representation (CBOR)", STD 94, RFC 8949,
DOI 10.17487/RFC8949, December 2020, DOI 10.17487/RFC8949, December 2020,
<https://www.rfc-editor.org/info/rfc8949>. <https://www.rfc-editor.org/info/rfc8949>.
[RFC9171] Burleigh, S., Fall, K., and E. Birrane, III, "Bundle [RFC9171] Burleigh, S., Fall, K., and E. Birrane, III, "Bundle
Protocol Version 7", RFC 9171, DOI 10.17487/RFC9171, Protocol Version 7", RFC 9171, DOI 10.17487/RFC9171,
November 2021, <https://www.rfc-editor.org/info/rfc9171>. January 2022, <https://www.rfc-editor.org/info/rfc9171>.
[RFC9173] Birrane, III, E., "BPSec Default Security Contexts", [RFC9173] Birrane, III, E., White, A., and S. Heiner, "Default
RFC 9173, DOI 10.17487/RFC9173, November 2021, Security Contexts for Bundle Protocol Security (BPSec)",
RFC 9173, DOI 10.17487/RFC9173, January 2022,
<https://www.rfc-editor.org/info/rfc9173>. <https://www.rfc-editor.org/info/rfc9173>.
12.2. Informative References 12.2. Informative References
[RFC4838] Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst, [RFC4838] Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst,
R., Scott, K., Fall, K., and H. Weiss, "Delay-Tolerant R., Scott, K., Fall, K., and H. Weiss, "Delay-Tolerant
Networking Architecture", RFC 4838, DOI 10.17487/RFC4838, Networking Architecture", RFC 4838, DOI 10.17487/RFC4838,
April 2007, <https://www.rfc-editor.org/info/rfc4838>. April 2007, <https://www.rfc-editor.org/info/rfc4838>.
[RFC6257] Symington, S., Farrell, S., Weiss, H., and P. Lovell, [RFC6257] Symington, S., Farrell, S., Weiss, H., and P. Lovell,
 End of changes. 9 change blocks. 
10 lines changed or deleted 11 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/