< draft-ietf-dtn-bibect-00.txt   draft-ietf-dtn-bibect-01.txt >
Delay-Tolerant Networking Working Group S. Burleigh Delay-Tolerant Networking Working Group S. Burleigh
Internet Draft JPL, Calif. Inst. Of Technology Internet Draft JPL, Calif. Inst. Of Technology
Intended status: Standards Track July 30, 2018 Intended status: Standards Track January 31, 2019
Expires: January 2019 Expires: August 2019
Bundle-in-Bundle Encapsulation Bundle-in-Bundle Encapsulation
draft-ietf-dtn-bibect-00.txt draft-ietf-dtn-bibect-01.txt
Status of this Memo Status of this Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet- other groups may also distribute working documents as Internet-
Drafts. Drafts.
skipping to change at page 1, line 31 skipping to change at page 1, line 31
months and may be updated, replaced, or obsoleted by other documents months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress." reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
This Internet-Draft will expire on January 31, 2019. This Internet-Draft will expire on August 4, 2019.
Copyright Notice Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the Copyright (c) 2019 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in document must include Simplified BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided without Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the Simplified BSD License. warranty as described in the Simplified BSD License.
Internet-Draft Bundle-in-Bundle Encapsulation January 20199
Abstract Abstract
This document describes Bundle-in-Bundle Encapsulation (BIBE), a This document describes Bundle-in-Bundle Encapsulation (BIBE), a
Delay-Tolerant Networking (DTN) Bundle Protocol (BP) "convergence Delay-Tolerant Networking (DTN) Bundle Protocol (BP) "convergence
layer" protocol that tunnels BP "bundles" through encapsulating layer" protocol that tunnels BP "bundles" through encapsulating
bundles. The services provided by the BIBE convergence-layer bundles. The services provided by the BIBE convergence-layer
protocol adapter encapsulate an outbound BP "bundle" in a BIBE protocol adapter encapsulate an outbound BP "bundle" in a BIBE
convergence-layer protocol data unit for transmission as the payload convergence-layer protocol data unit for transmission as the payload
of a bundle. Security measures applied to the encapsulating bundle of a bundle. Security measures applied to the encapsulating bundle
may augment those applied to the encapsulated bundle. The protocol may augment those applied to the encapsulated bundle. The protocol
skipping to change at page 3, line 5 skipping to change at page 3, line 5
Appendix A. For More Information.................................13 Appendix A. For More Information.................................13
Appendix B. CDDL expression......................................14 Appendix B. CDDL expression......................................14
1. Introduction 1. Introduction
This document describes Bundle-in-Bundle Encapsulation (BIBE), a This document describes Bundle-in-Bundle Encapsulation (BIBE), a
Delay-Tolerant Networking (DTN) Bundle Protocol (BP) [RFC5050] Delay-Tolerant Networking (DTN) Bundle Protocol (BP) [RFC5050]
"convergence layer" protocol that tunnels BP "bundles" through "convergence layer" protocol that tunnels BP "bundles" through
encapsulating bundles. encapsulating bundles.
Internet-Draft Bundle-in-Bundle Encapsulation January 20199
Conformance to the bundle-in-bundle encapsulation (BIBE) Conformance to the bundle-in-bundle encapsulation (BIBE)
specification is OPTIONAL for BP nodes. Each BP node that conforms specification is OPTIONAL for BP nodes. Each BP node that conforms
to the BIBE specification provides a BIBE convergence-layer adapter to the BIBE specification provides a BIBE convergence-layer adapter
(CLA) that is implemented within the administrative element of the (CLA) that is implemented within the administrative element of the
BP node's application agent. Like any convergence-layer adapter, BP node's application agent. Like any convergence-layer adapter,
the BIBE CLA provides: the BIBE CLA provides:
. A transmission service that sends an outbound bundle (from the . A transmission service that sends an outbound bundle (from the
bundle protocol agent) to a peer CLA. In the case of BIBE, the bundle protocol agent) to a peer CLA. In the case of BIBE, the
sending CLA and receiving peer CLA are both BP nodes. sending CLA and receiving peer CLA are both BP nodes.
skipping to change at page 4, line 4 skipping to change at page 4, line 4
destination"). destination").
Note that: Note that:
. If the payload of the encapsulating bundle is protected by a . If the payload of the encapsulating bundle is protected by a
Bundle Confidentiality Block (BCB), then the source and Bundle Confidentiality Block (BCB), then the source and
destination of the encapsulated bundle are encrypted, providing destination of the encapsulated bundle are encrypted, providing
defense against traffic analysis that BPSEC alone cannot offer. defense against traffic analysis that BPSEC alone cannot offer.
. Bundles whose payloads are BIBE protocol data units may . Bundles whose payloads are BIBE protocol data units may
themselves be forwarded via a BIBE convergence-layer adapter, themselves be forwarded via a BIBE convergence-layer adapter,
Internet-Draft Bundle-in-Bundle Encapsulation January 20199
enabling nested bundle encapsulation to arbitrary depth as enabling nested bundle encapsulation to arbitrary depth as
required by security policy. required by security policy.
. Moreover, in the event that no single point of egress from an . Moreover, in the event that no single point of egress from an
insecure region of network topology can be determined at the insecure region of network topology can be determined at the
moment a bundle is to be encapsulated, multiple copies of the moment a bundle is to be encapsulated, multiple copies of the
bundle may be encapsulated individually and forwarded to all bundle may be encapsulated individually and forwarded to all
candidate points of egress. candidate points of egress.
The protocol includes a mechanism for recovery from loss of an The protocol includes a mechanism for recovery from loss of an
encapsulating bundle, called "custody transfer". This mechanism is encapsulating bundle, called "custody transfer". This mechanism is
skipping to change at page 4, line 45 skipping to change at page 4, line 48
BIBE convergence-layer protocol endpoints, also known as BIBE BIBE convergence-layer protocol endpoints, also known as BIBE
convergence-layer adapters (BCLAs), are the Administrative Elements convergence-layer adapters (BCLAs), are the Administrative Elements
of Bundle Protocol nodes that conform to the BIBE protocol of Bundle Protocol nodes that conform to the BIBE protocol
specification. The node of which a given BCLA is one component is specification. The node of which a given BCLA is one component is
termed the BCLA's "local node". termed the BCLA's "local node".
3.2. BIBE Protocol Data Units 3.2. BIBE Protocol Data Units
Notionally, a BCLA is assumed to implement in some way, for each Notionally, a BCLA is assumed to implement in some way, for each
neighboring node to which the local node issues Bundle Protocol Data neighboring node to which the local node issues BIBE Protocol Data
Units (BPDUs), the following two data resources: Units (BPDUs), the following two data resources:
1. A "custodial transmission count" (CTC). A CTC is a 1. A "custodial transmission count" (CTC). A CTC is a
monotonically increasing integer indicating the number of monotonically increasing integer indicating the number of
"custodial" BPDUs - that is, BPDUs for which custody transfer "custodial" BPDUs - that is, BPDUs for which custody transfer
Internet-Draft Bundle-in-Bundle Encapsulation January 20199
was requested - that have been issued to the neighboring node was requested - that have been issued to the neighboring node
by the local node since instantiation of the local node. by the local node since instantiation of the local node.
2. A "custodial transmission database" (CTDB), a notional array of 2. A "custodial transmission database" (CTDB), a notional array of
"custodial transmission items" (CTIs). The CTDB contains one "custodial transmission items" (CTIs). The CTDB contains one
CTI for each custodial BPDU issued to the neighboring node, by CTI for each custodial BPDU issued to the neighboring node, by
the local node, for which (a) no custody disposition has yet the local node, for which (a) no custody disposition has yet
been received in any custody signal (as discussed later) and been received in any custody signal (as discussed later) and
(b) the bundle encapsulated in that BPDU has not yet been (b) the bundle encapsulated in that BPDU has not yet been
destroyed due to, e.g., time-to-live expiration. Each CTI destroyed due to, e.g., time-to-live expiration. Each CTI
notionally contains: notionally contains:
skipping to change at page 5, line 48 skipping to change at page 5, line 51
expected), represented as a CBOR unsigned integer. Retransmission expected), represented as a CBOR unsigned integer. Retransmission
time for a BPDU for which custody transfer is NOT requested SHALL be time for a BPDU for which custody transfer is NOT requested SHALL be
zero. Retransmission time for a BPDU for which custody transfer IS zero. Retransmission time for a BPDU for which custody transfer IS
requested SHALL take the form of a "DTN Time" as defined in the requested SHALL take the form of a "DTN Time" as defined in the
Bundle Protocol specification; determination of the value of Bundle Protocol specification; determination of the value of
retransmission time is an implementation matter that is beyond the retransmission time is an implementation matter that is beyond the
scope of this specification and may be dynamically responsive to scope of this specification and may be dynamically responsive to
changes in connectivity. changes in connectivity.
The third item of the BPDU array SHALL be a single BP bundle, termed The third item of the BPDU array SHALL be a single BP bundle, termed
the "encapsulated bundle", represented as a CBOR byte string. the "encapsulated bundle", represented as a CBOR byte string of
definite length.
Internet-Draft Bundle-in-Bundle Encapsulation January 20199
3.3. Custody Signals 3.3. Custody Signals
A "custody signal" is defined as a Bundle Protocol administrative A "custody signal" is a Bundle Protocol administrative record whose
record whose record type code is 4 (i.e., bit pattern 0100) and record type code is 4 (i.e., bit pattern 0100) and whose content is
whose content is constructed as follows. constructed as follows.
The content of each custody signal SHALL be represented as a CBOR The content of each custody signal SHALL be represented as a CBOR
array. The number of elements in the array SHALL be 2. array. The number of elements in the array SHALL be 2.
The first item of the custody signal content array SHALL be a The first item of the custody signal content array SHALL be a
disposition code represented as a CBOR unsigned integer. Valid disposition code represented as a CBOR unsigned integer. Valid
disposition codes are defined as follows: disposition codes are defined as follows:
+---------+--------------------------------------------+ +---------+--------------------------------------------+
skipping to change at page 7, line 4 skipping to change at page 7, line 4
| 4 | Depleted storage. | | 4 | Depleted storage. |
+---------+--------------------------------------------+ +---------+--------------------------------------------+
| 5 | Destination endpoint ID unintelligible. | | 5 | Destination endpoint ID unintelligible. |
+---------+--------------------------------------------+ +---------+--------------------------------------------+
| 6 | No known route destination from here. | | 6 | No known route destination from here. |
Internet-Draft Bundle-in-Bundle Encapsulation January 20199
+---------+--------------------------------------------+ +---------+--------------------------------------------+
| 7 | No timely contact with next node on route. | | 7 | No timely contact with next node on route. |
+---------+--------------------------------------------+ +---------+--------------------------------------------+
| 8 | Block unintelligible. | | 8 | Block unintelligible. |
+---------+--------------------------------------------+ +---------+--------------------------------------------+
skipping to change at page 8, line 5 skipping to change at page 8, line 5
of all bundles that were encapsulated in the indicated BPDUs. of all bundles that were encapsulated in the indicated BPDUs.
Otherwise the source of the custody signal has refused custody of Otherwise the source of the custody signal has refused custody of
all bundles that were encapsulated in the indicated BPDUs, for the all bundles that were encapsulated in the indicated BPDUs, for the
indicated reason. indicated reason.
3.4. Custody Transfer Status Reports 3.4. Custody Transfer Status Reports
A "custody transfer status report" is a bundle status report with A "custody transfer status report" is a bundle status report with
the "reporting node attempted custody transfer" flag set to 1. the "reporting node attempted custody transfer" flag set to 1.
Internet-Draft Bundle-in-Bundle Encapsulation January 20199
4. BIBE Procedures 4. BIBE Procedures
4.1. BPDU Transmission 4.1. BPDU Transmission
When a BCLA is requested by the bundle protocol agent to send a When a BCLA is requested by the bundle protocol agent to send a
bundle to the peer BCLA(s) included in the BP endpoint identified by bundle to the peer BCLA(s) included in the BP endpoint identified by
a specified BP endpoint ID: a specified BP endpoint ID:
. The BCLA SHALL generate, as defined in Section 6.2 of the . The BCLA SHALL generate, as defined in Section 6.2 of the
Bundle Protocol specification (a work in progress), a BPDU for Bundle Protocol specification (a work in progress), a BPDU for
skipping to change at page 9, line 5 skipping to change at page 9, line 5
Note that the custody transfer retransmission timer mechanism Note that the custody transfer retransmission timer mechanism
provides a means of recovering from loss of an encapsulating bundle provides a means of recovering from loss of an encapsulating bundle
as indicated by non-arrival of a responding custody signal. as indicated by non-arrival of a responding custody signal.
4.2. BPDU Reception 4.2. BPDU Reception
When a BCLA receives a BPDU from the bundle protocol agent (that is, When a BCLA receives a BPDU from the bundle protocol agent (that is,
upon delivery of the payload of an encapsulating bundle): upon delivery of the payload of an encapsulating bundle):
Internet-Draft Bundle-in-Bundle Encapsulation January 20199
. If Custody Transfer was requested for this BPDU (as indicated . If Custody Transfer was requested for this BPDU (as indicated
by a non-zero value of transmission ID): by a non-zero value of transmission ID):
o If the encapsulated bundle has the same source node ID, o If the encapsulated bundle has the same source node ID,
creation timestamp, and (if that bundle is a fragment) creation timestamp, and (if that bundle is a fragment)
fragment offset and payload length as another bundle that fragment offset and payload length as another bundle that
is currently retained at the BCLA's local node, then is currently retained at the BCLA's local node, then
custody transfer redundancy MUST be handled as follows: custody transfer redundancy MUST be handled as follows:
. The BCLA SHALL add the BPDU's transmission ID to the . The BCLA SHALL add the BPDU's transmission ID to the
disposition scope report of a pending outbound disposition scope report of a pending outbound
custody signal, destined for the node that was the custody signal, destined for the node that was the
source of the encapsulating bundle, whose disposition source of the encapsulating bundle, whose disposition
is the reason code from Figure 1 for "Redundant is the reason code from Figure 1 for "Redundant
reception"., reception".
o Otherwise, if the BCLA determines that its local node can o Otherwise, if the BCLA determines that its local node can
neither deliver nor forward the encapsulated bundle for neither deliver nor forward the encapsulated bundle for
any of the reasons listed in Figure 1, then custody any of the reasons listed in Figure 1, then custody
transfer has failed. Custody transfer failure SHALL be transfer has failed. Custody transfer failure SHALL be
handled as follows: handled as follows:
. The BCLA SHALL add the BPDU's transmission ID to the . The BCLA SHALL add the BPDU's transmission ID to the
disposition scope report of a pending outbound disposition scope report of a pending outbound
custody signal, destined for the node that was the custody signal, destined for the node that was the
source of the encapsulating bundle, whose disposition source of the encapsulating bundle, whose disposition
is the reason code from Figure 2 that indicates the is the reason code from Figure 2 that indicates the
skipping to change at page 10, line 4 skipping to change at page 10, line 4
attempted" flag in the encapsulating bundle's status attempted" flag in the encapsulating bundle's status
report request field is set to 1, and status report request field is set to 1, and status
reporting is enabled, a custody transfer status reporting is enabled, a custody transfer status
report whose reason code is the same as the pending report whose reason code is the same as the pending
outbound custody signal's disposition SHOULD be outbound custody signal's disposition SHOULD be
generated, destined for the report-to endpoint of the generated, destined for the report-to endpoint of the
encapsulating bundle. encapsulating bundle.
. If Custody Transfer was NOT requested for this BPDU, or if . If Custody Transfer was NOT requested for this BPDU, or if
Custody Transfer was requested for this BPDU and custody Custody Transfer was requested for this BPDU and custody
transfer succeeded, then the encapsulated bundle SHALL be transfer succeeded, then the encapsulated bundle SHALL be
Internet-Draft Bundle-in-Bundle Encapsulation January 20199
delivered from the convergence layer adapter to the bundle delivered from the convergence layer adapter to the bundle
protocol agent, whereupon bundle reception SHALL be performed protocol agent, whereupon bundle reception SHALL be performed
as defined in section 5.6 of the Bundle Protocol specification as defined in section 5.6 of the Bundle Protocol specification
(a work in progress) as usual: the encapsulated bundle may be (a work in progress) as usual: the encapsulated bundle may be
forwarded, delivered, etc. forwarded, delivered, etc.
Note that the manner in which pending outbound custody signals are Note that the manner in which pending outbound custody signals are
managed, disposition scope reports are aggregated, and custody managed, disposition scope reports are aggregated, and custody
signal transmission is initiated is an implementation matter that signal transmission is initiated is an implementation matter that
is beyond the scope of this specification. Note, however, that is beyond the scope of this specification. Note, however, that
skipping to change at page 11, line 4 skipping to change at page 11, line 4
(destroying the associated retransmission timer, if any). (destroying the associated retransmission timer, if any).
. Otherwise (custody refusal), for each transmission ID in the . Otherwise (custody refusal), for each transmission ID in the
custody signal's disposition scope report: custody signal's disposition scope report:
o The corresponding CTI MUST be removed from the CTDB o The corresponding CTI MUST be removed from the CTDB
(destroying the associated retransmission timer, if any). (destroying the associated retransmission timer, if any).
o Any further action taken by the BCLA is implementation- o Any further action taken by the BCLA is implementation-
specific and may depend on the reason code cited for the specific and may depend on the reason code cited for the
refusal. For example, if the custody signal's reason code refusal. For example, if the custody signal's reason code
was "Depleted storage", the BCLA might choose to notify was "Depleted storage", the BCLA might choose to notify
the bundle protocol agent that custodial transmission of the bundle protocol agent that custodial transmission of
Internet-Draft Bundle-in-Bundle Encapsulation January 20199
the indicated bundle failed. If the reason code was the indicated bundle failed. If the reason code was
"Redundant reception", on the other hand, this might cause "Redundant reception", on the other hand, this might cause
the BCLA simply to instruct the bundle protocol agent to the BCLA simply to instruct the bundle protocol agent to
remove the retention constraint "Custody accepted" on the remove the retention constraint "Custody accepted" on the
bundle referenced by the corresponding CTI and to revise bundle referenced by the corresponding CTI and to revise
its algorithm for computing retransmission time. its algorithm for computing retransmission time.
5. Security Considerations 5. Security Considerations
An adversary on a DTN-based network that can delete bundles could An adversary on a DTN-based network that can delete bundles could
skipping to change at page 11, line 41 skipping to change at page 11, line 44
7. References 7. References
7.1. Normative References 7.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, March 1997.
7.2. Informative References 7.2. Informative References
[RFC5050] Scott, M. and S. Burleigh, "Bundle Protocol [RFC5050] Scott, K. and S. Burleigh, "Bundle Protocol
Specification", RFC 5050, November 2007. Specification", RFC 5050, November 2007.
8. Acknowledgments 8. Acknowledgments
This work is freely adapted from [RFC5050], which was an effort of This work is freely adapted from [RFC5050], which was an effort of
the Delay Tolerant Networking Research Group. The following DTNRG the Delay Tolerant Networking Research Group. The following DTNRG
participants contributed significant technical material and/or participants contributed significant technical material and/or
inputs to that document: Dr. Vinton Cerf of Google, Scott Burleigh, inputs to that document: Dr. Vinton Cerf of Google, Scott Burleigh,
Adrian Hooke, and Leigh Torgerson of the Jet Propulsion Laboratory, Adrian Hooke, and Leigh Torgerson of the Jet Propulsion Laboratory,
Internet-Draft Bundle-in-Bundle Encapsulation January 20199
Michael Demmer of the University of California at Berkeley, Robert Michael Demmer of the University of California at Berkeley, Robert
Durst, Keith Scott, and Susan Symington of The MITRE Corporation, Durst, Keith Scott, and Susan Symington of The MITRE Corporation,
Kevin Fall of Carnegie Mellon University, Stephen Farrell of Trinity Kevin Fall of Carnegie Mellon University, Stephen Farrell of Trinity
College Dublin, Peter Lovell of SPARTA, Inc., Manikantan Ramadas of College Dublin, Peter Lovell and Howard Weiss of SPARTA, Inc., and
Ohio University, and Howard Weiss of SPARTA, Inc. Manikantan Ramadas of Ohio University.
The custody transfer procedures defined in this specification are The custody transfer procedures defined in this specification are
adapted from the Aggregate Custody Signals draft specification adapted from the Aggregate Custody Signals draft specification
authored in 2010-2012 by Sebastian Kuzminsky and Andrew Jenkins, authored in 2010-2012 by Sebastian Kuzminsky and Andrew Jenkins,
then of the University of Colorado at Boulder. then of the University of Colorado at Boulder.
Although the BIBE specification diverges in some ways from the Although the BIBE specification diverges in some ways from the
original Bundle-in-Bundle Encapsulation Internet Draft authored by original Bundle-in-Bundle Encapsulation Internet Draft authored by
Susan Symington, Bob Durst, and Keith Scott of The MITRE Corporation Susan Symington, Bob Durst, and Keith Scott of The MITRE Corporation
(draft-irtf-dtnrg-bundle-encapsulation-06, 2009), the influence of (draft-irtf-dtnrg-bundle-encapsulation-06, 2009), the influence of
that earlier document is gratefully acknowledged. that earlier document is gratefully acknowledged.
This document was prepared using 2-Word-v2.0.template.dot. This document was prepared using 2-Word-v2.0.template.dot.
Internet-Draft Bundle-in-Bundle Encapsulation January 20199
Appendix A. For More Information Appendix A. For More Information
Please refer comments to dtn@ietf.org. The Delay Tolerant Networking Please refer comments to dtn@ietf.org. The Delay Tolerant Networking
Research Group (DTNRG) Web site is located at http://www.dtnrg.org. Research Group (DTNRG) Web site is located at http://www.dtnrg.org.
Copyright (c) 2018 IETF Trust and the persons identified as authors Copyright (c) 2019 IETF Trust and the persons identified as authors
of the code. All rights reserved. of the code. All rights reserved.
Redistribution and use in source and binary forms, with or without Redistribution and use in source and binary forms, with or without
modification, is permitted pursuant to, and subject to the license modification, is permitted pursuant to, and subject to the license
terms contained in, the Simplified BSD License set forth in Section terms contained in, the Simplified BSD License set forth in Section
4.c of the IETF Trust's Legal Provisions Relating to IETF Documents 4.c of the IETF Trust's Legal Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info). (http://trustee.ietf.org/license-info).
Internet-Draft Bundle-in-Bundle Encapsulation January 20199
Appendix B. CDDL expression Appendix B. CDDL expression
For informational purposes, Carsten Bormann has kindly provided an For informational purposes, Carsten Bormann has kindly provided an
expression of the Bundle Protocol specification in the CBOR Data expression of the Bundle Protocol specification in the CBOR Data
Definition Language (CDDL). Portions of CDDL expression that bear Definition Language (CDDL). Portions of CDDL expression that bear
on the custody transfer extension are presented below, somewhat on the custody transfer extension are presented below, somewhat
edited by the authors. Note that wherever the CDDL expression is in edited by the authors. Note that wherever the CDDL expression is in
disagreement with the textual representation of the BP specification disagreement with the textual representation of the BP specification
presented in the earlier sections of this document, the textual presented in the earlier sections of this document, the textual
representation rules. representation rules.
 End of changes. 23 change blocks. 
15 lines changed or deleted 48 lines changed or added

This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/