Fact-checked by Grok 2 weeks ago

.arpa

The is a (TLD) in the (DNS) of the , designated exclusively for infrastructure purposes related to address and routing parameters. It serves as a specialized to support operationally critical functions, such as reverse DNS lookups for addresses and other protocol-specific identifier mappings, ensuring the reliable translation of technical identifiers into domain names. Originally introduced in the early 1980s during the initial deployment of the DNS, .arpa functioned as a temporary TLD for hosts managed under the Defense Advanced Research Projects Agency (DARPA) within the ARPANET and early Internet, facilitating the transition from static host tables to the dynamic DNS system. It was intended for short-term use, with plans to phase it out by migrating ARPANET hosts to other emerging TLDs like .edu or .org, reflecting the domain's role in the historical evolution from ARPANET's centralized naming to a distributed Internet architecture. By the late 1990s, as the Internet matured, the domain was largely retired but was later revived and redesignated in 2000 specifically for infrastructural needs, with DARPA formally disassociating from its management on April 14, 2000, and transferring oversight to the Internet Architecture Board (IAB) and the Internet Corporation for Assigned Names and Numbers (ICANN). Today, .arpa is administered by the (IANA) under the guidance of the IAB, in cooperation with the broader , and operates under strict guidelines outlined in 3172 to prevent misuse for general-purpose naming. Key second-level domains within .arpa include in-addr.arpa for IPv4 reverse mappings, ip6.arpa for IPv6 reverse mappings, and others like e164.arpa for number mappings, each established through IETF standards-track documents to address specific infrastructure requirements. Registration is highly restricted, limited to uses approved by the IAB for essential operations, underscoring .arpa's foundational role in maintaining the stability and interoperability of global networking protocols.

Overview

Definition and Purpose

The .arpa domain, an abbreviation for "Address and Routing Parameter Area," is a (TLD) in the (, serving as a foundational element of infrastructure. It is designated exclusively for supporting operationally critical identifier spaces that enable essential network functions, such as address resolution and parameter management, in coordination with the Internet technical community through the (IAB). Unlike TLDs available for public registration and commercial use, .arpa is strictly reserved for technical purposes and prohibits general domain registrations, ensuring its dedicated role in maintaining DNS stability and . This restriction underscores its function in facilitating core DNS operations, including mappings essential for network navigation, without interference from non-infrastructural activities. Historically, .arpa originated as the initial TLD in the early DNS framework, introduced in as a transitional mechanism from host tables to the new naming system. Although planned as temporary and slated for phase-out once hosts migrated to other domains, it was retained and redesignated permanently in due to its indispensable support for evolving Internet infrastructure requirements.

Administration by IANA

The .arpa is delegated to the (IANA) by the (ICANN) for exclusive management as an infrastructure , ensuring its use is limited to technical operations without commercial or public registrations. RFC 3172 establishes the management guidelines and operational requirements for .arpa, designating it to support standards that necessitate DNS-based infrastructure, such as reverse mappings, while explicitly prohibiting its use for general registrations or non-infrastructure purposes to preserve its specialized role. Subdomain delegations under .arpa require approval from the (IETF), typically through the publication of a (RFC) or review by the Internet Engineering Steering Group (IESG), to ensure alignment with technical standards and prevent misuse. IANA maintains the .arpa entry in the by processing and implementing approved updates, while coordinating with Regional Internet Registries (RIRs) to delegate address-related subdomains, such as those under in-addr.arpa and ip6.arpa, in accordance with allocations. As of November 2025, no major policy changes have been implemented for .arpa administration, though IANA and IETF continue to monitor and evaluate emerging infrastructure needs. For example, the eap.arpa subdomain was added in October 2025 to support (EAP) provisioning in network authentication scenarios, following IESG approval of the related specification (pending RFC publication).

Technical Uses

Reverse IP Address Mapping

Reverse DNS, or reverse domain name system lookup, maps (IP) addresses to domain names using specialized subdomains within .arpa, enabling the resolution of numerical addresses back to human-readable hostnames. This is fundamental to the (DNS) and relies on Pointer (PTR) resource records stored in these zones. The .arpa domain provides the infrastructure for this mapping, distinct from forward DNS which resolves names to addresses. For IPv4 addresses, reverse mapping utilizes the in-addr.arpa subdomain, where the dotted-decimal notation of the IP address is reversed and appended to in-addr.arpa. For example, the IPv4 address 127.0.0.1 corresponds to the domain name 1.0.0.127.in-addr.arpa, queried with a PTR record to retrieve the associated . This structure allows hierarchical delegation based on octet boundaries, such as /8, /16, or /24 , facilitating efficient of large address blocks. The format was established to support gateway and address-to-name resolution in early implementations. IPv6 reverse mapping employs the ip6.arpa subdomain, representing the address as a sequence of hexadecimal nibbles (4-bit groups) in reverse order, separated by dots and suffixed with ip6.arpa. For instance, the 2001:db8::1 translates to 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa for PTR queries. This nibble-based approach accommodates the 128-bit length of addresses, enabling delegations on boundaries multiples of 4 bits, which supports scalable resolution for expansive address spaces. The mechanism extends DNS to handle 's hexadecimal format while maintaining compatibility with standard PTR records. Administration of these reverse zones involves delegation by the (IANA) to Regional Internet Registries (RIRs), such as ARIN for , RIPE NCC for , and APNIC for Asia-Pacific, which manage the corresponding allocations. RIRs oversee the authoritative name servers for subzones, ensuring consistent and distributed control; for example, ARIN handles delegations under in-addr.arpa for its IPv4 allocations on octet boundaries. This model promotes reliability through dedicated nameservers like a.in-addr-servers.arpa and a.ip6-servers.arpa. These reverse mappings are crucial for network diagnostics, allowing administrators to verify identities during ; for , they aid in detecting IP spoofing by cross-checking addresses against expected domain names; and for email validation, many servers require valid PTR records to mitigate and abuse. Without proper reverse DNS, applications relying on address verification, such as systems or anti-phishing tools, face increased risks of misconfiguration or malicious activity.

Telephone Number Mapping

The Electronic Number Mapping (ENUM) system utilizes the e164.arpa subdomain within the .arpa to map international numbers, formatted according to the standard, to Uniform Resource Identifiers (URIs) via the (DNS). This enables the resolution of telephone numbers into internet-based services, supporting the convergence of traditional with IP networks. For instance, the number +1-555-123-4567 is transformed by removing non-digit characters, reversing the digit sequence to 76543215551, inserting dots between digits to form 7.6.5.4.3.2.1.5.5.5.1, and appending .e164.arpa, resulting in the DNS query 7.6.5.4.3.2.1.5.5.5.1.e164.arpa. ENUM operates as a Dynamic Delegation Discovery System (DDDS) application, as defined in RFC 6116, which specifies the use of Naming Authority Pointer (NAPTR) resource records to store and retrieve service mappings. The reversal of digits in the (FQDN) allows hierarchical delegation within the DNS, where NAPTR records provide rewrite rules that guide queries to terminal s, such as (SIP) addresses for voice calls. Related standards, including RFC 2916 for initial and DNS integration and RFC 3761 for URI mappings (both obsoleted by RFC 6116), establish the foundational protocols for this reverse-lookup mechanism. By linking numbers to URIs, ENUM facilitates in IP-based , allowing a single number to route calls to endpoints, addresses, or web services, thereby enabling seamless interoperability between the (PSTN) and (VoIP) systems. NAPTR records in e164.arpa specify services with prefixes like "E2U+sip" for URIs or "E2U+mailto" for , prioritizing options based on and flags to direct traffic efficiently. The e164.arpa domain is managed through coordination between the International Telecommunication Union Telecommunication Standardization Sector (ITU-T) and the Internet Assigned Numbers Authority (IANA). ITU-T serves as the ENUM Tier 0 Registrar, delegating country-code subdomains (e.g., 1.e164.arpa for the United States) to national authorities or Tier 1 registries, which in turn handle further delegations to service providers or subscribers. IANA oversees the .arpa root delegation, ensuring infrastructure stability, while national registries manage local policies for number portability and privacy. This tiered structure requires ITU-T member states to establish registries for compliant delegation. As of 2025, ENUM adoption remains limited overall, with primary use in carrier-grade environments for VoIP and among service providers, but it has not achieved widespread consumer deployment due to regulatory, , and challenges. Growth is evident in enterprise VoIP applications, where private ENUM implementations optimize routing between trusted networks, though public infrastructure ENUM sees slower uptake.

Residential Networking

The subdomain home.arpa was designated in May 2018 by RFC 8375 as a specifically for non-unique naming in residential home networks, enabling local identification of devices such as printers or () without requiring the registration of globally unique public domains. This designation addresses the need for a standardized, conflict-free in private networks, where multiple homes might independently use the same local names without impacting the global (DNS). The (IANA) has recorded home.arpa accordingly to support this infrastructure role within the .arpa . The use of home.arpa facilitates local DNS resolution for hostnames like printer.home.arpa, allowing residential devices to be addressed consistently within the network while avoiding interference with multicast DNS (mDNS) conventions such as the .local domain, which operates on link-local scopes and can lead to resolution ambiguities in mixed environments. Queries for names under home.arpa are intended to be handled exclusively by local resolvers in the home network and must not be forwarded to upstream or public DNS servers, ensuring privacy and preventing leakage of internal network details to the Internet. Integration with the Home Networking Control Protocol (HNCP), as originally specified in 7788 and updated by 8375, enables self-configuring capabilities in residential networks by designating home.arpa as the default domain for distributed name services, supporting automated address assignment and without manual intervention. This protocol-driven approach promotes , simplifying the deployment of interconnected devices in homes by providing a reliable namespace that aligns with DNS standards ( 1035). The benefits include streamlined naming for (IoT) setups, reduced configuration overhead, and enhanced interoperability among services, all while maintaining isolation from public resolution. As of 2025, home.arpa continues to gain traction in advanced residential setups, particularly those leveraging open-source router firmware like , where community discussions since 2023 have advocated for its default implementation to standardize local TLD usage. However, widespread adoption in commercial smart home ecosystems remains dependent on local DNS server support in consumer routers and gateways, limiting its penetration in off-the-shelf devices despite its for zero-configuration scenarios.

Additional Infrastructure Applications

URI Resolution

The .arpa top-level domain supports URI resolution through the dedicated uri.arpa subdomain, which serves as a namespace for encoding URI schemes within the (DNS). Established under the Dynamic Delegation Discovery System (DDDS), uri.arpa enables the lookup of authoritative servers or resources associated with (URIs) via DNS queries. This infrastructure is particularly valuable for validation and lookup services in network environments, allowing systems to discover relevant information about a URI without relying on non-DNS mechanisms. The resolution process in uri.arpa utilizes Naming Authority Pointer (NAPTR) resource records to guide URI processing. To resolve a URI, the scheme (e.g., "http") is extracted and appended to ".uri.arpa" to form the initial query, such as "http.uri.arpa". NAPTR records at this node contain flags, services, regular expressions, and replacement strings that parse the URI and rewrite it into subsequent DNS queries. For instance, for the URI "http://example.com/path", the NAPTR record at "http.uri.arpa" might use a regular expression like "!^http://([^/:]+)(:\d*)?(.*)$!i" to capture the authority ("example.com") and path, replacing it with a delegation to "example.com" for further resolution, potentially yielding additional NAPTR or other records (e.g., A or AAAA) for the resource. This structured approach ensures hierarchical delegation based on URI components, avoiding direct exposure of full URIs in public DNS zones. A related subdomain, urn.arpa, supports resolution of Uniform Resource Names (URNs) using the DDDS framework and NAPTR records, as defined in RFC 3406. It provides a namespace for URN namespaces (e.g., "isbn.urn.arpa" for ISBN identifiers), enabling delegation to authoritative resolvers for specific URN schemes. Like uri.arpa, urn.arpa is administered by IANA under IAB guidelines and sees limited practical adoption, primarily in experimental and standards-compliant implementations for identifier resolution. uri.arpa is administered by the (IANA) under guidelines from the (IAB), with registration procedures outlined for schemes to ensure controlled . Updates to these procedures, such as removing outdated IETF tree requirements, have streamlined assignments while maintaining focus on needs. The supports experimental and applications, including potential uses in contexts like verification, though it emphasizes standardization over broad deployment. As of 2025, uri.arpa sees limited adoption, primarily in research prototypes, DDDS implementations, and niche infrastructure tools for URI handling, rather than everyday web services. Its design prioritizes future-proofing DNS-based URI resolution amid evolving network protocols, with ongoing IANA oversight to prevent misuse.

Protocol-Specific Domains

The .arpa domain includes subdomains designated for specific protocols to facilitate infrastructure functions, such as resolving parameters tied to those protocols without interfering with the general DNS namespace. These delegations are managed by the (IANA) following standards set by the (IETF), ensuring they support specialized network operations rather than broad public use. One such subdomain is iris.arpa, established for the Internet Registry Information Service (IRIS) protocol, which provides a structured framework for whois-like queries to access registry data across various protocols. Defined in RFC 3981 as the core IRIS protocol and extended in RFC 4698 for address registry operations under iris.arpa, it aimed to offer a more extensible alternative to traditional WHOIS services. However, by 2025, iris.arpa has seen limited adoption and is largely deprecated in practice, supplanted by the Registration Data Access Protocol (RDAP) as the preferred method for registry information retrieval, per IETF recommendations. An emerging example is eap.arpa, intended for the (EAP) to enable provisioning of credentials in network environments. As outlined in draft-ietf-emu-eap-arpa (version 10, September 2025), this subdomain allows EAP peers to query servers for temporary or limited credentials using specially formatted domain names, supporting secure without relying on external directories. The draft was approved by the IESG on September 26, 2025, and is awaiting publication as an by the RFC Editor, with IANA delegation completed, enabling operational use pending final standardization. By November 2025, full deployment is progressing in IETF-vetted environments. These subdomains exemplify the constrained, IETF-vetted scope of .arpa, reserved for niche tools that enhance interoperability in controlled settings.

History

Origins in ARPANET

The .arpa domain emerged during the transition of the —the Department of Defense's pioneering packet-switched network—from a centralized host naming system to the hierarchical (DNS) in the early 1980s. , initiated by the () in 1969, initially relied on a flat namespace maintained in a single hosts.txt file distributed by the (). As the network grew to include military () and research sites, the limitations of this approach became evident, prompting the development of DNS to enable distributed name management. The .arpa domain was introduced in 1983 as a test domain to facilitate this shift, with initial delegation to SRI-NIC that year, converting existing hostnames by appending ".arpa" to them, thus providing a structured namespace for these early hosts. Under 920, published in October 1984, .arpa was designated as a temporary exclusively for ARPA-Internet hosts, encompassing the interconnected military and research networks under DARPA's oversight. This domain served to group and organize these entities during the DNS rollout, allowing for delegated administration while other permanent domains were established. The emphasized its provisional nature, stating that "the initial domain selected was called ARPA" and that it would "go out of business as soon as possible" once hosts migrated to appropriate subdomains or new generic domains. This temporary role was critical for maintaining continuity in addressing as DNS replaced the outdated host table system, with the transition mandated for all hosts by March 1984. From its inception, .arpa was managed by the Stanford Research Institute's Information Center (SRI-NIC), which had overseen host registrations since 1972 and played a pivotal role in DNS implementation. SRI-NIC operated the initial DNS root servers and handled name allocations, acting as a catch-all for early addressing before the emergence of generic top-level domains like ., .edu, and . in March 1985. A key milestone occurred with the full transition of the Defense Data Network (DDN) to DNS in 1987, including the transfer of and Autonomous System Number (ASN) management to SRI-NIC in November 1987, underscoring its foundational status in resource coordination.

Evolution and Standardization

Following the decommissioning of the on February 28, 1990, the .arpa (TLD) was retained to support ongoing infrastructure functions, particularly in facilitating the transition from ARPANET host tables and enabling IPv4 reverse address mapping. This retention marked an early shift from its initial temporary purpose, as the domain proved essential for address administration amid the growing DNS ecosystem. By 1994, guidelines in 1591 further outlined the broader DNS structure and delegation principles, indirectly reinforcing .arpa's role within the infrastructure category of TLDs, distinct from generic or country-code domains. In the 2000s, .arpa's management was formalized through key IETF standards, solidifying its permanent status. RFC 3172, published in 2001, established operational requirements and guidelines for the "Address and Routing Parameter Area" domain, renaming it from its ARPANET-associated origins to emphasize its infrastructure focus and placing oversight with the (IAB), IANA, and . This document explicitly addressed the 2000 disassociation by on April 14, 2000, retaining .arpa for critical uses like reverse DNS despite its original temporary designation, as deleting it would disrupt essential mapping dependencies across the . Expansions included the of ip6.arpa in 2001 via RFC 3152 to support IPv6 reverse mappings. Similarly, the use of e164.arpa for ENUM ( to URIs) was decided in 2002 under RFC 3245, with delegations beginning in 2003. The 2010s saw further scope expansions through IAB-approved delegations, emphasizing .arpa's exclusivity for protocol-specific infrastructure. The addition of home.arpa in 2018 via RFC 8375 reserved it for non-unique use in residential networks, updating protocols like the Home Networking Control Protocol to prevent conflicts with global DNS. IAB decisions during this period, including policy updates in RFC 3172 and subsequent oversight, underscored that .arpa delegations required IETF consensus to maintain its specialized, non-commercial nature. Into the 2020s, .arpa has undergone no retirements, continuing its adaptation to emerging protocols without altering its foundational role. As of November 2025, the IETF draft for eap.arpa (draft-ietf-emu-eap-arpa), approved by the IESG in September 2025, proposes a new subdomain for (EAP) provisioning, allowing peers to signal limited-time credentials in authentication scenarios while adhering to .arpa's constraints. This evolution reflects .arpa's transformation from a transitional to an indispensable, standards-driven backbone for addressing and parameter management.

Key Subdomains

in-addr.arpa

The in-addr.arpa domain was established in November 1987 as part of the (DNS) specification to enable reverse mapping of IPv4 addresses to domain names, supporting essential functions such as gateway location and host identification. This subdomain facilitates the resolution of an IP address back to its corresponding , which is crucial for network diagnostics, security checks, and protocol operations that rely on verified address-to-name associations. Unlike forward DNS, which maps names to addresses, in-addr.arpa inverts this process to ensure efficient and hierarchical delegation of reverse zones. The structure of in-addr.arpa involves reversing the octets of an IPv4 address and appending the subdomain, with Pointer (PTR) resource records used to link the resulting domain name to the actual hostname. For example, the IP address 192.0.2.1 translates to 1.2.0.192.in-addr.arpa, where a PTR record might point to a hostname like example-host.domain.com. This reversal allows for natural delegation along network boundaries, mirroring the hierarchical nature of IP addressing. Zones within in-addr.arpa are typically delegated by IP address class or block, such as 10.in-addr.arpa for the entire 10.0.0.0/8 private network range, enabling administrators to manage reverse lookups for specific address spaces autonomously. Management of in-addr.arpa falls under the oversight of the (IANA), which delegates subzones to Regional Internet Registries (RIRs) based on their IPv4 address allocations. For instance, handles delegations for address blocks in the region, ensuring that reverse zones align with forward address assignments. This system supports the full IPv4 of over 4.3 billion potential addresses, with delegations for large blocks (e.g., /8 or /16 networks) following traditional class-based methods, while smaller or classless blocks use techniques like CNAME chaining for flexible sub-delegation. Common operational challenges in in-addr.arpa include incomplete or misconfigured delegations, which often result in NXDOMAIN (non-existent domain) errors during reverse lookups, affecting approximately 0.4% of queries across measured IPv4 space. These errors arise from issues like absent PTR records after CNAME delegations or unenforced policies in certain RIR regions, leading to resolution failures. Proper reverse mappings via in-addr.arpa are vital for applications such as SMTP, where they aid in sender verification to mitigate , and for rules that enforce access controls based on resolved hostnames.

ip6.arpa

The ip6.arpa subdomain serves as the designated domain for reverse DNS mapping of addresses, enabling the translation of 128-bit addresses back to domain names via PTR records. It was first introduced in RFC 1886 in October 1995 as part of early DNS extensions to support , with the domain specified as ip6.int initially, but this was later updated and standardized under ip6.arpa in RFC 3596 in October 2003, which obsoleted the prior specification and aligned it with broader DNS support including records for forward lookups. The reverse mapping in ip6.arpa employs a scheme where the is divided into 4-bit nibbles ( digits), reversed in order from least significant to most significant, and concatenated with dots to form a under ip6.arpa. This nibble-based approach accommodates the 128-bit length of addresses, resulting in 32 labels. For example, the 2001:db8::1 (expanded as 2001:0db8:0000:0000:0000:0000:0000:0001) reverses to 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa, allowing a PTR record to resolve to the corresponding . The ip6.arpa zone is delegated by IANA to Regional Internet Registries (RIRs) such as ARIN, , , and others for the blocks they manage, typically at /96 boundaries or larger to align with allocation policies and delegation practices. This structure supports efficient PTR record queries for addresses, particularly in dual-stack networks where records provide forward resolution and PTR records under ip6.arpa enable reverse lookups to verify hostnames and enhance protocols like SMTP validation. As of November 2025, adoption of ip6.arpa has grown in tandem with global , which reached approximately 45% of users accessing services over , though persistent reliance on legacy IPv4 infrastructure continues to limit full-scale reverse mapping utilization in mixed environments.

e164.arpa

The e164.arpa subdomain serves as the designated namespace within the .arpa for the ENUM (E.164 Number Mapping) protocol, facilitating the translation of international public numbers defined by Recommendation into Internet resources such as uniform resource identifiers (URIs) via the (DNS). Delegated in 2002 by the (IAB) in accordance with operational decisions outlined in 3245, e164.arpa establishes a hierarchical structure under its root zone, with subzones delegated based on country codes—for instance, 1.e164.arpa corresponds to the covering +1 numbers. This delegation ensures a globally unique, stable infrastructure for number resolution without overlapping with general-purpose DNS domains. Resolution within e164.arpa operates by converting an E.164-formatted telephone number into a DNS through digit reversal and suffix addition, followed by retrieval of service-specific mappings. For the example number +44-20-1234-5678 (a UK-based line), the process removes the leading "+", reverses the remaining digits to form 876543210244, separates them with dots as labels (8.7.6.5.4.3.2.1.0.2.4.4.e164.arpa), and queries the DNS for NAPTR records at that . These NAPTR records, defined in the Dynamic Delegation Discovery System (DDDS) framework, enumerate available services (e.g., for VoIP or ) and their associated URIs, allowing clients to select and connect to the appropriate endpoint based on preferences like protocol or priority. This mechanism supports seamless integration between traditional and (IP)-based communications. Management of e164.arpa is a collaborative effort led by the , which coordinates with national authorities responsible for numbering plans to authorize delegations and ensure compliance with standards. The Telecommunication (TSB) reviews requests from member states or integrated numbering entities, approving subzone delegations only after verifying with allocations, as detailed in ITU-T Supplement 4. Technically, the operates the e164.arpa zone as the IAB-designated sponsor, handling DNS infrastructure, operations, and updates in line with IAB instructions. Privacy considerations in e164.arpa implementations focus on mitigating risks from public DNS exposure of user-associated URIs, such as unauthorized to contact details or presence information. These issues are addressed in RFC 5067, which specifies requirements for infrastructure ENUM to enforce controls, anonymization techniques, and end-user consent mechanisms, ensuring that sensitive mappings remain protected even in shared namespaces. As of , ENUM via e164.arpa has been trialed and partially deployed in several countries to support VoIP routing and related services, enabling between PSTNs and networks, though adoption is fragmented due to varying national regulations and limited end-user participation.

home.arpa

The home.arpa subdomain was reserved in May 2018 by RFC 8375 as a special-use domain specifically for non-unique naming in residential s, ensuring it operates without global delegation or DNSSEC trust anchors to maintain significance. This designation aligns with the guidelines in RFC 6761 for special-use domains, preventing any authoritative servers outside the from responding to queries and thereby avoiding unintended leakage of information to public DNS resolvers. The domain's design addresses previous issues with unofficial local namespaces like .home, which had caused query floods to root servers due to accidental forwarding. Names under home.arpa support both flat and hierarchical structures for local devices and services, such as laptop.home.arpa or printer.[kitchen](/page/Kitchen).home.arpa, allowing flexible organization within a . Resolution occurs exclusively via local DNS resolvers configured within the , using standard DNS protocols as defined in 1035, with queries strictly prohibited from being forwarded upstream to prevent exposure. While primarily DNS-based, some implementations may incorporate (mDNS) as a complementary mechanism for in environments lacking a central resolver, though this is not mandated by the RFC. RFC 8375 updates the Home Networking Control Protocol (HNCP), specified in 7788, to adopt home.arpa as the default domain for automated naming and in distributed home networks, building on the underlying Distributed Node Consensus Protocol from 7787. This integration facilitates plug-and-play configuration for devices, with support implemented in various modern systems, including Linux-based routers like those running firmware and partial integration in macOS for specific protocols such as networking in ecosystems. In IPv6-dominant home environments, home.arpa helps resolve naming conflicts arising from unique local addresses (ULAs) or multiple subnets, enabling consistent device identification without relying on insecure or colliding unofficial domains. It promotes better interoperability in smart home setups by standardizing local resolution, though adoption remains gradual as of 2025. However, limitations include the mandatory presence of a local DNS resolver for functionality and the absence of built-in support for reverse DNS mappings (PTR records), which must be handled separately if needed within the local zone.

References

  1. [1]
    .ARPA Domain
    The .arpa domain is the “Address and Routing Parameter Area” domain and is designated to be used exclusively for Internet-infrastructure purposes.Missing: history | Show results with:history
  2. [2]
    RFC 3172 - Management Guidelines & Operational Requirements ...
    This memo describes the management and operational requirements for the address and routing parameter area ("arpa") domain.
  3. [3]
    None
    ### Summary of .arpa Domain from RFC 920
  4. [4]
    None
    ### Summary of .arpa and TLDs Introduction and Timeline (RFC 920, October 1984)
  5. [5]
    Report on Establishment of the .name Top-Level Domain
    This report gives the findings and conclusions of the IANA on the establishment of the .name top-level domain (TLD).Missing: definition | Show results with:definition
  6. [6]
  7. [7]
    [PDF] The IANA Functions - Internet Assigned Numbers Authority
    ARPA top-level domain houses various sub-domains that are used for Internet infrastructure purposes. ICANN administers the .ARPA domain in line with the policy.<|separator|>
  8. [8]
    [PDF] Version Control - The Number Resource Organization
    Jan 8, 2015 · The IANA Operator will delegate subdomains below the IN-ADDR.ARPA and IP6.ARPA domains in accordance with the allocation of IPv4 and IPv6 ...
  9. [9]
    The eap.arpa. domain and EAP provisioning - IETF
    Sep 4, 2025 · This document defines the eap.arpa. · This document updates RFC5216 and RFC9190 to define an unauthenticated provisioning method.
  10. [10]
  11. [11]
    RFC 3596: DNS Extensions to Support IP Version 6
    ### Summary of IP6.ARPA Reverse Mapping for IPv6 (RFC 3596)
  12. [12]
    Reverse DNS - American Registry for Internet Numbers - ARIN
    The reverse DNS database is rooted under two specific domains: in-addr.arpa for IPv4, and ip6.arpa for IPv6. Each IP address associated with a domain has a ...
  13. [13]
    RFC 5855: Nameservers for IPv4 and IPv6 Reverse Zones
    This document specifies a dedicated and stable set of nameserver names for each of the IN-ADDR.ARPA and IP6.ARPA zones.
  14. [14]
    RFC 6116 - The E.164 to Uniform Resource Identifiers (URI ...
    This document discusses the use of the Domain Name System (DNS) for storage of data associated with E.164 numbers, and for resolving those numbers into URIs.
  15. [15]
    [PDF] itu-t supplement to rec. e.164
    e164.TLD. ENUM Tier 0 Manager. The entity responsible for the management of the domain for the. ENUM Root Level.
  16. [16]
    What is ENUM - Telephone number mapping ENUM in VoIP - 3CX
    Jul 4, 2025 · It is a simple four letter acronym representing a monumental idea: being able to use the same phone number no matter where in the world you are.
  17. [17]
    RFC 8375: Special-Use Domain 'home.arpa.'
    'home.arpa.' is designated for non-unique use in residential home networks. The Home Networking Control Protocol (HNCP) is updated to use the 'home.arpa.' ...Missing: history | Show results with:history
  18. [18]
    RFC 7788: Home Networking Control Protocol
    HNCP is an extensible protocol for home networks, enabling network border discovery, address configuration, and service discovery, based on DNCP.<|control11|><|separator|>
  19. [19]
    Use .home.arpa as default TLD for local network - OpenWrt Forum
    Jul 7, 2023 · RFC 8375 designated .home.arpa as the standard TLD for home networks. It makes sense because, according to this article: Routers and Domain Name System (DNS) ...
  20. [20]
    RFC 3405 - Dynamic Delegation Discovery System (DDDS) Part Five
    ... URI.ARPA' DNS zone. Since a URN is a URI scheme, a hint for resolution of the URI prefix 'urn:' will also be stored in the 'URI.ARPA' zone. This rule states ...
  21. [21]
  22. [22]
  23. [23]
    RFC 8958 - Updated Registration Rules for URI.ARPA
    This document updates RFC 3405 by removing references to the IETF tree from the procedures for requesting that a URI scheme be inserted into the URI.ARPA zone.Missing: 7487 | Show results with:7487
  24. [24]
    RFC 4698: IRIS: An Address Registry (areg) Type for the Internet ...
    ... IANA will create a new second level domain under .arpa called iris (i.e., iris.arpa.). The contents of this new domain are to be under the control of the IAB.
  25. [25]
    [PDF] The Creation and Administration of Unique Identifiers, 1967-2017
    This section explains the origins and creation of unique identifiers for the Arpanet and the ... required all Internet hosts to operate on the .arpa domain, and ...<|control11|><|separator|>
  26. [26]
    Domain names and the Network Information Center - SRI International
    Jul 17, 1970 · ... Network Information Center (NIC), managed by SRI from 1970 until 1991. The NIC was the information hub first for the ARPANET (the small network ...
  27. [27]
    THE HISTORY OF THE TOP LEVEL DOMAIN NAMES
    Mar 28, 2010 · From as far back as 1971 the Arpanet Network Information Center (NIC) at Stanford Research Institute (now SRI International or SRI), located in ...
  28. [28]
    ARPANET | DARPA
    The foundation of the current internet started taking shape in 1969 with the activation of the four-node network, known as ARPANET, and matured over two decades ...
  29. [29]
    RFC 1591 - Domain Name System Structure and Delegation
    This memo provides some information on the structure of the names in the Domain Name System (DNS), specifically the top-level domain names; and on the ...Missing: .arpa
  30. [30]
    RFC 3596 - DNS Extensions to Support IP Version 6
    RFC 3596 defines DNS changes to support IPv6, including a new resource record type and a domain for IPv6 lookups.
  31. [31]
  32. [32]
    RFC 2317 - Classless IN-ADDR.ARPA delegation - IETF Datatracker
    RFC 2317 describes IN-ADDR.ARPA delegation on non-octet boundaries for address spaces under 256, enabling smaller IP chunks and removing reverse zone issues.
  33. [33]
    [PDF] A Comprehensive Characterization of IN-ADDR.ARPA Deployment
    Dec 14, 2023 · in-addr.arp or inaddr.arpa. Interestingly, the high NXDOMAIN percentages within the AFRINIC region may be due to the absence of lame delegation ...
  34. [34]
    RFC 3152: Delegation of IP6.ARPA
    This document discusses the need for delegation of the IP6.ARPA DNS zone, and specifies a plan for the technical operation thereof.
  35. [35]
    RFC 8501 - Reverse DNS in IPv6 for Internet Service Providers
    This document analyzes different approaches and considerations for ISPs in managing the IP6.ARPA zone.
  36. [36]
    IPv6 Adoption - Google
    IPv6 Adoption ... The graph shows the percentage of users that access Google over IPv6. Native: 44.51% 6to4/Teredo: 0.00% Total IPv6: 44.51% | Oct 27, 2025.
  37. [37]
    RFC 3245 - The History and Context of Telephone Number Mapping ...
    ... E164.ARPA some additional requirements were felt by the IAB to be important. Organizations that operate core services such as IN- ADDR.ARPA and E164.ARPA ...
  38. [38]
    RFC 2916 - E.164 number and DNS - IETF Datatracker
    RFC 2916 discusses using DNS to store E.164 numbers, using the domain 'e164.arpa' and NAPTR records to identify services.
  39. [39]
    IAB Instructions for operation of the domain e164.arpa - RIPE NCC
    1.1 A request for a delegation is to be sent to the RIPE NCC, to an email address that the RIPE NCC will define [3.1]. The request is to follow a template ...
  40. [40]
    RFC 5067 - Infrastructure ENUM Requirements - IETF Datatracker
    Some parties have expressed concern that an infrastructure ENUM could compromise end user privacy by making it possible for others to identify unlisted or ...
  41. [41]
    RFC 8375: Special-Use Domain 'home.arpa.'
    **Summary of RFC 8375 - Special-Use Domain 'home.arpa.'**
  42. [42]
  43. [43]
    RFC 7788 - Home Networking Control Protocol - IETF Datatracker
    HNCP is a protocol based on DNCP [RFC7787] and includes a DNCP profile that ... Barth, "Distributed Node Consensus Protocol", RFC 7787, DOI 10.17487 ...
  44. [44]
    What is openthread.thread.home.arpa on Mac Network? - OSXDaily
    Aug 12, 2023 · openthread.thread.home.arpa is something known as a Thread Border Router. A Thread Border Router (TBR) is basically a bridge between devices on a smart home ...<|control11|><|separator|>