Since we are dealing in TLS certificates,
the easiest thing is to have copernicus sync
time. It is not as robust as ntp,
but it'll do as a stopgap
until the real time utilities
kick in.
In a later phase, we will want assurances
that the neighbor table was populated.
Since here we have the sockaddr handy,
it makes a lot of sense to take the
opportunity to blind fire a packet back.
No reply is expected, just enough to
trigger arp/neighbor solicitation.