<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY SELF "[RFCXXXX]">
]>


<rfc ipr="trust200902" docName="draft-li-dart-protocol-01" category="exp" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DART Protocol">DART: Domain-Aware Routing Technology Protocol</title>

    <author initials="S." surname="Li" fullname="Shi Li">
      <organization>Indenpendent</organization>
      <address>
        <postal>
          <city>Shanghai</city>
          <country>China</country>
        </postal>
        <email>lishi.china@qq.com</email>
      </address>
    </author>

    <date year="2025" month="October" day="16"/>

    <area>Internet</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 101?>

<t>This document describes the Domain-Aware Routing Technology (DART), a novel addressing and routing protocol that introduces a Fully Qualified Domain Name (FQDN)-centric addressing model. DART operates over existing IP (IPv4 or IPv6) networks and employs the Domain Name System (DNS) as its control plane to map domain names to IP addresses. Within full compatibility with current IP infrastructure, DART extends the effective address space to infinity, enables seamless communication between IPv4 and IPv6 networks, and significantly improves Internet scalability and evolvability.</t>

<t>By localizing the IP address space within each DNS domain, DART provides unlimited address reuse and constructs a more aggregated routing structure that alleviates global routing table pressure. The protocol transforms the paradigm from &quot;IP-based addressing&quot; to &quot;domain-based addressing,&quot; laying the foundation for a unified, name-driven networking architecture. DART can be gradually deployed and upgraded without affecting existing communications, requiring hardware upgrades only for a small number of critical devices.</t>

<t>A functional prototype of the DART system has been independently developed and deployed on Internet by the author.</t>



    </abstract>



  </front>

  <middle>


<?line 111?>

<section anchor="problems"><name>Introduction</name>

<t>With the rapid proliferation of Internet-connected devices worldwide, the traditional IPv4 address space has long been insufficient to meet the ever-growing demand for connectivity. Although IPv6, as the next-generation Internet standard, offers a theoretically limitless address capacity, its deployment has been hindered by various practical challenges - including high upgrade costs, severe compatibility issues, and the lack of immediate economic benefits. As a result, most networks continue to rely on increasingly complex NAT and private address mapping systems to maintain connectivity.</t>

<t>To address this dilemma, <strong>Domain-Aware Routing Technology (DART)</strong> emerges as a solution. DART is a communication protocol designed to provide <strong>an effectively unlimited address space</strong> while remaining <strong>highly compatible with existing networks</strong>. To achieve this goal, DART introduces a Fully Qualified Domain Name (FQDN <xref target="RFC1034"/><xref target="RFC1035"/>)-based addressing model and is engineered to be encapsulated within either IPv4 or IPv6 <xref target="RFC8200"/> networks.</t>

<t>DART maintains full compatibility with IPv4 and can be deployed without requiring any modifications to existing endpoint devices. At the same time, DART natively supports IPv6, enabling operation over IPv6-only networks and facilitating seamless interoperability between IPv4 and IPv6 without the need for dual-stack architectures or complex address translation mechanisms.</t>

<t>By integrating DNS into the core of its addressing architecture, DART establishes a name-based routing model. Through virtual address mapping and lightweight encapsulation mechanisms, DART enables an abstract upgrade of the Internet&#39;s addressing semantics within the current network infrastructure. Whether deployed in home, enterprise, or carrier networks, DART can be integrated into the existing Internet at minimal cost, supporting incremental evolution and expanding the global addressable space without requiring architectural overhaul - thereby laying a sustainable technical foundation for the next-generation Internet <xref target="RFC1034"/><xref target="RFC1035"/><xref target="RFC2181"/>.</t>

<t>The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRED&quot;, &quot;SHALL&quot;, &quot;SHALL NOT&quot;, &quot;SHOULD&quot;, &quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;, &quot;NOT RECOMMENDED&quot;, &quot;MAY&quot;, and &quot;OPTIONAL&quot; in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/><xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t><list style="symbols">
  <t>DART (Domain-Aware Routing Technology)<br />
A protocol that introduces a domain name-based addressing and encapsulation mechanism on top of the existing IP network, enabling scalable and highly compatible global communication.</t>
  <t>DART Domain<br />
A logical addressing domain defined by a DNS subdomain (e.g., dart.example.com). Each DART domain owns an independent IPv4 or IPv6 address space, which is used by devices within the domain.</t>
  <t>DART Address<br />
Essentially represented by a globally unique Fully Qualified Domain Name (FQDN), indicating the identity and location of a communication endpoint. During actual communication, it is mapped to an IP address allocated within the corresponding DART domain. The IP address itself is not globally unique.</t>
  <t>DART Encapsulation<br />
DART packets use DART addresses as both source and destination identifiers and are encapsulated in UDP datagrams for transmission over existing IP networks. The encapsulated payload supports standard IP packet structures.</t>
  <t>DSADM (Delayed Source Address Determination Mechanism)<br />
When a DART packet traverses a NAT gateway, its IP source address and UDP source port are altered. Under this mechanism, the device sending the DART packet leaves the Source Address field in the DART header unfilled. Instead, the receiving DART device populates this field based on the packet&#39;s IP source address and UDP source port. Consequently, when the packet is returned, the DART gateway can decode the embedded information in the address to determine the correct IP destination address and UDP destination port, thereby enabling DART packets to traverse NAT gateways seamlessly.</t>
  <t>NAT-DART-4 Translation<br />
A gateway mechanism that enables legacy IPv4-only hosts to establish peer-to-peer communication via the DART network. The edge DART gateway performs transparent translation between DART packets and IPv4 packets, allowing seamless compatibility. If necessary, the same mechanism can also be used to translate between DART packets and IPv6 packets <xref target="RFC2663"/><xref target="RFC4787"/>.</t>
  <t>DART Gateway<br />
A forwarding device deployed at the boundary of a DART domain, responsible for encapsulating and decapsulating DART packets, performing route selection, and interworking with legacy IPv4/IPv6 networks.</t>
  <t>Virtual Address Mapping<br />
When a local host queries domain names within a remote DART gateway&#39;s subdomain, all such names resolve to the same external IP address of the remote DART gateway. In this case, IPv4-only hosts behind the local DART gateway are unable to distinguish between different hosts within the remote subdomain. To address this, the local DART gateway maps each remote domain name to a distinct virtual address, allowing internal IPv4-only hosts to differentiate between target hosts and maintain consistent mappings throughout the session. This mechanism is essential for enabling IPv4-only hosts to function as DART-ready endpoints. This mechanism is the key to NAT-DART-4 translation.</t>
  <t>DART-ready Public Server<br />
A server deployed on the public Internet, primarily providing web or application services, usually associated with a stable domain name and operating continuously online.</t>
  <t>DART-ready End Device<br />
Devices intended for personal or enterprise use, such as PCs, mobile phones, and IoT devices.</t>
</list></t>

</section>
<section anchor="design-goals"><name>Design Goals</name>

<t>DART aims to provide a sustainable and scalable addressing and forwarding architecture for the future Internet, focusing on addressing fundamental issues such as IPv4 address exhaustion, protocol fragmentation, upgrade complexity, and the lack of seamless interoperability with IPv6. The design emphasizes incremental deployment without disrupting existing network operations, guiding the global network ecosystem toward a unified, efficient, and sustainable model <xref target="RFC8504"/><xref target="RFC4864"/>.</t>

<t>The core design goals include:</t>

<t><list style="symbols">
  <t>Infinite Addressability<br />
DART utilizes Fully Qualified Domain Names (FQDNs) as principal identifiers, freeing addressing from fixed-length numeric schemes and inherently supporting unlimited scalability.</t>
  <t>Full IPv4 Compatibility<br />
The DART protocol operates over standard IPv4 networks without requiring any modifications to the IPv4 protocol stack, existing endpoints, or network devices, making it well-suited for deployment on widely deployed infrastructures.</t>
  <t>Native IPv6 Compatibility<br />
DART also supports encapsulation over IPv6 networks and can operate in IPv6-only environments, providing equivalent addressing and forwarding capabilities in pure IPv6 deployments.</t>
  <t>Seamless IPv4 and IPv6 Interoperability<br />
Through gateway mechanisms, DART enables transparent communication between IPv4-only and IPv6-only hosts without the need for dual-stack deployments or complex address translation schemes such as NAT64.</t>
  <t>Deep Integration with DNS<br />
DNS serves as the control plane core in DART, responsible for identity resolution and virtual address assignment, thereby supporting dynamic mapping, mobility, and service-level addressing.</t>
  <t>Support for Incremental Deployment<br />
DART can be deployed across residential, enterprise, and operator networks with strong backward compatibility and edge-introduction capabilities, allowing phased adoption without impacting existing services.</t>
  <t>Load Balancing and Mobility Support Outlook<br />
By returning multiple IP addresses via DNS, DART inherently supports load balancing. Although mobility mechanisms remain under active research, dynamic DNS updates and routing optimizations are expected to enable effective mobility support for moving nodes.</t>
</list></t>

<t>Together, these goals form the foundation of the DART protocol, enabling compatibility with existing network architectures while providing extensibility for future growth-not as a disruptive replacement, but as an evolutionary enhancement aligned with emerging network trends.</t>

</section>
<section anchor="protocol-overview"><name>Protocol Overview</name>

<t>DART (Domain Aware Routing Technology) is a standalone network-layer protocol that enables packet forwarding based on Fully Qualified Domain Names (FQDNs) rather than fixed-length numeric addresses. Unlike IPv4 <xref target="RFC791"/> and IPv6 <xref target="RFC8200"/>, which rely on prefix-based routing of 32-bit or 128-bit addresses, DART uses human-readable, hierarchical domain names as primary network identifiers.</t>

<t>DART is not an extension of IP, but an alternate network layer that operates encapsulated within IP packets. This structural encapsulation ensures compatibility with existing infrastructure while enabling DNS-driven routing. Typically, DART payloads are embedded in UDP packets using a dedicated port (e.g., 0xDA27), allowing them to traverse NAT gateways and be transmitted over both IPv4 and IPv6 networks.</t>

<t>Routing decisions in DART networks are based on FQDN semantics, with DNS serving as the authoritative system for both name resolution and capability discovery (e.g., whether a target host supports DART). DART-ready nodes dynamically determine whether to initiate DART-based communication based on DNS responses.</t>

<t>DART gateways perform protocol translation for legacy IP-only hosts, enabling incremental adoption across heterogeneous networks. The design prioritizes evolutionary deployment without requiring changes to legacy endpoints, while offering a unified and extensible framework for next-generation networking.</t>

<t>This document treats DART as a first-class network protocol, capable of operating alongside traditional IP stacks. The following sections define its packet format, addressing model, routing mechanisms, and deployment strategies.</t>

</section>
<section anchor="packet-format"><name>Packet Format</name>

<t>The DART protocol defines a lightweight packet header that carries identification information for the destination and source hosts, and guides packet forwarding across different DART domains. This header is inserted between the IP layer and the transport layer, positioning DART as a protocol operating at a &quot;second network layer.&quot; It does not interfere with the original IP header structure and provides address translation services for IPv4-only hosts when needed.</t>

<section anchor="header-structure"><name>Header Structure</name>

<t>The DART packet header is structured as follows:</t>

<figure title="DART Packet Header Structure" anchor="_figure-header-structure"><artwork><![CDATA[
0                   1                   2                   3  
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|    Version    |     Proto     |    DstLen     |    SrcLen     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                Destination FQDN-ID (variable length)          ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                   Source FQDN-ID (variable length)            ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

]]></artwork></figure>

<t><list style="symbols">
  <t>Version (8 bits)<br />
Indicates the version of the DART protocol. The current version is 1. Future versions may be used to extend the field structure or introduce new addressing mechanisms.</t>
  <t>Proto (8 bits)<br />
Specifies the upper-layer protocol type, using the same values as the IP protocol field (e.g., 6 for TCP, 17 for UDP, 1 for ICMP). When encapsulating a packet in DART, the Protocol field in the outer IP header should be adjusted accordingly (e.g., set to &quot;UDP&quot;, with the UDP destination port set to 0xDA27), and the original protocol number should be copied into this field.</t>
  <t>DstLen (8 bits)<br />
Length of the Destination FQDN-ID, in bytes.</t>
  <t>SrcLen (8 bits)<br />
Length of the Source FQDN-ID, in bytes.</t>
  <t>Destination FQDN-ID (variable length)<br />
The Fully Qualified Domain Name (FQDN) of the destination host, for example, &quot;dart-host.example.com.&quot; This field serves as the primary routing basis for DART packets, and the receiver must be able to correctly interpret its semantic structure.<br />
For forwarding efficiency, it is recommended to store the domain name in reverse order. For instance, if the destination domain name is &quot;dart-host.example.com.&quot;, it should be encoded as &quot;.com.example.dart-host&quot;. Although the domain name itself is variable in length, this reversed representation allows DART routers to locate relatively fixed content at predictable positions, thereby simplifying processing and improving forwarding efficiency.</t>
  <t>Source FQDN-ID (variable length)<br />
The Fully Qualified Domain Name of the source host. This field can be used for reverse routing of response paths, policy control, and other purposes.<br />
If the length of the Source FQDN-ID field is zero, it indicates that the packet is anonymous or unidirectional. In this case, the receiver should not expect a source identifier and should not generate a response to this packet. This design is suitable for unidirectional notifications, broadcast or multicast packets, and privacy-protecting communication scenarios where the sender does not wish to reveal its identity.<br />
The order of the Source FQDN-ID should be consistent with that of the Destination FQDN-ID.</t>
</list></t>

</section>
<section anchor="encoding-and-alignment"><name>Encoding and Alignment</name>
<t><list style="symbols">
  <t>All fields are encoded in network byte order (big-endian);</t>
  <t>FQDN-ID fields are represented in UTF-8 encoding, not null-terminated and not aligned to fixed boundaries;</t>
  <t>During decapsulation, the positions of the FQDN fields must be determined precisely based on the values of DstLen and SrcLen.</t>
</list></t>

</section>
<section anchor="header-insertion-position"><name>Header Insertion Position</name>
<t>DART packets are not defined as native IP-layer protocols. Instead, they are encapsulated within the payload of UDP datagrams. A fixed UDP destination port (recommended: 55847 / 0xDA27) is used to distinguish DART packets and facilitate their processing. The encapsulation stack is illustrated as follows:</t>

<texttable title="Example of DART Header Insertion Position" anchor="tab-dart-header">
      <ttcol align='center'>Layer</ttcol>
      <ttcol align='left'>Remarks</ttcol>
      <c>Ethernet</c>
      <c>&#160;</c>
      <c>IP</c>
      <c>v4/v6</c>
      <c>UDP</c>
      <c>DstPort=55847</c>
      <c>DART</c>
      <c>&#160;</c>
      <c>Upper-layer Protocol</c>
      <c>(e.g., TCP/UDP/ICMP)</c>
      <c>Payload</c>
      <c>&#160;</c>
</texttable>

<t>Encapsulation Details:</t>

<t><list style="symbols">
  <t>UDP Source Port: May be dynamically allocated (e.g., for session tracking);</t>
  <t>UDP Destination Port: Recommended to be statically set to 55847 (decimal), indicating a DART payload;</t>
  <t>UDP Length: Covers both the DART header and upper-layer protocol data;</t>
  <t>UDP Checksum: Optional, but recommended for integrity checking.</t>
</list></t>

<t>NAT Compatibility:</t>

<t>Since DART packets appear as regular UDP traffic on the wire, they inherit the following advantages:</t>

<t><list style="symbols">
  <t>Full compatibility with consumer and enterprise-grade NATs;</t>
  <t>No reliance on IP options or Application Layer Gateways (ALGs);</t>
  <t>Can be managed by existing firewalls and access control policies based on UDP port;</t>
  <t>Enables NAT traversal techniques such as UDP hole punching, keep-alive, and reachability testing (While the</t>
</list></t>

<t>DART protocol aims to eliminate the necessity of NAT gateways, it remains compatible with them, though the use of overly complex NAT-related techniques is not encouraged).</t>

</section>
<section anchor="example"><name>Example</name>
<t>Assume that the client client.dart.cn initiates a DART connection to the server server.example.com. The DART header fields are as follows:</t>

<texttable title="DART Header Example" anchor="tab-dart-header-example">
      <ttcol align='left'>Field  Name</ttcol>
      <ttcol align='center'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Protocol version</c>
      <c>Proto</c>
      <c>6</c>
      <c>Upper-layer protocol (6 = TCP)</c>
      <c>DstLen</c>
      <c>18</c>
      <c>Byte length of the destination FQDN</c>
      <c>SrcLen</c>
      <c>14</c>
      <c>Byte length of the source FQDN</c>
      <c>Dst FQDN-ID</c>
      <c>&quot;server.example.com&quot;</c>
      <c>Destination host name, encoded in UTF-8</c>
      <c>Src FQDN-ID</c>
      <c>&quot;client.dart.cn&quot;</c>
      <c>Source host name, encoded in UTF-8</c>
</texttable>

</section>
</section>
<section anchor="dart-addressing-and-routing-model"><name>DART Addressing and Routing Model</name>

<t>DART replaces the reliance on IP addresses as globally unique host identifiers with an addressing architecture based on Fully Qualified Domain Names (FQDNs). It introduces a domain-based hierarchical routing model, enabling wide-area coverage, virtually unlimited addressability, and backward compatibility with IPv4-only hosts through the use of virtual addresses, DNS integration, and cooperation with DART gateways.</t>

<section anchor="fqdn-as-address"><name>FQDN as Address</name>
<t>In the DART protocol, each host uses its Fully Qualified Domain Name (FQDN) as its logical address (FQDN-ID). This address is transmitted in clear text within packets and serves as the primary basis for forwarding decisions. This model offers the following advantages:</t>

<t><list style="symbols">
  <t>The address space is theoretically unlimited, constrained only by the domain name system.</t>
  <t>It can intuitively reflect the network&#39;s organizational structure and physical topology.</t>
  <t>It supports flexible address mapping, making scenarios such as load balancing and host mobility feasible-provided that DART gateways maintain consistent mappings.</t>
  <t>Effectively mitigates common problems of address conflicts and identity ambiguity typically encountered in NAT environments.</t>
</list></t>

</section>
<section anchor="inter-domain-routing-model"><name>Inter-Domain Routing Model</name>
<t>The DART network adopts a hierarchical and distributed routing architecture based on domain names, with two core components: the DNS system and the DART Gateway:</t>

<t><list style="symbols">
  <t>The DNS system constitutes the control plane of DART, responsible for domain name allocation, resolution, address mapping, and the dissemination and negotiation of control information. It determines the logical structure of communication paths.</t>
  <t>The DART Gateway is responsible for the data plane, handling data encapsulation and decapsulation, routing decisions, and protocol translation at domain boundaries.</t>
</list></t>

<t>This design follows the established principle of control plane and data plane separation in modern Internet architecture, enabling DART to achieve high scalability and flexible deployment. Inter-domain communication paths are resolved hierarchically through DNS, while actual packet forwarding is carried out by DART gateways at domain boundaries, thereby constructing a logically autonomous and structurally clear model of inter-domain connectivity.</t>

<t>It is worth noting that the host naming mechanism in DART networks is fully compatible with the existing DHCP+DNS infrastructure. In current local network practices, hosts typically submit their hostname during DHCP requests. The DHCP server assigns an IP address and can register the hostname-to-IP mapping in the DNS system using Dynamic DNS (DDNS) <xref target="RFC2136"/>.</t>

<t>In future scenarios where hosts natively support the DART protocol stack, the DHCP server can centrally assign hostnames that conform to DART naming conventions, and DHCP clients can configure their local hostname accordingly. This ensures consistent and centrally managed naming within the network.
Even in transitional phases where end hosts are not yet DART-aware, DHCP servers can enforce uniqueness by rejecting duplicate hostnames or appending disambiguating suffixes. This mechanism provides a practical and incremental deployment path for DART, allowing it to smoothly integrate with existing network environments.</t>

<section anchor="domain-structure-and-gateway-interfaces"><name>Domain Structure and Gateway Interfaces</name>

<t>The DART network is built upon the hierarchical logic of the DNS naming system, in which each domain can be further divided into child domains, forming a multi-level logical naming tree. Correspondingly, DART Gateways serve as the connective backbone of this tree, responsible for cross-domain packet forwarding and control-plane signaling.</t>

<t>A typical DART Gateway includes the following interface structure:</t>

<t><list style="symbols">
  <t>Parent domain interface (upstream): Used to connect to the parent DART domain. It typically handles access to the DNS control plane and the forwarding of upstream traffic. This interface may use various connection types, including direct physical links or indirect logical paths via intermediate networks (i.e., &quot;third-party relay paths&quot;).</t>
  <t>Child domain interface (downstream): Used to connect to the child domains managed by the gateway. Each child domain is treated as a logical DART region. The downstream interface handles local DNS forwarding, virtual address allocation, DART encapsulation, and related tasks.</t>
</list></t>

<t>The domain relationship of a DART Gateway must conform to the following structural rules:</t>

<t><list style="symbols">
  <t>Single parent domain: Each DART Gateway must belong to exactly one parent domain to maintain a hierarchical directed tree structure;</t>
  <t>Support for multiple child domains: A DART Gateway may manage one or more child domains, which together form its downstream logical namespace;</t>
  <t>Multiple interfaces to the same domain: A DART Gateway may connect to the same domain (either parent or child) via multiple interfaces to support redundancy, load balancing, path optimization, or lateral connectivity between sibling gateways;</t>
  <t>Intra-domain routing is delegated to the IP layer: For multiple interfaces connected to the same domain, routing decisions and path convergence are handled by standard IP-layer dynamic routing protocols (e.g., OSPF <xref target="RFC2328"/>, BGP <xref target="RFC4271"/>). The DART layer does not interfere with intra-domain routing.</t>
</list></t>

<t>This interface model has the following properties:</t>

<t><list style="symbols">
  <t>Scalable hierarchical extension<br />
Each child domain may recursively deploy its own DART Gateways and form deeper hierarchical structures;</t>
  <t>Explicit domain boundaries<br />
The DART Gateway acts as the sole ingress/egress point for domain-level communication, supporting policy enforcement and traffic management;</t>
  <t>Support for incremental deployment<br />
DART support can be gradually introduced at any layer without disrupting existing networks.</t>
</list></t>

<t>Through this structure, the DART network enables a flexible, multi-level architecture that provides a well-organized foundation for FQDN-based addressing and routing.</t>

<t>In practical deployments, it is possible for DART Gateway interconnections to span multiple hierarchical levels without a common parent domain (e.g., a capital node in a small country may connect to a neighboring border city in a large country instead of the distant capital). Such scenarios go beyond the expressive power of static hierarchical domain models. It is therefore recommended that industry experts consider adapting mature dynamic routing protocols from the IP layer to design a dynamic routing mechanism for the DART layer, enabling flexible routing across domain boundaries and hierarchy levels. This document does not delve into protocol design details, which are left for future research by specialists in the field.</t>

<figure title="A Typical DART Inter-Domain Hierarchy" anchor="fig-dart-header"><artwork><![CDATA[
              +------------------+
              |   Parent Domain  |
              +------------------+
                       ^
                       |
              [Upstream Interface]
                       |
        +----------------------------+
        |       DART Gateway         | <-- Lateral Link --> Other DART
        +----------------------------+                       Gateway
          ^                        ^
[Downstream Interface]    [Downstream Interface]
          |                        |
  +----------------+       +----------------+
  | Child Domain A |       | Child Domain B |
  +----------------+       +----------------+
]]></artwork></figure>

<t>Notes:</t>

<t><list style="symbols">
  <t>The parent domain is shown above, connected via the upstream interface;</t>
  <t>Two child domains are shown below, each connected via a downstream interface;</t>
  <t>The lateral link indicates peer-level connectivity, logically still part of the parent domain;</t>
  <t>Interface roles are annotated with bracketed labels;</t>
  <t>This structure reflects the DART model of &quot;one parent, multiple children, and multi-interface support.&quot;</t>
</list></t>

</section>
<section anchor="darts-requirements-and-suggestions-for-the-dns-system"><name>DART&#39;s Requirements and Suggestions for the DNS System</name>
<t>The DART protocol relies on FQDN-based addressing and uses the DNS system as its control plane. Domain-level routing, subdomain delegation, and host reachability all depend on DNS operations. As a result, DART places higher demands on DNS functionality, extensibility, and autonomy. The key requirements include:</t>

<t><list style="symbols">
  <t>Dynamic Subdomain Delegation and Host Dynamic Access Capability<br />
A DART subdomain must connect to its parent domain as an authoritative server and possess a certain level of dynamic registration capability. In particular, in scenarios where edge DART gateways dynamically generate subdomains, a mechanism is required to quickly and automatically register and update NS and A/AAAA records within the DNS system.<br />
At the same time, DART-ready hosts also need dynamic access to the control plane, meaning they can register, update, and deregister their online status within the DNS system of the current domain.</t>
  <t>Precise FQDN Resolution<br />
As all packet forwarding decisions in a DART network are based on FQDN, DNS resolution must be complete, accurate, and consistent. The system must support fast TTL refresh, coherent caching strategies, and avoidance of partial or ambiguous resolution paths.</t>
  <t>Indication of DART-Ready Hosts<br />
To distinguish DART-ready hosts from IPv4-only ones, the DNS system may employ special markers, such as CNAME prefixes (e.g., dart-host.) or dedicated TXT records. These indicators help DART senders determine whether to encapsulate outgoing packets using the DART protocol.</t>
  <t>Access Guidance Mechanism for DART-Ready Hosts<br />
To distinguish DART-ready hosts from IPv4-only or IPv6-only hosts, the DNS system can use a special CNAME identifier (such as the &quot;dart-host.&quot; prefix) to redirect A/AAAA records, or employ dedicated TXT records to indicate whether the target host supports DART. This information guides the sender in deciding whether to encapsulate the packet using the DART protocol.</t>
  <t>Enhanced DNS Security<br />
Since DART forwarding depends entirely on DNS results, the authenticity and integrity of DNS records are critical. Security measures such as DNSSEC are strongly recommended to prevent cache poisoning or redirection attacks that may compromise routing.</t>
</list></t>

<t>To fulfill these requirements, modern DNS software stacks can be extended via plugins, APIs, or integration with SDN controllers. Popular DNS platforms like BIND, PowerDNS, and CoreDNS offer sufficient programmability to serve as a foundation for early-stage DART trials.</t>

<t>In conclusion, the DNS system is the cornerstone of DART&#39;s control plane. Its completeness, performance, and adaptability will directly impact the scalability and manageability of DART networks. Future standardization work may consider extending the DNS protocol or defining new implementation guidelines to support DART&#39;s dynamic, secure, and FQDN-based addressing model.</t>

</section>
<section anchor="routing-and-forwarding"><name>Routing and Forwarding</name>
<t>DART is a parallel network layer protocol encapsulated above the IP layer. Due to the design principle that each DART domain owns an independent IPv4/IPv6 address space, a DART gateway must maintain separate IP routing tables for each connected domain. These domains are isolated from each other at the IP layer and do not have direct inter-domain IP connectivity.</t>

<t>Therefore, a DART gateway manages two types of routing information simultaneously:</t>

<t><list style="symbols">
  <t>DART-layer logical routing table<br />
Used to make forwarding decisions based on the destination FQDN contained in packets, determining which downstream interface or relay gateway to forward to;</t>
  <t>IP-layer routing table for each domain<br />
Used for forwarding IP packets within that domain, including communication between hosts and interaction with the DART gateway. Each IP routing table is valid only within its respective domain and does not support cross-domain addressing.</t>
</list></t>

<t>The IP layer routing mechanisms are mature and well-established and will not be elaborated here. The following focuses on DART-layer routing and forwarding principles:</t>

<t><list style="symbols">
  <t>Domain name-based routing control<br />
DART gateways maintain logical routing tables organized by domain and forward packets according to the target Fully Qualified Domain Name (FQDN). DART employs a strictly hierarchical FQDN addressing system with globally unique addresses, abandoning prefix aggregation and traditional IP subnet nesting.</t>
  <t>Elimination of prefix holes and fragmentation issues<br />
Thanks to the inherent separation provided by domain-name-based addressing, DART completely eliminates prefix overlap, address tunneling, and routing fragmentation issues. In IPv4 networks, this means there is no longer a need to rely on NAT or &quot;hole punching&quot; techniques; in IPv6 networks, it prevents the continuous growth of BGP routing tables. As a result, DART can significantly simplify the global routing table structure and enhance both control and scalability.</t>
  <t>DNS-assisted protocol identification and path selection
  <list style="symbols">
      <t>Special CNAME prefixes in DNS query results (e.g., dart-host. or dart-gateway.) indicate whether the target host or relay supports DART protocol;</t>
      <t>A / AAAA records in DNS responses provide the next-hop IP address required by the IP layer, which may be the ultimate target host or a relay DART gateway.</t>
      <t>Utilizing CNAME redirection to A/AAAA records in DNS responses enables, under full compatibility with existing DNS protocols, the simultaneous return of whether the target host supports DART and its corresponding IP address, thereby improving resolution efficiency and protocol compatibility.</t>
    </list></t>
</list></t>

</section>
<section anchor="hierarchical-address-encryption-and-policy-visibility"><name>Hierarchical Address Encryption and Policy Visibility</name>

<t>To enhance privacy, DART allows the destination address field to be encrypted. This prevents intermediate nodes from observing the full semantic identity of the communication target. However, if a single-layer or fully opaque encryption scheme is applied, intermediate network devices-such as firewalls or DART-aware gateways-may lose visibility into the FQDN and thus be unable to enforce domain-based policies (see <xref target="native-fqdn-based-policy-enforcement"/>).</t>

<t>To reconcile the need for privacy with the operational requirements of policy enforcement, DART supports a Hierarchical Decryption mechanism. In this model, the destination FQDN is logically divided into multiple domain levels (e.g., www.example.com --&gt; com, example, www), each of which is encrypted independently. Each layer of the network may decrypt only the domain segments it is authorized to process.</t>

<t>Example Structure</t>

<t>A destination domain such as www.example.com is encrypted as a sequence of encrypted domain labels:</t>

<t><spanx style="verb">
Encrypted_Domain = Encrypt_Level3("www") + Encrypt_Level2("example") + Encrypt_Level1("com")
</spanx></t>

<t>A national-level gateway may only decrypt the Level1 component (e.g., .com, .gov.cn) for regulatory filtering, while enterprise gateways may decrypt Level2 or deeper subdomains within their own namespace.</t>

<t>Design Guidelines</t>

<t><list style="symbols">
  <t>DART headers SHOULD include structured, layered domain representations, encoded in a format that enables per-level processing (e.g., TLV or label stacks).</t>
  <t>Encryption MAY use symmetric or asymmetric cryptographic schemes, depending on the trust model and deployment scale.</t>
  <t>Each gateway or policy node holds only the decryption keys for its authorized domain layers, enabling partial semantic visibility.</t>
  <t>The encryption hierarchy aligns with domain delegation and administrative boundaries, not physical routing paths.</t>
</list></t>

<t>Benefits</t>

<t>This approach enables:</t>

<t><list style="symbols">
  <t>End-host privacy: Prevents exposure of full FQDNs to unauthorized intermediate nodes.</t>
  <t>Scoped policy enforcement: Enables intermediate devices to make decisions based on locally visible domain levels.</t>
  <t>Granular trust models: Different administrative layers decrypt only the information they are entitled to process.</t>
  <t>Deployment flexibility: Can be combined with routing delegation and overlay mechanisms.</t>
</list></t>

<t>Comparison to Onion Routing</t>

<t>Although inspired by onion routing, DART&#39;s hierarchical address encryption differs in that:</t>

<t><list style="symbols">
  <t>Decryption layers are based on domain hierarchy, not hop count;</t>
  <t>Partial visibility is a feature, not a byproduct;</t>
  <t>Policy enforcement and routing remain cooperative, not adversarial.</t>
</list></t>

<t>This mechanism provides a scalable compromise between address confidentiality and operational control, supporting a wide range of deployment models including regulatory environments, enterprise segmentation, and cross-domain interoperability.</t>

</section>
</section>
<section anchor="nat-dart-4-and-address-virtualization"><name>NAT-DART-4 and Address Virtualization</name>
<t>To ensure compatibility with IPv4-only hosts that do not support the DART protocol, DART introduces the NAT-DART-4 translation mechanism. At the core of this mechanism is the concept of a virtual address, sometimes also referred to as a pseudo address.</t>

<t>The virtual address serves as an abstraction layer that enables transparent communication between IPv4-only hosts and the DART network, allowing protocol interoperability without requiring changes to legacy systems.</t>

<t>This mechanism is primarily designed to enable legacy IPv4-only devices that cannot be upgraded to access the DART network. The mechanism is also applicable to IPv6-only devices, and, if necessary, can be used to facilitate translation between DART and IPv6-only protocols.</t>

<section anchor="definition-of-virtual-addresses"><name>Definition of Virtual Addresses</name>
<t>A virtual address is a pseudo address mapped to a remote FQDN, dynamically allocated by the local DART gateway. It is locally scoped and has no global significance. The introduction of virtual addresses serves two main purposes:</t>

<t><list style="symbols">
  <t>To assign a unique virtual address to each remote FQDN acting as a communication target, allowing local IPv4-only hosts to distinguish between different remote hosts at the IP layer;</t>
  <t>To ensure that any assigned virtual address, when used as the destination address in an IP packet, can be properly routed to the local DART gateway according to standard IP routing rules.</t>
</list></t>

<t>In theory, any unallocated IPv4 address within the local DART subdomain can be used as a virtual address. However, to reduce conflict and improve deployment consistency, it is recommended to select addresses from a designated private address pool. The virtual address pool should meet the above routing requirement and maintain logical isolation from the public network.</t>

<t>Considering factors such as availability, standard compliance, and deployment safety, the address block 198.18.0.0/15, reserved by RFC 2544 for benchmarking purposes, is recommended as the primary address pool.</t>

<t>If additional address space is needed (e.g., in carrier-grade environments), a subnet from 100.64.0.0/10, reserved by RFC 6598 for Carrier-Grade NAT (CGN), may also be used as a virtual address pool-provided it does not overlap with actual CGN usage in the deployment environment.</t>

</section>
<section anchor="allocation-and-reclamation-of-virtual-addresses"><name>Allocation and Reclamation of Virtual Addresses</name>
<t>Virtual addresses are dynamically allocated upon network access and reclaimed appropriately to prevent exhaustion of the virtual address pool. The process includes:</t>

<t><list style="symbols">
  <t>For access requests initiated by local IPv4-only hosts, the DART domain&#39;s DNS server dynamically allocates virtual addresses when responding to the corresponding DNS queries;</t>
  <t>For access initiated by remote hosts targeting local IPv4-only hosts, the DART gateway&#39;s forwarding module shall allocate the corresponding virtual address prior to forwarding;</t>
  <t>The system must maintain mappings between FQDNs and virtual addresses along with ports. Due to the presence of NAT, the source port of packets passing through NAT may not remain fixed (e.g., to port 0xDA27), thus port mapping is a critical component for connection identification;</t>
  <t>Time-to-live (TTL) or least-recently-used (LRU) policies can be employed to age and evict mappings, ensuring the mapping table remains timely and space-efficient;</t>
  <t>Different combinations of remote domain names and ports shall map to distinct virtual addresses to enable the gateway to accurately distinguish and identify traffic destined for various target hosts.</t>
</list></t>

</section>
<section anchor="nat-dart-4-workflow"><name>NAT-DART-4 Workflow</name>

<t>Scenario 1: Local IPv4-only Host Initiates Access</t>

<t><list style="numbers" type="1">
  <t>The initiator is a local IPv4-only host;</t>
  <t>The target resides in a remote DART domain;</t>
  <t>The local host issues a DNS query, and the DNS response returns a virtual address allocated from the virtual address pool (not the gateway&#39;s actual ingress address);</t>
  <t>Since the virtual address is not assigned to a real host, according to the local host&#39;s routing rules, packets destined to this virtual address are sent to the default gateway, i.e., the local DART gateway;</t>
  <t>The gateway looks up the mapping for the virtual address and restores the real target FQDN;</t>
  <t>The gateway inserts the DART header, encapsulates the packet, and forwards it to the target DART domain.</t>
</list></t>

<t>Scenario 2: Remote Host Initiates Access to Local IPv4-only Host</t>

<t><list style="numbers" type="1">
  <t>The initiator is a remote host, targeting a local IPv4-only host;</t>
  <t>The remote host communicates using the real target FQDN;</t>
  <t>Packets arrive at the local DART gateway, which looks up the mapping of the FQDN plus port to a virtual address; if no mapping exists, the gateway dynamically allocates one;</t>
  <t>The allocated virtual address is used as the source address in the restored IP packet, while the destination address is the real IP of the local IPv4-only host;</t>
  <t>The gateway forwards the packet to the local IPv4-only host;</t>
  <t>Return packets sent by the local IPv4-only host are addressed to the virtual address; the gateway restores the original FQDN based on the mapping and forwards the packets back to the remote host.</t>
</list></t>

<t>Notes</t>

<t><list style="symbols">
  <t>The virtual address mechanism enables local IPv4-only hosts to distinguish different remote hosts, supporting bidirectional communication;</t>
  <t>The DART gateway manages mappings between virtual addresses and FQDNs;</t>
  <t>This mechanism is compatible with NAT and existing network architectures, ensuring transparent and efficient communication.</t>
</list></t>

</section>
<section anchor="oversized-packet-handling"><name>Oversized Packet Handling</name>
<t>During the encapsulation of IP packets, NAT-DART-4 inserts a UDP header and a DART header, which may cause the resulting packet to exceed the MTU.</t>

<t>To ensure reliable delivery, the following mechanisms are proposed for handling oversized packets. They are presented in the order of recommendation priority.</t>

<section anchor="mss-clamping-recommended"><name>MSS Clamping (Recommended)</name>
<t>In TCP connections, the DART gateway or edge host may adjust the MSS (Maximum Segment Size) during the TCP handshake to reserve enough space for the DART header.</t>

<t>Advantages:</t>

<t><list style="symbols">
  <t>Proactively avoids MTU violations.</t>
  <t>Requires no runtime signaling.</t>
  <t>Supported by most TCP stacks and firewall/NAT equipment.</t>
</list></t>

<t>Drawbacks:</t>

<t><list style="symbols">
  <t>Applicable only to TCP traffic.</t>
  <t>Requires inspection or modification of TCP handshake packets.</t>
</list></t>

<t>Use Cases:</t>

<t><list style="symbols">
  <t>Ideal for hosts or gateways initiating TCP sessions.</t>
  <t>Common in access networks or CPE devices that implement TCP MSS rewriting.</t>
</list></t>

</section>
<section anchor="path-mtu-discovery-pmtud"><name>Path MTU Discovery (PMTUD)</name>
<t>The network can rely on standard Path MTU Discovery mechanisms, in which intermediate routers generate ICMP &quot;Packet Too Big&quot; messages to inform the sender.</t>

<t>Advantages:</t>

<t><list style="symbols">
  <t>Protocol-agnostic (works for TCP, UDP, etc.).</t>
  <t>Standards-compliant and widely supported.</t>
</list></t>

<t>Drawbacks:</t>

<t><list style="symbols">
  <t>ICMP filtering may prevent delivery of &quot;Packet Too Big&quot; messages.</t>
  <t>Initial packet loss occurs before adjustment.</t>
  <t>Not reliable across all firewalls or carrier-grade NATs.</t>
</list></t>

<t>Use Cases:</t>

<t><list style="symbols">
  <t>Suitable for end-to-end communication over networks with proper ICMP support.</t>
  <t>Best used in environments with known ICMP reliability.</t>
</list></t>

</section>
<section anchor="mtu-increase-by-network-provisioning"><name>MTU Increase by Network Provisioning</name>
<t>Network operators may provision larger MTU values on key network segments (e.g., 1600 bytes) to accommodate DART headers and ensure encapsulated packets fit.</t>

<t>Advantages:</t>

<t><list style="symbols">
  <t>Transparent to endpoints.</t>
  <t>Works with all protocols and traffic types.</t>
</list></t>

<t>Drawbacks:</t>

<t><list style="symbols">
  <t>Requires administrative changes to network infrastructure.</t>
  <t>May not be feasible in all environments (e.g., across the public internet).</t>
</list></t>

<t>Use Cases:</t>

<t><list style="symbols">
  <t>Effective in controlled enterprise or data center environments.</t>
  <t>Suitable for backbone links or intra-domain DART overlay networks.</t>
</list></t>

</section>
<section anchor="packet-fragmentation-least-preferred"><name>Packet Fragmentation (Least Preferred)</name>
<t>DART gateways may fragment oversized packets during forwarding, using either IP-layer fragmentation or application-layer splitting.</t>

<t>Advantages:</t>

<t><list style="symbols">
  <t>Ensures delivery even when no other mitigation is available.</t>
</list></t>

<t>Drawbacks:</t>

<t><list style="symbols">
  <t>Fragmentation introduces processing overhead and reliability issues.</t>
  <t>IPv6 discourages in-network fragmentation.</t>
  <t>May interfere with middleboxes or degrade performance.</t>
</list></t>

<t>Use Cases:</t>

<t><list style="symbols">
  <t>Emergency fallback when other methods fail.</t>
  <t>Use with caution in highly heterogeneous or unmanaged networks.</t>
</list></t>

<t>Summary</t>

<t>MSS Clamping is the most effective and widely compatible method for avoiding DART-related MTU issues, particularly for TCP traffic. PMTUD serves as a secondary method but depends on ICMP reliability. Raising MTU provides the best experience but requires network-wide coordination. Fragmentation should be used only as a last resort due to performance and compatibility concerns.</t>

</section>
</section>
</section>
<section anchor="dsadm"><name>DSADM</name>

<t>Modern networks often contain multiple layers of nested NATs. Depending on the upgrade sequence, NAT gateways may exist between two DART devices. Consider the following scenario:</t>

<t>The ISP gateway to the Internet has been upgraded to a DART gateway, the user&#39;s computer is DART-ready, but the CPE has not been upgraded and still operates in NAT mode:</t>

<figure title="DART-ready hosts behind NAT gateway Scenario 1" anchor="fig-dart-behind-nat"><artwork><![CDATA[
+--------------------+
|    DART gateway    |
+--------------------+
           |
+--------------------+
|   CPE (NAT mode)   |
+--------------------+
           |
+--------------------+
|     DART host      |
+--------------------+
]]></artwork></figure>

<t>In this situation, the source IP address and source port of DART packets sent by the DART host will change after passing through the CPE. In particular, the source port is randomly assigned. If the source address of the DART packet is fixed, the DART gateway will be unable to restore the correct destination port for forwarding to the CPE when the response packet arrives.</t>

<t>To address this problem, the following mechanism is designed:
1. Initialization by the DART host when joining the network<br />
    a.  The DART host sends a packet to the DART gateway to add/update DDNS information, carrying its own IP address.<br />
    b.  The DART gateway compares the IP-layer source address of the packet with the IP address contained in the DNS payload. If they match, it records the information for future resolution and sends a response to inform the DART host of the current domain name.<br />
    c.  If they do not match, it indicates the presence of a NAT gateway in between, and the response informs the DART host of the current domain name and the existence of the NAT gateway.
2. Processing by the DART host upon receiving the response
    a.  If there is no NAT gateway in the network, the DART host uses the static FQDN assigned by the DART gateway as the source address for future packets.
    b.  If a NAT gateway exists, the DART host uses a placeholder &quot;[--------]&quot; followed by the domain name as the source address.
3. Processing by the DART gateway upon receiving a DART packet<br />
    a.  Check whether the source address, after removing the current domain name suffix, ends with the placeholder.<br />
    b.  If so, encode the 6-byte combination of the packet&#39;s source IP and UDP source port using Base64URL and replace the placeholder. (The 6-byte data encodes into 8 bytes, which replace the eight consecutive &quot;-&quot; in the placeholder. The surrounding &quot;[]&quot; indicate that this is the encoded result of address and port, not requiring DNS resolution.)
4. Handling when the packet returns
    The DART gateway can restore the IP header and UDP header&#39;s destination address and port directly from the DART header, forwarding the packet correctly to the target host.</t>

<t>This strategy is referred to as the &quot;DART Delayed Source Address Determination Mechanism.&quot;</t>

<t>Another scenario may occur:</t>

<figure title="DART-ready hosts behind NAT gateway Scenario 2" anchor="fig-dart-behind-nats"><artwork><![CDATA[
+---------------------------+
|          DART Server      |
+---------------------------+
              |
+---------------------------+
|  Internet(Public Network) |
+---------------------------+
              |
+---------------------------+
|          NAT gateway      |
+---------------------------+
              |
+---------------------------+
|      DART host/gateway    |
+---------------------------+
]]></artwork></figure>

<t>A DART-ready device must traverse a NAT gateway to access a DART server on the public Internet. In this case, the DART host/gateway must leave a placeholder in the source address of the DART header. Once the packet reaches the DART Server through the public network, the DART Server is responsible for replacing the placeholder with the Base64URL-encoded source address plus port.</t>

<t>In other words, whenever a NAT gateway appears along the forwarding path of a DART packet, a placeholder must be set in the appropriate position of the source address, and the first DART device receiving the packet replaces it with the Base64URL encoding of the source address and port.</t>

</section>
<section anchor="control-plane-dynamic-access-design"><name>Control Plane Dynamic Access Design</name>
<t>When a DART device (either a DART gateway or a DART-ready host) joins a network, it needs to know the domain it belongs to in order to determine its DART-layer source address and whether it is located behind a NAT gateway, which dictates whether the delayed source address determination mechanism should be enabled. The control plane of the access domain (i.e., the DNS system) also needs to be aware of the device&#39;s online status in order to allocate an appropriate address (FQDN) and correctly resolve the FQDN to an IP when necessary.</t>

<t>The scenario is as follows:
~~~~~~
                       +------------------+
                       |    dart-proto.cn  |
                       +------------------+
                                 |
                       +------------------+
                       |      Internet    |
                       +------------------+
                                 |
                       +------------------+
                       | NAT(0,1 or more) |
                       +------------------+
                         /              \
                        /                \
                       /                  \
          +------------------+    +------------------+
          |  DART GATEWAY A  |    |   DART HOST A    |
          +------------------+    +------------------+
                       \
                        \
                         \
                  +------------------+
                  | NAT(0,1 or more) |
                  +------------------+
                    /              \
          +--------------+   +----------------+
          |  DART HOST B |   | DART GATEWAY B |
          +--------------+   +----------------+
~~~~~~</t>

<t>If a DART gateway has a public IP and has already been set as the authoritative DNS server for a domain in the DNS system, static configuration is sufficient.
The automatic online procedure for a DART device (host or gateway) is designed as follows:
1. Reserve a domain name _gateway.dart-proto.cn specifically for DART gateway discovery.
2. The DART device queries _gateway.dart-proto.cn through its upstream interface.
3. If there are no other DART gateways between the device&#39;s upstream interface and the public network (e.g., DART HOST A and DART GATEWAY A):<br />
    a.  According to DNS resolution rules, the query packet will eventually be forwarded to the authoritative DNS server of the dart-proto.cn domain.<br />
    b.  The authoritative DNS server for dart-proto.cn returns NXDOMAIN directly.<br />
    c.  Upon receiving NXDOMAIN, the DART device knows that no DART gateway exists between it and the public network. It does not need to check for NAT gateways and directly enables the delayed source address determination mechanism, inserting a placeholder in the source address when sending DART packets.<br />
    d. The DART gateway/host on the public network side receives the DART packet containing the placeholder and replaces it with the Base64URL-encoded source IP and UDP port.<br />
4. If there are other DART gateways between the device&#39;s upstream interface and the public network (e.g., DART HOST B and DART GATEWAY B):<br />
    a. The next-hop DART gateway intercepts the query, responds with its real domain name as a CNAME for _gateway.dart-proto.cn, and returns its domain-internal IP via an A record.<br />
    b. The DART device receives the response and sends a DDNS packet to register its information with the DART gateway, including its hostname and IP address.<br />
    c. The DART gateway compares the IP-layer source address of the DDNS registration packet with the IP address contained in the DNS payload.<br />
    d. If they match, there is no NAT gateway between them. The DART gateway generates the FQDN for the DART device based on the information submitted in the DDNS packet and sends it back via the response. The DART device then uses this FQDN as its source address.<br />
    e. If they do not match, the DART device is behind a NAT gateway. It enables the delayed source address determination mechanism, inserting a placeholder in the source address when sending DART packets. The DART gateway receiving the packet replaces it with the Base64URL-encoded source IP and UDP port.</t>

</section>
<section anchor="routing-autonomy"><name>Routing Autonomy</name>
<t>The DART protocol preserves full end-to-end semantics. The source host can determine whether the destination supports DART by examining the CNAME prefix in the DNS response, without relying on intermediate hops or centralized path computation. Path selection is driven by the DNS control plane and the distributed routing tables maintained by DART gateways, forming a decentralized routing control loop.</t>

<t>DART employs a hierarchical domain-based architecture, where each DART domain (i.e., DNS domain) operates as an independent routing autonomy. Within each domain, the DART gateway maintains and updates the routing table autonomously. This structure supports incremental deployment, hierarchical scalability, and high controllability.</t>

<t>Although DART does not rely on a centralized controller for routing management, it does not preclude the optional use of centralized components in specific scenarios-for example, to optimize inter-domain paths, distribute policy updates, or provide global visualization capabilities. The design and deployment of such mechanisms are left to implementers and operators and are outside the scope of this document.</t>

</section>
<section anchor="implicit-source-routing-capability"><name>Implicit Source Routing Capability</name>
<t>The DART protocol uses fully qualified domain names (FQDNs) with semantic structure as address identifiers, allowing the source host to indirectly guide the forwarding path by selecting different destination domain names without explicitly specifying each hop. This mechanism forms a capability similar to &quot;implicit source routing,&quot; granting the endpoint partial control over path selection.</t>

<t>Within the DART network, gateways make forwarding decisions based on local inter-domain routing tables and DNS query results. Due to the hierarchical naming nature of DNS, different target FQDNs-even if pointing to the same physical host-may logically belong to different parent domains or path structures, resulting in variations in forwarding paths. Provided these FQDNs and their resolution records are pre-configured in DNS and DART routing policies, the source host can realize logical path guidance by choosing among multiple FQDNs.</t>

<t>For example, the same host may be accessed via host1.city-a.example.dart or host1.city-b.example.dart, which respectively steer traffic through different subdomain gateways, enabling path diversity. This design does not rely on explicit routing headers or centralized controllers but establishes a logically guided system with predictable and controllable path behavior through the interplay of DNS and distributed DART gateways.</t>

<t>Essentially, this mechanism embodies a semantics-driven path selection model that combines the flexibility of source routing with the autonomy of a distributed architecture, akin to &quot;implicit loose source routing.&quot; Path control depends on the naming structure and deployment policies, lacking on-demand dynamic path specification but offering substantial policy flexibility.</t>

<t>It is important to note that the DART architecture generally adheres to a &quot;single parent domain principle,&quot; where each DART gateway logically belongs to only one parent domain, maintaining a tree-like hierarchical structure. However, in certain practical scenarios, the local DART gateway may need to support multiple parent domain interfaces to enable multi-path access. In such cases, this locally breaks the &quot;single parent domain&quot; rule by allowing the gateway to connect to multiple parent domains simultaneously, thereby providing multiple logical path entries for the end host.</t>

<t>While this extension increases gateway topology complexity, it significantly enhances path redundancy and flexibility. Therefore, the DART architecture should accommodate such multi-parent domain access needs while preserving the overall clarity of the hierarchical structure. Relevant details and specification refinements are left for further discussion in future work.</t>

<t>Through the above mechanism, DART not only improves path controllability and resilience but also empowers endpoints with richer policy options without requiring protocol extensions, demonstrating the notable advantages of a naming-based network architecture.</t>

</section>
</section>
<section anchor="nat-traversal-and-compatibility"><name>NAT Traversal and Compatibility</name>
<t>To ensure compatibility with existing network environments, DART encapsulates packets over UDP, providing limited adaptation to mainstream NAT behaviors-especially outbound connection mapping mechanisms. This approach lowers deployment barriers and facilitates smooth transition. However, DART&#39;s design philosophy does not simply accommodate the existence of NAT; instead, it aims to fundamentally eliminate the long-term necessity of NAT. Therefore, DART does not pursue aggressive traversal techniques such as UDP hole punching to forcibly penetrate all types of NAT. Rather, DART adopts a moderate compatibility stance without excessive compromise, applying appropriate upgrade pressure on certain NAT gateways and guiding network infrastructure evolution toward the DART architecture.</t>

<section anchor="nat-background"><name>NAT Background</name>

<t>Network Address Translation (NAT <xref target="RFC4787"/>, <xref target="RFC5128"/>) has been widely deployed in enterprise and home networks to alleviate the IPv4 address exhaustion problem. By modifying packet headers and maintaining connection mappings, NAT allows multiple internal hosts to share a single public IPv4 address.</t>

<t>However, NAT breaks the original end-to-end communication model of the Internet, especially introducing additional complexity and protocol incompatibility issues for applications requiring inbound connections or using non-standard protocols. Therefore, NAT is both a technical compromise and an architectural trade-off.</t>

</section>
<section anchor="compatibility-encapsulation-udp"><name>Compatibility Encapsulation: UDP</name>
<t>To facilitate deployment in existing network environments during the transition phase, DART packets are encapsulated within UDP datagrams. This approach allows DART traffic to traverse NAT gateways, firewalls, and other intermediate devices without requiring modifications to existing network equipment.</t>

<t>DART currently uses UDP destination port 0xDA27 (decimal 55847) for encapsulated communication.</t>

<t>Encapsulation over UDP provides the following compatibility advantages:</t>

<t><list style="symbols">
  <t>Supports outbound NAT traversal: most NAT gateways permit internal devices to initiate outbound UDP connections and dynamically establish return paths;</t>
  <t>Compatible with firewall policies: UDP traffic is generally allowed in the outbound direction;</t>
  <t>Avoids interference from intermediate devices: DART packets are treated as ordinary UDP traffic, reducing the risk of filtering due to unknown protocols.</t>
</list></t>

</section>
<section anchor="compatibility-with-existing-infrastructure"><name>Compatibility with Existing Infrastructure</name>
<t>Because DART packets are encapsulated within standard UDP datagrams, from the perspective of NAT gateways, firewalls, and routers, their behavior is indistinguishable from ordinary UDP traffic. Therefore, DART can operate over the current IPv4 network without requiring modifications to existing devices or network architectures, even when the network includes multiple layers of nested NAT.</t>

<t><list style="symbols">
  <t>Naturally, under this mode, DART hosts remain subject to NAT behavior limitations. For example, hosts can only initiate connections actively; to accept incoming connections, IP and port mappings must still be configured on NAT gateways.</t>
  <t>This characteristic allows DART devices to be deployed relatively freely within existing networks. Even if upstream devices have not yet adopted the DART protocol, underlying hosts can connect first, thus enabling a &quot;transparent, incremental&quot; evolutionary deployment path.</t>
</list></t>

</section>
<section anchor="design-position-on-nat-traversal-techniques"><name>Design Position on NAT Traversal Techniques</name>
<t>Traditional UDP applications often use NAT traversal techniques such as UDP hole punching, STUN, and TURN to establish peer-to-peer connections. However, these approaches are not aligned with the design goals of the DART protocol.</t>

<t>The core objective of DART is to localize the scope of IP addresses, enabling virtually unlimited address space reuse and thus providing an abundant supply of addresses. This reduces the necessity and relevance of traditional NAT gateways.</t>

<t>Therefore, implementers of the DART protocol should not incorporate NAT traversal techniques (e.g., UDP hole punching) within the protocol. Although such techniques remain practical in conventional networks, they are considered outdated within the DART architecture. The focus of research and implementation should be on promoting native DART network deployment and minimizing dependency on NAT, rather than continuing to provide compatibility adaptations for NAT.</t>

<t>By reducing intermediate-layer processing and simplifying the protocol stack, DART implementers can more easily achieve efficient and controllable end-to-end communication, truly restoring the original Internet principle of direct connectivity.</t>

</section>
</section>
<section anchor="deployment-and-evolution-strategy"><name>Deployment and Evolution Strategy</name>
<t>One of the design goals of the DART protocol is to introduce virtually unlimited address space and domain name-based addressing capabilities without disrupting the operation of the existing IPv4 network, while maintaining compatibility with current IPv4 access. To this end, DART offers a gradual deployment path that adapts to today&#39;s highly complex and heterogeneous Internet environment.</t>

<section anchor="technical-requirements-and-deployment-prerequisites"><name>Technical Requirements and Deployment Prerequisites</name>
<t>The DART protocol leverages the DNS system as its control plane. Addressing, domain name resolution, and host registration within DART rely heavily on DNS coordination. Therefore, before deploying DART gateways and DART-ready hosts, the following technical requirements must be met:</t>

<t><strong>DNS System Capabilities</strong></t>

<t><list style="symbols">
  <t>Authoritative Domain Delegation: Each DART subdomain must be registered with the DNS system through authoritative delegation. Upon deploying a DART gateway, operators need to delegate the corresponding subdomain in the parent DNS servers to map domain names to the DART gateway.</t>
  <t>Bidirectional FQDN-to-Address Mapping: The DNS system must support correct mapping from host FQDNs to DART addresses (A records or virtual addresses), as well as support reverse PTR queries to enhance manageability.</t>
  <t>Dynamic Registration and Automation: To facilitate dynamic scaling and elastic deployment of the DART network, DNS systems should provide interfaces for automatic registration (e.g., DNS UPDATE, API, or protocol extensions) allowing hosts and gateways to register their domain information upon connection.</t>
</list></t>

<t><strong>DART Gateway Requirements</strong></t>

<t><list style="symbols">
  <t>DNS Control Plane Integration: DART gateways should actively register their subdomains, maintain virtual address mapping tables, and periodically synchronize resolution states with DNS.</t>
  <t>Independent Management: Gateways must independently manage their subdomain address and naming spaces.</t>
  <t>Full DART Encapsulation/Decapsulation: Gateways shall implement complete DART encapsulation and decapsulation logic, including support for NAT-DART-4 (optional) and DART packet forwarding.</t>
  <t>Parent Domain Uplink: Network interfaces must be properly configured with parent domain information to ensure correct inter-domain routing.</t>
</list></t>

<t><strong>DART-Ready Host Requirements</strong></t>

<t><list style="symbols">
  <t>DART Packet Support: Hosts must be capable of generating and parsing DART packets, either through protocol stack upgrades, user-space daemons, or APIs.</t>
  <t>DNS Query Capability: Hosts should be able to actively query DNS for DART address information and establish connections accordingly.</t>
  <t>FQDN Registration: To receive incoming connections, hosts must be able to register their FQDNs within their respective DART subdomain DNS.</t>
</list></t>

<t>Subsequent sections will describe typical deployment models for national-level DART gateways, ISP internal DART gateways, edge gateways (home and enterprise), and hosts. Prior to device deployment, ensure DNS system capabilities meet these requirements and establish unified domain and address management coordination within the organization.</t>

</section>
<section anchor="deployment-of-dart-ready-hosts"><name>Deployment of DART-Ready Hosts</name>

<section anchor="capability-requirements-for-dart-ready-hosts"><name>Capability Requirements for DART-ready Hosts</name>

<t>DART-ready Host refers to a network node that implements the DART protocol stack, including both public servers and end devices. Such a host MUST be able to generate and parse DART packets.</t>

<t>Deployment of DART capabilities can be achieved through, but is not limited to, the following approaches:</t>

<t><list style="symbols">
  <t>upgrading the operating system kernel or network protocol stack;</t>
  <t>installing a user-space daemon;</t>
  <t>integrating the DART protocol stack via an SDK or API.</t>
</list></t>

<t>A DART-ready host MUST be able to communicate directly using Fully Qualified Domain Names (FQDNs), without relying on fixed IP addresses, thereby enabling elastic deployment, automatic addressing, and cross-domain communication.</t>

<t>Due to the compatibility design of the DART protocol, it is inherently dual-stack. DART-ready hosts should maintain their original IPv4 and IPv6 communication capabilities.</t>

<t>This property of &quot;forward enhancement and backward compatibility&quot; ensures that host devices MAY be upgraded independently of changes to the underlying network infrastructure, thereby supporting flexible and incremental deployment of DART.</t>

</section>
<section anchor="dart-ready-public-servers"><name>DART-ready Public Servers</name>
<t>The deployment of a DART network relies on the support of public servers. As providers of fundamental Internet services, upgrading public servers to DART-ready hosts is a prerequisite for enabling inter-domain communication and efficient utilization of address space.</t>

<t>In the following cases, public servers MUST provide native DART protocol support:</t>

<t><list style="symbols">
  <t>When a large region (e.g., a country) upgrades to an independent DART subdomain, the DART gateways connecting this subdomain to the global Internet CANNOT enable NAT44 (which requires private internal addressing) or NAT-DART-4 (which requires an excessively large pool of pseudo addresses). In such cases, servers on the global Internet MUST support DART for hosts in the subdomain to reach them.</t>
  <t>Because the range of access sources is highly diverse, public servers SHOULD NOT rely on protocol conversion software (e.g., DartWinDivert, essentially a host-based NAT-DART-4 implementation).</t>
  <t>In these circumstances, only native DART support on servers MUST be used.</t>
</list></t>

<t>Although the number of public servers is large, the diversity of operating systems they run is limited. Therefore, upgrading them is considered manageable. Prioritizing DART support in mainstream server operating systems and cloud service platforms MAY provide a stable foundation for expanding the DART ecosystem. Upgrading public servers WILL improve overall DART compatibility and interoperability.</t>

<t>After upgrading to DART readiness, a public server MUST update its DNS zone to signal this capability. Specifically, the authoritative DNS server for the domain SHOULD insert a CNAME resource record with the prefix &quot;dart-host.&quot; before the final A record is returned.</t>

<t>For example, when a client queries www.example.com, and the host has been upgraded to DART readiness, the DNS response would be structured as follows:</t>

<figure><artwork><![CDATA[
www.example.com.            CNAME    dart-host.www.example.com.  
dart-host.www.example.com.  A        A.B.C.D
]]></artwork></figure>

<t>This mechanism ensures compatibility with existing DNS standards, while providing differentiated behavior for DART-ready and non-DART-ready clients in a single query:</t>

<t><list style="symbols">
  <t>Non-DART clients obtain the correct IPv4 address (A.B.C.D) by following the CNAME chain down to the A record.</t>
  <t>DART-ready clients will additionally detect the CNAME record prefixed with &quot;dart-host.&quot; and thereby recognize that the queried host supports DART.</t>
</list></t>

</section>
<section anchor="dart-ready-end-devices"><name>DART-ready End Devices</name>
<t>Mainstream end devices can support the DART protocol through software upgrades.</t>

<t>For older IPv4-only devices that cannot be upgraded:</t>

<t>End devices typically access the network through Customer Premises Equipment (CPE). The CPE can be upgraded to be DART-ready and enable NAT-DART-4, allowing all IPv4-only devices connected downstream to appear as DART-ready terminals externally and support bidirectional access. If the CPE also enables NAT44, internal devices can still access unupgraded public servers.</t>

<t>From an architectural perspective, upgrading the CPE is the ideal choice. Technically, if the device has sufficient performance and supports software upgrades, software upgrading should be prioritized; otherwise, hardware replacement is required, which is more costly. If the virtual address pool is sufficient, NAT-DART-4 can also be enabled on a higher-level DART gateway to bypass the need to upgrade a large number of CPEs.</t>

<t>If IPv4-only devices do not require access to the public network, upgrading the CPE is not necessary.
In general, the upgrade of legacy IPv4-only end devices is not urgent, and deployment can be gradually carried out after the network is largely ready.</t>

</section>
</section>
<section anchor="deployment-of-dart-gateways"><name>Deployment of DART Gateways</name>

<t>The deployment of DART gateways relies on the upgrade of mainstream operating systems. Once mainstream operating systems are upgraded, public servers and mainstream end devices should complete their upgrades within a relatively short period of time, without a specific order requirement.</t>

<t>DART gateways include national-level gateways, ISP-level gateways, home gateways, and enterprise gateways. After the mainstream operating systems are upgraded, DART gateways can be upgraded in any order. This reflects the compatibility design of the DART protocol.</t>

<section anchor="national-level-dart-gateway"><name>National-level DART Gateway</name>

<t>A national-level DART gateway is deployed at the Internet entry/exit points of a country (e.g., international link exits) and functions as the backbone node for inter-domain communication.</t>

<t>Its functions and constraints are as follows:
- National-level DART gateways must perform DART packet forwarding and inter-domain addressing.
- National-level DART gateways must not use NAT (due to the need for internally deployed private addresses) or NAT-DART-4 (due to limited capacity of the virtual address pool).
- After deploying national-level DART gateways, the network within the domain can locally implement IPv4 address reuse and planning.</t>

<t>Deployment prerequisites:
- Public servers and mainstream end devices must have completed the DART upgrade.
- If IPv4-only terminals need to maintain communication with hosts outside the domain, a DART-enabled CPE with NAT-DART-4 conversion must be deployed in advance.</t>

<t>Post-deployment status:
- End devices within the access domain, whether upgraded or not, can access DART devices within the domain via IP protocol.
- Devices within the domain cannot directly access unupgraded servers outside the domain.
- DART devices within the domain, or IPv4-only devices under a DART gateway with NAT-DART-4 enabled, can access DART devices outside the domain.</t>

</section>
<section anchor="dart-gateways-within-the-operator-network"><name>DART Gateways within the Operator Network</name>

<t>To address IPv4 address exhaustion, many network operators have widely deployed CGNAT (Carrier-Grade NAT) mechanisms within their internal networks. Typical CGNAT topologies often involve two layers of NAT mapping: the Customer Premises Equipment (CPE) at home performs the first NAT, while the operator&#39;s CGNAT gateway performs the second. In some smaller operators, community broadband, rural networks, campus networks, or public Wi-Fi networks, there may even be more layers of nested NAT.</t>

<t>Although multi-level NAT alleviates address shortages, it introduces numerous negative impacts such as blocked inbound connections, frequent failures of UDP traversal techniques, difficulty in tracking user behavior, and severe degradation of P2P performance. The DART protocol offers a more natural and scalable alternative in such deeply nested NAT environments.</t>

<t>Operators can upgrade existing CGNAT gateways to DART gateways to obtain a full IPv4 address space and significantly simplify the network architecture. Possible Deployment Paths:</t>

<t>There are two main deployment paths for operators when introducing DART:</t>

<t><list style="numbers" type="1">
  <t>Upgrading only the top-level NAT gateway to a DART gateway
  <list style="symbols">
      <t>The operator MAY immediately obtain the full IPv4 address space (2^3^2) and downgrade lower-level NAT gateways to ordinary IP routers.</t>
      <t>This approach involves the shortest deployment path and minimal device modifications; however, because the lower-level networks previously used private addresses, the operator MUST reassign addresses to all downstream end devices, which may incur address reallocation costs and operational overhead.</t>
      <t>This path SHOULD assume that public servers and CPE gateways have already been upgraded to DART-ready.</t>
    </list></t>
  <t>Full upgrade to a hierarchical DART gateway structure
  <list style="symbols">
      <t>The operator MAY replace all NAT gateways at multiple layers with DART gateways, maintain each layer as an independent subdomain, and continue using the existing address allocation logic.</t>
      <t>Since the DART protocol eliminates the distinction between &quot;private&quot; and &quot;public&quot; addresses, each subdomain MAY have the full address space, without concerns for address conflicts or the need to retain traditional private address concepts.</t>
      <t>This approach facilitates hierarchical management and incremental deployment, requires a limited number of DART gateways, does not significantly increase overall deployment costs, and provides scalability for future connections to the DART core domain.</t>
      <t>During the upgrade transition, DART gateways MAY continue to enable NAT44 to maintain the existing multi-level NAT architecture, and MUST disable NAT44 once public servers and CPEs are upgraded.</t>
    </list></t>
</list></t>

<t>Both paths assume that public servers and user terminals have been upgraded to DART-ready. If devices are in the process of upgrading or if NAT gateways exist in the network after the upgrade, the &quot;Delayed Source Address Determination Mechanism&quot; must be enabled.</t>

</section>
<section anchor="home-gateways"><name>Home Gateways</name>

<t>Edge home gateways do not need to be upgraded and can continue operating as NAT devices. Hosts connected to the home gateway, once upgraded, can access the DART network normally as long as the upstream device has enabled the &quot;Delayed Source Address Determination Mechanism.&quot;</t>

<t>It is only necessary to upgrade a home gateway to a DART device if IPv4-only devices connected beneath it need to access the DART network.</t>

<t>In this configuration, the home gateway is upgraded to support the DART protocol stack and independently maintains a DART subdomain. It connects upstream to the operator&#39;s DART network via its parent domain interface. Internally, it may enable NAT-DART-4 to allocate virtual addresses for legacy IPv4-only devices, ensuring seamless compatibility.</t>

<t>This solution offers several advantages:</t>

<t><list style="symbols">
  <t>Autonomy and flexibility:<br />
The home gateway manages its local address space and FQDN mappings independently, allowing users to configure policies without relying on the operator;</t>
  <t>Legacy device compatibility:<br />
IPv4-only devices can connect without any modification;</t>
  <t>Support for early deployment:<br />
Home gateways can enable DART forwarding, the Delayed Source Address Determination Mechanism, NAT-DART-4 conversion, and NAT44 conversion. In any scenario, this allows internal hosts to access the Internet smoothly;;</t>
  <t>Strong scalability:<br />
As an independent subdomain, the gateway can host local services and smart devices, supporting both local and cross-domain communication;</t>
  <t>Reduced upstream load:<br />
DART encapsulation and address translation are handled locally, offloading processing pressure from the operator&#39;s DART gateways.</t>
</list></t>

<t>Considerations:
- The device must support the DART protocol stack, which may require hardware or software upgrades;
- The upstream interface must be configured with the parent domain information provided by the operator to enable correct inter-domain routing.</t>

<t>Security Protection and Firewall Capabilities</t>

<t>After a home gateway is upgraded to support the DART protocol, internal hosts will be assigned publicly routable addresses, making access control mechanisms essential. As the critical node connecting the home network to the external world, the gateway should incorporate basic security features to protect household devices from external attacks and unauthorized access.</t>

<t><list style="symbols">
  <t>The firewall should automatically manage traffic entering and leaving the home network, blocking potential threats without requiring complex user configuration;</t>
  <t>Simple access control options should be provided to help users restrict specific devices or services from connecting to the network;</t>
  <t>Full compatibility with the DART protocol must be ensured to maintain the security of internal devices in DART-enabled environments;</t>
  <t>To enhance the security of home and small networks, the gateway should, by default, block all unsolicited inbound connection attempts from external sources. It is recommended to support a UPnP-like dynamic port mapping mechanism that allows internal hosts to securely request the exposure of specific ports through an authenticated process. This strikes a balance between security and flexibility, simplifying configuration for non-technical users while improving overall network usability and protection.</t>
</list></t>

<t>Users are advised to always keep security features enabled and to install official firmware updates in a timely manner to maintain network stability and protection.</t>

<t>Summary</t>

<t>This configuration offers full backward compatibility while enabling independent, progressive migration to the DART architecture. It balances flexibility, control, and long-term scalability, and is the most strategically valuable deployment path.</t>

</section>
<section anchor="enterprise-gateways"><name>Enterprise Gateways</name>

<t>Enterprise networks typically maintain their own internal subnets, address management policies, and security configurations. Within the context of DART deployment, enterprise gateways can adopt similar architectural strategies as home gateways, but with greater flexibility and scalability in address management.</t>

<t>A recommended approach is to upgrade enterprise gateways to support the DART protocol, enabling them to manage an independent DART subdomain and connect upstream to the carrier&#39;s DART domain. This solution offers the following advantages:</t>

<t><list style="symbols">
  <t>Internal Control and Autonomy: Enterprises can independently manage their DART subdomain, maintain local FQDN mappings, and define routing policies;</t>
  <t>Compatibility with Legacy Devices: IPv4-only endpoints within the enterprise can continue operating without modification via the NAT-DART-4 mechanism;</t>
  <t>Support for Gradual Deployment: Enterprises may adopt DART ahead of their upstream provider. During the transition period, the enterprise DART gateway can still enable NAT44 to maintain compatibility with the legacy IPv4 Internet;</t>
  <t>Improved Scalability and Manageability: As an independent subdomain, the enterprise network can more effectively expand services, enforce fine-grained access controls, and enable cross-domain communication.</t>
</list></t>

<t>Considerations:
- DART protocol support must be integrated into the enterprise gateway&#39;s software or hardware platform;
- The upstream interface should be configured with parent domain information provided by the carrier to ensure proper inter-domain routing;
- Given the typically higher security requirements of enterprise networks, enabling DART introduces public reachability for internal hosts, which may expand the attack surface. It is recommended to integrate firewall functionality within the enterprise DART gateway to strengthen access controls and implement robust security policies.</t>

<t>In summary, upgrading enterprise gateways into DART-compliant nodes facilitates seamless integration with the DART ecosystem, while preserving network autonomy, supporting legacy infrastructure, and enabling a smooth transition toward full DART adoption.</t>

</section>
</section>
<section anchor="incremental-deployment-and-backward-compatibility"><name>Incremental Deployment and Backward Compatibility</name>

<t>The DART protocol is designed to support compatibility and progressive evolution, with the following characteristics <xref target="RFC5555"/>:</t>

<t><list style="symbols">
  <t>It can automatically detect whether the remote peer is a DART-ready device without requiring additional signaling negotiation;</t>
  <t>All DART-ready nodes inherently support dual-stack operation and are fully compatible with traditional IP;</t>
  <t>Through the NAT-DART-4 mechanism, IPv4-only hosts can be proxied by a local DART gateway and appear externally as DART-ready nodes, enabling full bidirectional communication within the DART network;</t>
  <t>Edge DART gateways can coexist with traditional NAT44 setups, allowing IPv4-only hosts in the local network to access legacy servers on the public Internet without modification;</t>
  <t>Crucially, IPv4-only devices under an edge DART gateway can remain unmodified indefinitely while still maintaining full communication capabilities over the DART network. This ensures long-term compatibility for non-upgradable endpoints.</t>
</list></t>

<t>From a deployment strategy perspective, the DART network expects public servers to be upgraded first to DART-ready servers and mainstream end devices to be upgraded to DART-ready terminals. These two upgrades can proceed independently, without affecting or depending on each other.  Based on this, the upgrade sequence for other network infrastructure and end devices can be flexibly determined by users or operators, without strict dependency constraints. DART does not require full-scale upgrades of end devices; instead, it leverages the capabilities of edge gateways to allow legacy devices to continue operating, ensuring a smooth transition for users.</t>

<t>Thanks to these features, DART supports incremental, on-demand deployment. Even partial upgrades do not break existing connectivity or disrupt Internet services. The upgrade process is therefore inherently smooth, allowing both users and operators to adopt DART at their own pace and without requiring a wholesale migration of their network environment.</t>

</section>
<section anchor="long-term-evolution-path"><name>Long-Term Evolution Path</name>

<t>From a long-term perspective, the DART protocol offers the following potential directions for evolution and technical advancement:</t>

<t><list style="symbols">
  <t>Progressive replacement of public IPv4 dependency<br />
DART establishes a name-centric addressing architecture, enabling end-to-end communication without the need for globally assigned public IP addresses or centralized address allocation.</t>
  <t>Full compatibility with IPv6<br />
DART can coexist and interoperate with IPv6-only networks, supporting dual-stack deployment and integrated forwarding in multi-protocol environments.</t>
  <t>Support for global unified addressing<br />
DART provides a consistent abstraction layer that facilitates seamless communication between IPv4 and IPv6 networks, paving the way for a globally unified, name-based interconnection model.</t>
  <t>Significant potential for global routing optimization
  <list style="symbols">
      <t>Theoretically unbounded DART address space eliminates the fragmentation and inefficiencies caused by IPv4 scarcity and micro-prefix allocations.</t>
      <t>Within each DNS domain, address resources are abundant, allowing for highly aggregated allocations without the need for hierarchical compression.</t>
      <t>In typical deployment scenarios, based on current DNS domain granularity and expected density, both global DART routing tables and intra-domain IP routing tables can be maintained at a manageable scale-expected to stay under 10^3 entries.</t>
    </list></t>
  <t>Transformative changes in network architecture<br />
DART inherently promotes the creation of new autonomous subdomains, leading to a distributed and hierarchical address management structure.</t>
  <t>Gradual phasing out of traditional NAT<br />
Conventional NAT gateways will be replaced by DART gateways, which provide address translation and domain isolation in a more flexible and efficient manner.</t>
  <t>Enhanced network security capabilities<br />
By leveraging FQDN-based identity and access control, DART enables stronger communication authentication and fine-grained policy enforcement.</t>
  <t>Balance between authentication and privacy<br />
DART has the potential to offer user privacy protection through dynamic naming, proxy-based forwarding, and encryption mechanisms-while maintaining reliable identity validation.</t>
  <t>Support for innovative applications and service models<br />
The flexible name mapping and dynamic routing of DART could drive the development of novel use cases such as name-based content delivery, collaborative edge computing, trusted IoT communication frameworks, and intelligent network management with QoS guarantees and routing optimization.</t>
</list></t>

<t>This evolution path provides a practical and forward-compatible roadmap for DART to gradually replace traditional IP architecture and support the foundation of the next-generation Internet infrastructure.</t>

</section>
<section anchor="native-fqdn-based-policy-enforcement"><name>Native FQDN-Based Policy Enforcement</name>

<section anchor="background"><name>Background</name>

<t>In traditional IP-based networking, policy enforcement devices such as firewalls, routers, or gateways rely primarily on IP addresses to match and apply rules. This model presents the following limitations:</t>

<t><list style="symbols">
  <t>A single service domain may resolve to different IP addresses over time (e.g., CDNs, multi-site deployments).</t>
  <t>Domain names are typically visible only at the application layer, making it difficult for network-layer devices to inspect or control access based on FQDN.</t>
  <t>The widespread adoption of encrypted DNS (e.g., DoH, DoT) and TLS 1.3 with Encrypted Client Hello (ECH) further undermines traditional DPI and SNI-based filtering.</t>
  <t>Network operators and security systems require the ability to define access policies based on semantic identifiers such as FQDNs, rather than ephemeral IP addresses.</t>
</list></t>

<t>The DART protocol addresses this challenge by natively integrating the destination Fully Qualified Domain Name (FQDN) into its addressing and routing model, enabling in-network devices to perform FQDN-aware policy enforcement without reliance on external inspection.</t>

</section>
<section anchor="protocol-level-support"><name>Protocol-Level Support</name>

<t>Each DART packet includes an explicit, structured destination FQDN field (see <xref target="packet-format"/>), which is accessible at the network layer and actively involved in routing and forwarding decisions. This design provides:</t>

<t><list style="symbols">
  <t>Protocol-native domain visibility for in-path devices, eliminating the need for DNS interception or TLS header inspection.</t>
  <t>Structured semantic identifiers for destination hosts, enabling direct matching and tagging.</t>
  <t>Reliable domain-based control, independent of IP address volatility or encryption-related obfuscation.</t>
  <t>First-packet visibility, allowing immediate policy application without requiring prior DNS resolution.</t>
</list></t>

</section>
<section anchor="use-cases"><name>Use Cases</name>
<t>The FQDN-aware nature of DART packets enables a wide range of policy applications:</t>

<t><list style="symbols">
  <t>Domain-Based Access Control
Gateways or firewalls can allow or block traffic based on explicit domain rules, without relying on third-party DNS logs or IP blacklists. For example, enterprise networks may block *.gambling.com and *.malware.site while permitting *.edu.cn or approved business domains.</t>
  <t>Granular Traffic Steering
Traffic can be routed or prioritized based on the destination domain. For example, video content from cdn.example.com may be directed to a high-bandwidth path, while update traffic to update.device.example.com may be assigned lower priority.</t>
  <t>Fine-Grained Access Policy
Enterprises can enforce access rules at the subdomain level-for instance, allowing access to vpn.internal.example.com and docs.portal.example.com, while restricting mail.personal.example.com or video.external.example.com.</t>
  <t>Domain-Based Auditing and Billing
DART gateways can classify and count traffic by destination domain, enabling security auditing, usage analytics, or differentiated billing by service category.</t>
  <t>Regulatory Compliance and Governance
Government or carrier-grade DART gateways can implement domain-based regulatory policies in real time, without relying on unstable IP blacklists or higher-layer protocol signatures.</t>
  <t>Security Policy Reinforcement
Traffic to known malicious domains (e.g., botnet C2 servers, phishing domains) can be identified and blocked natively-e.g., *.botnet.example, stealer.login.xyz-based on FQDN intelligence feeds.</t>
</list></t>

</section>
<section anchor="deployment-guidelines"><name>Deployment Guidelines</name>
<t>To leverage FQDN-based policy enforcement, DART-aware devices SHOULD support:</t>

<t><list style="symbols">
  <t>FQDN-based rule engines, including:</t>
  <t>Exact match: www.example.com</t>
  <t>Wildcard match: *.example.com</t>
  <t>Regex or domain suffix match: .*.edu.cn</t>
  <t>Structured FQDN visibility in DART packet headers, to facilitate efficient lookup and classification.</t>
  <t>Partial address visibility in encrypted modes: When address encryption is enabled, domain-aware policy devices MAY be configured to inspect only locally visible (e.g., intra-domain) FQDN segments.</t>
  <t>Dynamic policy updates, enabling rapid adaptation to new blacklists, whitelists, or domain-based QoS rules.</t>
</list></t>

</section>
<section anchor="comparison-with-legacy-systems"><name>Comparison with Legacy Systems</name>

<texttable title="Comparison with Legacy Systems" anchor="tab-comparison-with-legacy-systems">
      <ttcol align='left'>Feature</ttcol>
      <ttcol align='left'>Traditional IP Networks</ttcol>
      <ttcol align='left'>DART-Based Networks</ttcol>
      <c>Policy Matching Basis</c>
      <c>IP Address</c>
      <c>FQDN</c>
      <c>DNS Visibility</c>
      <c>Passive/sniffed</c>
      <c>Native to protocol</c>
      <c>TLS Impact (e.g., TLS 1.3 + ECH)</c>
      <c>May block visibility</c>
      <c>Unaffected</c>
      <c>Blocking Precision</c>
      <c>Low (IP instability)</c>
      <c>High (domain-specific)</c>
      <c>Management Overhead</c>
      <c>High (IP tracking/updating)</c>
      <c>Low (stable domain semantics)</c>
</texttable>

</section>
<section anchor="summary"><name>Summary</name>
<t>By treating domain names as first-class routing entities, DART enables native FQDN-based policy enforcement at every stage of the forwarding path. This enhances the security, controllability, and regulatory compliance of the network while reducing the reliance on complex DPI or opaque side-channel analysis. Implementers are encouraged to leverage this capability to improve operational visibility and policy expressiveness in both public and private networks.</t>

</section>
</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This section specifies the numeric resources required by the DART protocol during deployment and formally requests or reserves them for IANA registration and allocation.</t>

<t><strong>UDP Port Assignment</strong></t>

<t>The DART protocol relies on UDP as its transport encapsulation format. Therefore, an officially assigned UDP port number is required to identify DART packets <xref target="RFC8126"/>.</t>

<t><list style="symbols">
  <t>Name: DART</t>
  <t>Transport Protocol: UDP</t>
  <t>Suggested Port Number: 0xDA27 (decimal 55847)</t>
  <t>Usage Description: DART packets are encapsulated in UDP to support NAT traversal and compatibility with existing IP networks. All DART-ready gateways and hosts listen on this port.</t>
</list></t>

<t>Note: UDP port 55847 is currently used for experimental purposes. Once the protocol proceeds through the IETF standardization process, an official Well-Known Port (WKP) under 1024 will be formally requested from IANA.</t>

<t><strong>DNS CNAME Prefix Conventions (Non-IANA)</strong></t>

<t>To indicate whether a host supports the DART protocol, special CNAME prefixes in DNS responses are used. This draft proposes the following naming conventions:</t>

<t><list style="symbols">
  <t>dart-host.: Indicates that the target host is DART-ready and can receive DART-encapsulated packets directly.</t>
  <t>dart-gateway.: Indicates that the target host resides in another DART subdomain; packets should be forwarded to the local DART gateway. The associated A record provides the gateway&#39;s IP address.</t>
</list></t>

<t>These prefixes do not require formal IANA reservation but are recommended for documentation and community consensus to avoid conflicts with other protocols.</t>

<t><strong>IP Protocol Number (Optional/Future Use)</strong></t>

<t>Currently, DART packets are encapsulated within UDP and do not require a new IP protocol number. However, if in the future the community seeks to transport DART directly at the IP layer (e.g., as a new L3 protocol), a new IP protocol number may be requested from IANA.</t>

<t><list style="symbols">
  <t>Current Status: No new IP protocol number requested.</t>
  <t>Future Extensibility: Reserved as an option for future community-defined extensions.</t>
</list></t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The DART protocol introduces a name-based addressing model and message encapsulation format. Its overall security depends on the integrity of the DNS system, the behavior of DART gateways, and the processing of DART packets. This section outlines potential security threats and preliminary mitigation strategies.</t>

<t><strong>Risks Related to DNS</strong></t>

<t>DART relies on DNS responses (particularly CNAME and A records) for address resolution and capability indication. This dependency exposes it to DNS-based attacks:</t>

<t><list style="symbols">
  <t>DNS spoofing / cache poisoning: An attacker may forge or manipulate DNS responses, tricking clients into sending DART messages to malicious gateways or hosts.</t>
</list></t>

<t>Mitigations:</t>

<t><list style="symbols">
  <t>Strongly recommend the use of DNSSEC to validate DNS response integrity <xref target="RFC4033"/><xref target="RFC4034"/><xref target="RFC4035"/>.</t>
  <t>DART clients should cache DNS results with appropriate TTLs to reduce exposure.</t>
  <t>DART gateways may maintain ACLs or whitelists to restrict valid destination domains.</t>
</list></t>

<t><strong>Spoofing or Abuse of Virtual Addresses</strong></t>

<t>DART assigns virtual IP addresses to IPv4-only hosts to enable DART-based communication. Attackers might attempt to spoof or predict these mappings, potentially causing <xref target="RFC2827"/>:</t>

<t><list style="symbols">
  <t>Virtual address collisions,</t>
  <t>Misrouting of traffic to unintended hosts,</t>
  <t>DoS attacks leveraging forged virtual addresses.</t>
</list></t>

<t>Mitigations:</t>

<t><list style="symbols">
  <t>DART gateways must dynamically assign and manage virtual addresses, ensuring mappings are host-specific and not globally visible.</t>
  <t>Virtual addresses should be drawn from a private, controlled range (e.g., 198.18.0.0/15) to avoid conflicts with real-world addresses.</t>
  <t>Randomized address assignment can help reduce predictability.</t>
</list></t>

<t>Note: Since virtual address mapping is DNS-based, successful spoofing attempts would require DNS manipulation or MitM capabilities-equivalent to classic DNS attacks. Thus, deploying DNSSEC or encrypted DNS (e.g., DoT/DoH) is strongly recommended.</t>

<t><strong>Injection of Forged DART Packets</strong></t>

<t>Attackers may forge DART-encapsulated UDP packets with false headers in an attempt to manipulate gateway behavior or inject invalid traffic.</t>

<t>Mitigations:</t>

<t><list style="symbols">
  <t>DART gateways should validate source addresses and maintain ingress filtering.</t>
  <t>If deployed in untrusted environments, consider encapsulating DART traffic using IPsec <xref target="RFC4301"/>, QUIC, or similar secure transport layers.</t>
  <t>Gateways may apply basic rate-limiting and session-based admission control to mitigate abuse.</t>
</list></t>

<t><strong>Inter-Domain Route Spoofing</strong></t>

<t>Because DART relies on domain-based interconnection paths, adversaries may register deceptive subdomains or craft malicious DNS entries to redirect traffic.</t>

<t>Mitigations:</t>

<t><list style="symbols">
  <t>Parent domain administrators should audit subdomain configurations.</t>
  <t>DNS zone administration must follow traditional best practices with access controls.</t>
  <t>DART deployments may benefit from introducing domain registration policies or a trust framework to validate subdomain authenticity.</t>
</list></t>

<t><strong>Privacy Exposure of Private Network Hosts</strong></t>

<t>In some environments, private network hosts using DART may include identifiable information (e.g., FQDNs) in outbound messages, potentially exposing user identities in sensitive contexts.</t>

<t>Mitigations:</t>

<t><list style="symbols">
  <t>DART gateways may be configured to obfuscate or replace source identity fields, acting as privacy-preserving proxies.</t>
  <t>Encrypted DNS (DoT/DoH) and encrypted transports (e.g., TLS, QUIC) are encouraged for protecting name resolution and message confidentiality.</t>
  <t>Gateways may implement firewalls or access controls based on domain, port, and identity attributes.</t>
  <t>Future work may explore anonymization or pseudonymization of DART headers to reduce traceability.</t>
</list></t>

<t>Design Philosophy Note:</t>

<t>DART aims to enable global end-to-end reachability, which inherently requires addressability and identity visibility. Unlike traditional NAT models that rely on obscurity for &quot;implicit security,&quot; DART adopts a transparent model with structured namespaces and policy-driven access control.</t>

<t>To be reachable is to be observable; to be connected is to be identifiable.</t>

<t>Security in DART is achieved through encryption, domain-level boundaries, and controllable access-not through concealment. The protocol encourages a shift from &quot;unreachability as security&quot; to &quot;policy-enforced security&quot; as a forward-looking paradigm.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC1034">
  <front>
    <title>Domain names - concepts and facilities</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1034"/>
  <seriesInfo name="DOI" value="10.17487/RFC1034"/>
</reference>

<reference anchor="RFC1035">
  <front>
    <title>Domain names - implementation and specification</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1035"/>
  <seriesInfo name="DOI" value="10.17487/RFC1035"/>
</reference>

<reference anchor="RFC791">
  <front>
    <title>Internet Protocol</title>
    <author fullname="J. Postel" initials="J." surname="Postel"/>
    <date month="September" year="1981"/>
  </front>
  <seriesInfo name="STD" value="5"/>
  <seriesInfo name="RFC" value="791"/>
  <seriesInfo name="DOI" value="10.17487/RFC0791"/>
</reference>

<reference anchor="RFC8200">
  <front>
    <title>Internet Protocol, Version 6 (IPv6) Specification</title>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <author fullname="R. Hinden" initials="R." surname="Hinden"/>
    <date month="July" year="2017"/>
    <abstract>
      <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="86"/>
  <seriesInfo name="RFC" value="8200"/>
  <seriesInfo name="DOI" value="10.17487/RFC8200"/>
</reference>

<reference anchor="RFC2663">
  <front>
    <title>IP Network Address Translator (NAT) Terminology and Considerations</title>
    <author fullname="P. Srisuresh" initials="P." surname="Srisuresh"/>
    <author fullname="M. Holdrege" initials="M." surname="Holdrege"/>
    <date month="August" year="1999"/>
    <abstract>
      <t>This document attempts to describe the operation of NAT devices and the associated considerations in general, and to define the terminology used to identify various flavors of NAT. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2663"/>
  <seriesInfo name="DOI" value="10.17487/RFC2663"/>
</reference>

<reference anchor="RFC4787">
  <front>
    <title>Network Address Translation (NAT) Behavioral Requirements for Unicast UDP</title>
    <author fullname="F. Audet" initials="F." role="editor" surname="Audet"/>
    <author fullname="C. Jennings" initials="C." surname="Jennings"/>
    <date month="January" year="2007"/>
    <abstract>
      <t>This document defines basic terminology for describing different types of Network Address Translation (NAT) behavior when handling Unicast UDP and also defines a set of requirements that would allow many applications, such as multimedia communications or online gaming, to work consistently. Developing NATs that meet this set of requirements will greatly increase the likelihood that these applications will function properly. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="127"/>
  <seriesInfo name="RFC" value="4787"/>
  <seriesInfo name="DOI" value="10.17487/RFC4787"/>
</reference>

<reference anchor="RFC4271">
  <front>
    <title>A Border Gateway Protocol 4 (BGP-4)</title>
    <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
    <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
    <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
    <date month="January" year="2006"/>
    <abstract>
      <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
      <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
      <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
      <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4271"/>
  <seriesInfo name="DOI" value="10.17487/RFC4271"/>
</reference>

<reference anchor="RFC2181">
  <front>
    <title>Clarifications to the DNS Specification</title>
    <author fullname="R. Elz" initials="R." surname="Elz"/>
    <author fullname="R. Bush" initials="R." surname="Bush"/>
    <date month="July" year="1997"/>
    <abstract>
      <t>This document considers some areas that have been identified as problems with the specification of the Domain Name System, and proposes remedies for the defects identified. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2181"/>
  <seriesInfo name="DOI" value="10.17487/RFC2181"/>
</reference>

<reference anchor="RFC2328">
  <front>
    <title>OSPF Version 2</title>
    <author fullname="J. Moy" initials="J." surname="Moy"/>
    <date month="April" year="1998"/>
    <abstract>
      <t>This memo documents version 2 of the OSPF protocol. OSPF is a link- state routing protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="54"/>
  <seriesInfo name="RFC" value="2328"/>
  <seriesInfo name="DOI" value="10.17487/RFC2328"/>
</reference>

<reference anchor="RFC5555">
  <front>
    <title>Mobile IPv6 Support for Dual Stack Hosts and Routers</title>
    <author fullname="H. Soliman" initials="H." role="editor" surname="Soliman"/>
    <date month="June" year="2009"/>
    <abstract>
      <t>The current Mobile IPv6 and Network Mobility (NEMO) specifications support IPv6 only. This specification extends those standards to allow the registration of IPv4 addresses and prefixes, respectively, and the transport of both IPv4 and IPv6 packets over the tunnel to the home agent. This specification also allows the mobile node to roam over both IPv6 and IPv4, including the case where Network Address Translation is present on the path between the mobile node and its home agent. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5555"/>
  <seriesInfo name="DOI" value="10.17487/RFC5555"/>
</reference>

<reference anchor="RFC8126">
  <front>
    <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
    <author fullname="M. Cotton" initials="M." surname="Cotton"/>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <author fullname="T. Narten" initials="T." surname="Narten"/>
    <date month="June" year="2017"/>
    <abstract>
      <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
      <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
      <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="26"/>
  <seriesInfo name="RFC" value="8126"/>
  <seriesInfo name="DOI" value="10.17487/RFC8126"/>
</reference>

<reference anchor="RFC4034">
  <front>
    <title>Resource Records for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4034"/>
  <seriesInfo name="DOI" value="10.17487/RFC4034"/>
</reference>

<reference anchor="RFC4035">
  <front>
    <title>Protocol Modifications for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4035"/>
  <seriesInfo name="DOI" value="10.17487/RFC4035"/>
</reference>

<reference anchor="RFC2827">
  <front>
    <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
    <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
    <author fullname="D. Senie" initials="D." surname="Senie"/>
    <date month="May" year="2000"/>
    <abstract>
      <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="38"/>
  <seriesInfo name="RFC" value="2827"/>
  <seriesInfo name="DOI" value="10.17487/RFC2827"/>
</reference>

<reference anchor="RFC4301">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>

<reference anchor="RFC2136">
  <front>
    <title>Dynamic Updates in the Domain Name System (DNS UPDATE)</title>
    <author fullname="P. Vixie" initials="P." role="editor" surname="Vixie"/>
    <author fullname="S. Thomson" initials="S." surname="Thomson"/>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
    <author fullname="J. Bound" initials="J." surname="Bound"/>
    <date month="April" year="1997"/>
    <abstract>
      <t>Using this specification of the UPDATE opcode, it is possible to add or delete RRs or RRsets from a specified zone. Prerequisites are specified separately from update operations, and can specify a dependency upon either the previous existence or nonexistence of an RRset, or the existence of a single RR. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2136"/>
  <seriesInfo name="DOI" value="10.17487/RFC2136"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC4864">
  <front>
    <title>Local Network Protection for IPv6</title>
    <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
    <author fullname="T. Hain" initials="T." surname="Hain"/>
    <author fullname="R. Droms" initials="R." surname="Droms"/>
    <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
    <author fullname="E. Klein" initials="E." surname="Klein"/>
    <date month="May" year="2007"/>
    <abstract>
      <t>Although there are many perceived benefits to Network Address Translation (NAT), its primary benefit of "amplifying" available address space is not needed in IPv6. In addition to NAT's many serious disadvantages, there is a perception that other benefits exist, such as a variety of management and security attributes that could be useful for an Internet Protocol site. IPv6 was designed with the intention of making NAT unnecessary, and this document shows how Local Network Protection (LNP) using IPv6 can provide the same or more benefits without the need for address translation. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4864"/>
  <seriesInfo name="DOI" value="10.17487/RFC4864"/>
</reference>

<reference anchor="RFC8504">
  <front>
    <title>IPv6 Node Requirements</title>
    <author fullname="T. Chown" initials="T." surname="Chown"/>
    <author fullname="J. Loughney" initials="J." surname="Loughney"/>
    <author fullname="T. Winters" initials="T." surname="Winters"/>
    <date month="January" year="2019"/>
    <abstract>
      <t>This document defines requirements for IPv6 nodes. It is expected that IPv6 will be deployed in a wide range of devices and situations. Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments.</t>
      <t>This document obsoletes RFC 6434, and in turn RFC 4294.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="220"/>
  <seriesInfo name="RFC" value="8504"/>
  <seriesInfo name="DOI" value="10.17487/RFC8504"/>
</reference>

<reference anchor="RFC5128">
  <front>
    <title>State of Peer-to-Peer (P2P) Communication across Network Address Translators (NATs)</title>
    <author fullname="P. Srisuresh" initials="P." surname="Srisuresh"/>
    <author fullname="B. Ford" initials="B." surname="Ford"/>
    <author fullname="D. Kegel" initials="D." surname="Kegel"/>
    <date month="March" year="2008"/>
    <abstract>
      <t>This memo documents the various methods known to be in use by applications to establish direct communication in the presence of Network Address Translators (NATs) at the current time. Although this memo is intended to be mainly descriptive, the Security Considerations section makes some purely advisory recommendations about how to deal with security vulnerabilities the applications could inadvertently create when using the methods described. This memo covers NAT traversal approaches used by both TCP- and UDP-based applications. This memo is not an endorsement of the methods described, but merely an attempt to capture them in a document. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5128"/>
  <seriesInfo name="DOI" value="10.17487/RFC5128"/>
</reference>

<reference anchor="RFC4033">
  <front>
    <title>DNS Security Introduction and Requirements</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4033"/>
  <seriesInfo name="DOI" value="10.17487/RFC4033"/>
</reference>




    </references>

</references>


<?line 1177?>

<section anchor="example-deployment-topology"><name>Example Deployment Topology</name>

<section anchor="network-architecture"><name>Network Architecture</name>

<t>Assume the following network environment:</t>

<t><list style="symbols">
  <t>Top-level domain:<br />
dart.example, serving as the parent domain of two DART gateways. The parent domain interface IPs of gw1 and gw2 are 10.0.0.1 and 10.0.0.2, respectively.</t>
  <t>Subdomains:
  <list style="symbols">
      <t>sub1.dart.example (Subdomain 1), connected to DART gateway gw1. The interface IP of gw1 in this subdomain is 10.1.0.1.</t>
      <t>sub2.dart.example (Subdomain 2), connected to DART gateway gw2. The interface IP of gw2 in this subdomain is 10.2.0.1.</t>
    </list></t>
</list></t>

<t>The connection topology is as follows:</t>

<figure title="Example Deployment Topology" anchor="topology"><artwork><![CDATA[
            +-------------------------------------+
            |            dart.example             |
            |         (Parent DNS & Backbone)     |
            +-------------------------------------+
                    |                     |
              +-----v-----+         +-----v------+
              |    gw1    |         |    gw2     |
              | (DART GW) |         | (DART GW)  |
              +-----------+         +------------+
                    |                     |
        +-----------v-------+   +---------v----------+
        | sub1.dart.example |   | sub2.dart.example  |
        |  - A: IPv4-only   |   |  - C: DART Ready   |
        |  - B: DART Ready  |   |  - D: IPv4-only    |
        +-------------------+   +--------------------+
]]></artwork></figure>

<t><list style="symbols">
  <t>A: 10.1.0.11, IPv4-only</t>
  <t>B: 10.1.0.12, DART Ready</t>
  <t>C: 10.2.0.11, DART Ready</t>
  <t>D: 10.2.0.12, IPv4-only</t>
</list></t>

<t>Note: Since DART logically isolates IP address scopes across domains, the three domains above (one parent and two subdomains) may reuse the same IP subnets without collision. Different subnets are used here solely to avoid reader confusion.</t>

<t>In this deployment, gw1 and gw2 each integrate a DHCP server and a DNS server. These services must tightly integrate with the forwarding plane. If implemented as standalone servers, effective information sharing with the DART gateway is essential.</t>

</section>
<section anchor="procedures"><name>Procedures</name>

<t>Initialization (DHCP Phase)</t>

<t><list style="symbols">
  <t>Hosts A/B/C/D obtain IP addresses from their local DART gateway via DHCP.</t>
  <t>DART-ready hosts (B and C) include a special DHCP Option to indicate DART capability.</t>
  <t>DART-ready hosts also use the domain name provided by the DHCP server to construct their own FQDNs.</t>
  <t>IPv4-only hosts (A and D) are unaware of DART and join the network using legacy DHCP processes.</t>
  <t>During this phase, the DHCP server:
  <list style="symbols">
      <t>Allocates IPs, default gateways, and DNS servers;</t>
      <t>Records whether the host supports DART;</t>
      <t>Constructs FQDNs for IPv4-only hosts using their hostnames.</t>
    </list></t>
</list></t>

<t>DNS Resolution</t>

<t>Each gateway has an embedded DNS server with the following behavior:</t>

<t><list style="symbols">
  <t>For queries received via the parent domain interface:
  <list style="symbols">
      <t>Always respond with the gateway&#39;s parent domain IP, regardless of the actual destination. This forces the sender to route packets via the gateway.</t>
    </list></t>
  <t>For queries received via the subdomain interface:
  <list style="symbols">
      <t>If querying an in-domain host: respond with the actual IP of the target.</t>
      <t>If querying a host in another domain:
      <list style="symbols">
          <t>If the querier is DART-ready: respond with the gateway&#39;s subdomain interface IP, so the DART packet is sent via the local interface.</t>
          <t>If the querier is IPv4-only: allocate a virtual IP, bind it to the queried FQDN, and respond with this virtual IP. The IPv4-only host will send the packet to the virtual address, which routes to the gateway.</t>
        </list></t>
    </list></t>
</list></t>

<t>Forwarding</t>

<t><list style="symbols">
  <t>For DART packets arriving at the parent domain interface:
  <list style="symbols">
      <t>If the destination is a DART-ready host (B/C), forward via the corresponding subdomain interface.</t>
    </list></t>
  <t>For DART packets arriving at the subdomain interface (e.g., sent by B or C):
  <list style="symbols">
      <t>Forward via the parent domain interface.</t>
    </list></t>
  <t>In both cases:
  <list style="symbols">
      <t>DART header remains unchanged;</t>
      <t>IP header source and destination are rewritten appropriately.</t>
    </list></t>
</list></t>

<t>NAT-DART-4 Encapsulation (Sender Side)</t>

<t>Example: Host A (IPv4-only) sending to a host in sub2 (C or D):</t>

<t><list style="numbers" type="1">
  <t>A queries C.sub2.dart.example from its configured DNS server (10.1.0.1).</t>
  <t>The DNS server determines that C is external to the subdomain and:  <list style="symbols">
      <t>Allocates virtual address 198.18.1.34 and binds it to C.sub2.dart.example;</t>
      <t>Returns:<br />
 C.sub2.dart.example.      CNAME   dart-gateway.sub1.dart.example.
 dart-gateway.sub1.dart.example.  A 198.18.1.34</t>
    </list>
Although A is IPv4-only and ignores the CNAME, this prefix signals to operators that this is a DART-based mapping and 198.18.<em>.</em> is a virtual IP.</t>
  <t>A constructs an IP packet with destination 198.18.1.34 and sends it.</t>
  <t>The packet is routed to its default gateway gw1 (as the destination is non-local).</t>
  <t>At gw1, the following actions occur:  <list style="symbols">
      <t>Detects virtual IP as destination;</t>
      <t>Inserts DART header and UDP encapsulation;</t>
      <t>Fills in destination FQDN (C.sub2.dart.example) from DNS mapping;</t>
      <t>Determines source FQDN (A.sub1.dart.example) from DHCP records;</t>
      <t>Resolves C.sub2.dart.example via parent domain DNS to obtain 10.2.0.1;</t>
      <t>Sets source IP as 10.0.0.1 (gw1&#39;s parent interface);</t>
      <t>Sends encapsulated packet from parent interface.</t>
    </list></t>
  <t>The packet is routed via IP backbone and arrives at gw2&#39;s parent interface.</t>
  <t>gw2:  <list style="symbols">
      <t>Recognizes C as a DART-ready host;</t>
      <t>Rewrites the IP header (destination: 10.2.0.11, source: 10.2.0.1);</t>
      <t>Forwards the DART packet via its subdomain interface to C.</t>
    </list></t>
</list></t>

<t>NAT-DART-4 Decapsulation (Receiver Side)</t>

<t>Example: Host D (IPv4-only) receives a DART packet via gw2:</t>

<t><list style="numbers" type="1">
  <t>gw2 receives a DART packet from parent interface, destined for D.sub2.dart.example.</t>
  <t>Determines D is an IPv4-only host:
  <list style="symbols">
      <t>Allocates a virtual source address;</t>
      <t>Maps sender&#39;s FQDN to this virtual IP;</t>
      <t>Strips DART and UDP headers;</t>
      <t>Constructs a native IP packet:
      <list style="symbols">
          <t>Destination: D&#39;s IP 10.2.0.12</t>
          <t>Source: virtual address</t>
        </list></t>
      <t>Sends via subdomain interface.</t>
    </list></t>
  <t>D receives the packet and replies to the virtual source IP.</t>
  <t>gw2 re-encapsulates the reply using the same virtual-IP-to-FQDN mapping.</t>
  <t>The response is routed back to the original sender through the DART infrastructure.</t>
</list></t>

</section>
<section anchor="case-walkthrough"><name>Case Walkthrough</name>
<t>Let host A (A.sub1.dart.example, 10.1.0.11, IPv4-only) send a message to host C (C.sub2.dart.example, 10.2.0.11, DART Ready):</t>

<t><list style="numbers" type="1">
  <t>A queries C.sub2.dart.example via DNS.</t>
  <t>The DNS server discovers that the host C.sub2.dart.example queried by Host A is an external host that needs to be forwarded by gw1. It then assigns a virtual address 198.18.1.34 corresponding to C.sub2.dart.example and returns the virtual address 198.18.1.34 as the query result to Host A:
 <spanx style="verb">
 C.sub2.dart.example.      CNAME   dart-gateway.sub1.dart.example.
 dart-gateway.sub1.dart.example.  A 198.18.1.34  
</spanx>
 The CNAME starts with dart-gateway., intended to indicate to the querying party that the target host supports DART. Although the querying party may be an IPv4-only host and does not use this information, network administrators can recognize from it that this is not the actual IP of the target host but an address pointing to the default gateway. When administrators see an IP address starting with 198.18, they can also identify it as a virtual address.</t>
  <t>Host A receives the DNS response and learns that the IP corresponding to the domain C.sub2.dart.example is 198.18.1.34. It then constructs an IP packet with the destination address 198.18.1.34 and sends it.</t>
  <t>198.18.1.34 is not actually assigned to any device, so according to routing rules, the packet is sent to the default gateway, gw1.</t>
  <t>The DART gateway gw1 detects that the packet&#39;s destination address is a virtual address (from the virtual address pool) and knows that this packet is destined for a DART host:
  <list style="symbols">
      <t>Insert the DART header (including the encapsulating UDP header for DART).</t>
      <t>Look up the FQDN corresponding to 198.18.1.34 in the table built from DNS, and insert C.sub2.dart.example as the destination address in the DART header.</t>
      <t>Based on the source IP 10.1.0.11, query the DHCP server table to obtain the source host&#39;s FQDN A.sub1.dart.example and insert it as the source address in the DART header.</t>
      <t>Query C.sub2.dart.example in the parent domain DNS; the returned IP 10.2.0.1 is used as the IP-layer destination address.</t>
      <t>Use gw1&#39;s interface IP in the parent domain as the IP-layer source address.</t>
      <t>Send the packet out from the parent domain interface.</t>
    </list></t>
  <t>The packet is forwarded according to IP routing rules within the parent domain and eventually delivered to gw2&#39;s parent-domain interface.</t>
  <t>Upon receiving the packet, gw2 sees that the destination address is C.sub2.dart.example and knows to send it out via the child-domain interface. It queries the DHCP server records and learns that C is a DART-ready host. It then directly forwards the DART packet (DART header unchanged; IP-layer destination address set to C&#39;s address 10.2.0.11, IP-layer source address set to gw2&#39;s interface IP within the child domain 10.2.0.1).</t>
  <t>The packet is successfully delivered to the target host.</t>
</list></t>

</section>
<section anchor="summary-1"><name>Summary</name>
<t>This example illustrates a multi-subdomain, mixed-host environment and highlights:</t>

<t><list style="symbols">
  <t>DNS-driven forwarding behavior;</t>
  <t>Role of virtual addresses in enabling IPv4-only interoperability;</t>
  <t>Encapsulation and decapsulation by DART gateways;</t>
  <t>Cross-domain communication between legacy and DART-ready nodes.</t>
</list></t>

</section>
</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The author, Li Shi, is solely responsible for the design and implementation of the DART protocol at the current stage.</t>

<t>During the drafting of this document, the author received valuable support from modern AI-assisted tools, including ChatGPT, DeepSeek, Tongyilingma and GitHub Copilot. These tools played a helpful role in shaping the structure, clarifying concepts, and accelerating document generation.</t>

<t>The author also thanks the IETF community and its working groups for providing an open platform for the development and discussion of new protocols.</t>

<t>Constructive feedback from future reviewers is sincerely appreciated.</t>

</section>
<section anchor="implementation-and-availability"><name>Implementation and Availability</name>

<t>A working prototype of the DART protocol has been independently developed and deployed by the author. It is publicly accessible at<br />
http://dart-proto.cn</t>

<t>This live system demonstrates the core features of the DART protocol, including DNS-based FQDN redirection, virtual address mapping, DART encapsulation and routing, and NAT-DART-4 conversion.</t>

<t>The source code of the implementation is fully open-source and available on GitHub at the following repositories:</t>

<t><list style="symbols">
  <t>DART Gateway (Linux-based)<br />
https://github.com/rancho-dart/dart_forwarder</t>
  <t>DART-ready client for Windows (based on WinDivert)<br />
https://github.com/rancho-dart/DartWinDivert</t>
</list></t>

<t>The author encourages implementers, researchers, and operators to experiment with the live system, review the source code, and provide feedback to improve the protocol.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

