Skip to content

PIP-7009: Reticulum Network Stack (RNS) Transport Support

FieldValue
PIP7009
TitleReticulum Network Stack (RNS) Transport Support
AuthorPars Core Team
StatusImplemented
TypeStandards Track
CategoryNetworking
Created2026-02-04
RequiresLP-9701

Abstract

This proposal enables Pars network validators to operate over Reticulum Network Stack (RNS), supporting mesh networking, LoRa connectivity, and offline-first operation for the MIGA Protocol infrastructure.

Motivation

Pars network serves the MIGA Protocol which requires robust, censorship-resistant infrastructure. Traditional TCP/IP connectivity creates single points of failure and geographic constraints. RNS enables:

  • Sovereign Infrastructure: Validators in jurisdictions with internet restrictions
  • Disaster Resilience: Mesh networks that operate during infrastructure outages
  • Remote Deployment: LoRa-connected validators in areas without internet
  • Mobile Validators: Maritime, aviation, and vehicular validator nodes
  • Air-Gapped Security: High-security validators with controlled connectivity

Specification

Pars inherits the full RNS implementation from Lux (LP-9701) with Pars-specific configuration:

Network Configuration

NetworkChain IDRNS Gateway
Pars Mainnet18071rns.pars.network:9631
Pars Testnet18072rns-testnet.pars.network:9641

Default Configuration

yaml
# ~/.pars/config.yaml
rns:
  enabled: true
  configPath: ~/.pars/reticulum
  announceInterval: 5m
  interfaces:
    - AutoInterface
    - TCPClientInterface
  linkTimeout: 30s

Endpoint Addressing

Pars validators can advertise any combination of endpoints:

go
// Traditional IP
endpoint := ips.NewIPEndpoint(netip.MustParseAddrPort("203.0.113.50:9631"))

// Hostname (for dynamic IPs)
endpoint, _ := ips.NewHostnameEndpoint("validator.example.com", 9631)

// RNS destination (for mesh/LoRa)
endpoint, _ := ips.NewRNSEndpointFromHex("rns://a5f72c3d4e5f60718293a4b5c6d7e8f9")

Identity Management

Pars validators generate RNS identities automatically on first start:

~/.pars/reticulum/identity  # 40-byte identity file

Identity contains:

  • Ed25519 signing keypair (for validator signatures)
  • X25519 encryption keypair (for secure links)
  • 128-bit destination hash (network address)

All RNS links use:

  • X25519 ECDH key exchange
  • HKDF-SHA256 key derivation
  • AES-256-GCM authenticated encryption
  • Counter-based nonces (no reuse)

Announce Integration

Pars validators include MIGA-specific app data in announcements:

go
type ParsAnnounceData struct {
    ValidatorID   [20]byte // Validator address
    StakeAmount   uint64   // Current stake
    NetworkID     uint32   // Chain ID (18071/18072)
    Capabilities  uint16   // Supported features
}

Rationale

Why RNS for MIGA Protocol?

  1. Censorship Resistance: MIGA Protocol requires validators that cannot be easily blocked
  2. Geographic Distribution: LoRa enables validators in remote locations
  3. Network Resilience: Mesh topology survives infrastructure failures
  4. Sovereignty: Nations can run validators without external internet dependencies

Why Not Just TCP/IP?

TCP/IP requires:

  • Stable internet connectivity
  • Public IP or NAT traversal
  • DNS resolution (centralized)
  • BGP routing (can be hijacked)

RNS provides:

  • Works over any byte transport
  • Cryptographic addressing (no DNS)
  • Mesh routing (no single path)
  • Works offline with store-and-forward

Post-Quantum Security (Hybrid Mode)

Pars inherits hybrid post-quantum cryptography from LP-9701, with additional considerations specific to MIGA Protocol sovereign infrastructure requirements.

Why Post-Quantum Matters for MIGA

  1. Long-Term Data Protection: Sovereign infrastructure handles sensitive national data with multi-decade retention requirements. Harvest-now-decrypt-later attacks are a real threat.

  2. Regulatory Compliance: Many jurisdictions are mandating quantum-resistant cryptography for critical infrastructure. NIST requires federal systems to transition by 2035.

  3. Forward Secrecy Duration: MIGA validators may operate for decades. Cryptographic keys protecting historical transactions must resist future quantum computers.

  4. Sovereignty Requirements: Nations cannot rely on cryptographic protections that may fail within the operational lifetime of their infrastructure.

Hybrid Cryptographic Suite

Pars uses the same hybrid approach as LP-9701:

PurposeClassicalPost-QuantumCombined
Identity SigningEd25519ML-DSA-65Hybrid (AND)
Key ExchangeX25519ML-KEM-768Hybrid KEM
Session EncryptionAES-256-GCM-Same
Key DerivationHKDF-SHA256-Same

Both ML-KEM-768 and ML-DSA-65 provide NIST Level 3 security (~192-bit classical equivalent).

Wire Format Impact

ComponentClassicalHybridDelta
Public Identity64 bytes~3.2 KB+3.1 KB
Signature64 bytes~2.5 KB+2.4 KB
Key Exchange64 bytes~1.2 KB+1.1 KB
Handshake Total~256 bytes~7.5 KB+7.2 KB

MIGA deployments often use constrained networks (LoRa, satellite, rural cellular). Performance assessment:

Link TypeBandwidthClassical HandshakeHybrid HandshakeAcceptable?
LoRa SF75.5 kbps370 ms11 secMarginal
LoRa SF12250 bps8 sec4 minPoor
Satellite64 kbps32 ms940 msYes
Rural 3G384 kbps5 ms156 msYes
TCP/IP100 Mbps<1 ms<1 msYes

Recommendation: For LoRa SF12 deployments, use classical-only mode with periodic key rotation, or pre-establish long-lived sessions with infrequent re-keying.

Regulatory Alignment

JurisdictionRequirementStatus
NIST (US)Federal PQC migration by 2035Compliant
ANSSI (France)Hybrid mode recommendedCompliant
BSI (Germany)Level 3+ required for sovereignCompliant
NCSC (UK)PQC transition planning requiredCompliant

Configuration

yaml
# ~/.pars/config.yaml
rns:
  enabled: true
  postQuantum: true           # Enable hybrid PQ mode (default)
  requirePostQuantum: false   # Allow classical-only peers
  # For constrained links:
  # postQuantum: false        # Disable for LoRa SF12

Backward Compatibility with Classical Peers

Pars validators can interoperate with classical-only peers:

  1. Capability Exchange: Handshake advertises PQ support
  2. Graceful Degradation: Falls back to classical if peer lacks PQ
  3. Policy Enforcement: requirePostQuantum: true rejects classical peers
  4. Mixed Networks: PQ and classical validators coexist

References

Security Considerations

  1. Validator Identity: RNS identity is separate from validator signing key
  2. Key Isolation: RNS keys stored in separate file from validator keys
  3. Forward Secrecy: Each link uses ephemeral keys
  4. Replay Protection: Timestamps prevent announcement replay
  5. Sybil Resistance: Existing stake requirements apply regardless of transport
  6. Quantum Resistance: Hybrid PQ mode protects sovereign infrastructure against future quantum threats
  7. Harvest-Now-Decrypt-Later Defense: Long-term session confidentiality via ML-KEM-768
  8. Regulatory Compliance: NIST Level 3 satisfies current sovereign infrastructure requirements

Backwards Compatibility

Fully backwards compatible:

  • Existing TCP/IP validators continue working
  • RNS is opt-in via configuration
  • Mixed networks (some RNS, some TCP) function normally
  • Peer discovery works across transport types

Test Cases

All LP-9701 tests apply. Additional Pars-specific tests:

  • MIGA app data serialization
  • Cross-transport peer discovery
  • Gateway failover
  • Stake-weighted announcement priority

Implementation

Implemented via LP-9701 inheritance. Pars-specific configuration in pars-node v1.5.0.

References

Copyright 2026 Pars Network. All rights reserved.

Released under the MIT License.