<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.10 (Ruby 3.0.4) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-gruessing-ntp-ntpv5-requirements-05" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.7 -->
  <front>
    <title abbrev="NTPv5 use cases and requirements">NTPv5 use cases and requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-gruessing-ntp-ntpv5-requirements-05"/>
    <author initials="J." surname="Gruessing" fullname="James Gruessing">
      <organization>Nederlandse Publieke Omroep</organization>
      <address>
        <postal>
          <street>Postbus 26444</street>
          <city>Hilversum</city>
          <code>1202 JJ</code>
          <country>Netherlands</country>
        </postal>
        <email>james.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2022" month="May" day="21"/>
    <area>Internet</area>
    <workgroup>Network Time Protocol</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the use cases, requirements, and considerations that
should be factored in the design of a successor protocol to supersede version 4
of the NTP protocol <xref target="RFC5905"/> presently referred to as NTP version 5
("NTPv5"). This document is non-exhaustive and does not in its current version
represent working group consensus.</t>
    </abstract>
    <note>
      <name>Note to Readers</name>
      <t><em>RFC Editor: please remove this section before publication</em></t>
      <t>Source code and issues for this draft can be found at
<eref target="https://github.com/fiestajetsam/draft-gruessing-ntp-ntpv5-requirements">https://github.com/fiestajetsam/draft-gruessing-ntp-ntpv5-requirements</eref>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>NTP version 4 <xref target="RFC5905"/> has seen active use for over a decade, and within
this time period the protocol has not only been extended to support new
requirements but has also fallen victim to vulnerabilities that have been used
for distributed denial of service (DDoS) amplification attacks.</t>
      <section anchor="notational-conventions">
        <name>Notational Conventions</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="use-cases-and-existing-deployments-of-ntp">
      <name>Use cases and existing deployments of NTP</name>
      <t>There are several common scenarios for existing NTPv4 deployments: publicly
accessible NTP services such as the NTP Pool <xref target="ntppool"/> are used to offer clock
synchronisation for end users and embedded devices, ISP-provided servers are used to
synchronise devices such as customer-premises equipment where reduced accuracy
may be tolerable. Depending on the network and path these deployments may be
affected by variable latency as well as throttling or blocking by providers.</t>
      <t>Data centres and cloud computing providers also have deployed and offer NTP
services both for internal use and for customers, particularly where the network
is unable to offer or does not require PTP <xref target="IEEE-1588-2008"/>. As these
deployments are less likely to be constrained by network latency or power the
potential for higher levels of accuracy and precision within the bounds of the
protocol are possible.</t>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>At a high level, NTPv5 should be a protocol that is capable of operating in
local networks and over public internet connections where packet loss,
delay, and filtering may occur. It should be able to provide enough
information for both basic time information and synchronisation.</t>
      <section anchor="resource-management">
        <name>Resource management</name>
        <t>Historically there have been many documented instances of NTP servers receiving
large amounts of unauthorised traffic <xref target="ntp-misuse"/> and the design of NTPv5
must ensure the risk of these can be minimised.</t>
        <t>Servers SHOULD have a new identifier that peers use as reference, this SHOULD
NOT be a FQDN, an IP address, or an identifier tied to a public certificate. Servers
SHOULD be able to migrate and change their identifiers as stratum topologies or
network configuration changes occur.</t>
        <t>The protocol MUST have the capability for servers to notify clients that the
service is unavailable, and clients MUST have clearly defined behaviours for
honouring this signalling. In addition servers SHOULD be able to communicate to
clients that they should reduce their query rate when the server is
under high load or has reduced capacity.</t>
        <t>Clients SHOULD periodically re-establish connections with servers to prevent
attempting to maintain connectivity to a dead host and give network operators
the ability to move traffic away from hosts in a timely manner.</t>
        <t>The protocol SHOULD have provisions for deployments where Network Address
Translation occurs, and define behaviours when NAT rebinding occurs. This should
also not compromise any DDoS mitigation(s) that the protocol may define.</t>
      </section>
      <section anchor="algorithms">
        <name>Algorithms</name>
        <t>The use of algorithms describing functions such as clock filtering, selection,
and clustering SHOULD have agility, allowing for implementations to develop and
deploy new algorithms independently. Signalling of algorithm use or preference
SHOULD NOT be transmitted by servers.</t>
        <t>The working group should consider creating a separate informational document to
describe an algorithm to assist with implementation, and consider adopting
future documents which describe new algorithms as they are developed. Specifying
client algorithms separately from the protocol will allow NTPv5 to meet
the needs of applications with a variety of network properties and performance
requirements.</t>
      </section>
      <section anchor="timescales">
        <name>Timescales</name>
        <t>The protocol SHOULD adopt a linear, monotonic timescale as the basis for
communicating time. The format should provide sufficient scale, precision, and
resolution to meet or exceed NTPv4's capabilties, and have a rollover date
sufficiently far into the future that the protocol's complete
obsolescence is likely to occur first.</t>
        <t>The timescale, in addition to any other time-sensitive information, MUST be
sufficient to calculate representations of both UTC and TAI. Through extensions
the protocol SHOULD support additional timescale representations outside of the
main specification, and all transmissions of time data SHALL indicate the
timescale in use.</t>
      </section>
      <section anchor="leap-seconds">
        <name>Leap seconds</name>
        <t>Tranmission of UTC leap second information MUST be included in the protocol in
order for clients to generate a UTC representation, but must be transmitted as
separate information to the timescale. The specification SHOULD be capable
of transmitting upcoming leap seconds greater than 1 calendar day in advance.</t>
        <t>Leap second smearing SHOULD NOT be applied to timestamps transmitted by the
server, however this should not prevent implementers from applying leap second
smearing between the client and any clock it is training.</t>
      </section>
      <section anchor="backwards-compatibility-with-nts-and-ntpv4">
        <name>Backwards compatibility with NTS and NTPv4</name>
        <t>The desire for compatibility with older protocols should not prevent addressing
deployment issues or cause ossification of the protocol.</t>
        <t>The model for backward compatibility is: servers that support multiple versions
of NTP must send a response in the same version as the request. This does not
preclude servers from acting as a client in one version of NTP and
a server in another.</t>
        <t>Protocol ossification MUST be addressed to prevent existing NTPv4
deployments which respond incorrectly to clients posing as NTPv5 from causing
issues. Forward prevention of ossification (for a potential NTPv6 protocol in
the future) should also be taken into consideration.</t>
        <section anchor="dependent-specifications">
          <name>Dependent Specifications</name>
          <t>Many other documents make use of NTP's data formats (<xref target="RFC5905"/> Section 6) for
representing time, notably for media and packet timestamp measurements. Any
changes to the data formats should consider the potential implementation
complexity that may be incurred.</t>
        </section>
      </section>
      <section anchor="extensibility">
        <name>Extensibility</name>
        <t>The protocol MUST have the capability to be extended; implementations
MUST ignore unknown extensions. Unknown extensions received by a server from a
lower stratum server SHALL not be added to response messages sent by the server
receiving these extensions.</t>
      </section>
      <section anchor="security">
        <name>Security</name>
        <t>Data authentication and optional data confidentiality MUST be integrated into
the protocol, and downgrade attacks by an in-path attacker must be mitigated.</t>
        <t>Cryptographic agility must be supported, allowing for more secure cryptographic
primitives to be incorporated as they are developed and as
attacks and vulnerabilities with incumbent primitives are discovered.</t>
        <t>Intermediate devices such as hardware capable of performing timestamping of
packets SHOULD be able to add information to packets in flight without
requiring modification or removal of authentication or confidentiality on the
packet.</t>
        <t>Consideration must be given to how this will be incorporated into any
applicable trust model. Downgrading attacks that could lead to an adversary
disabling or removing encryption or authentication MUST NOT be possible in the
design of the protocol.</t>
      </section>
    </section>
    <section anchor="non-requirements">
      <name>Non-requirements</name>
      <t>This section covers topics that are explicitly out of scope.</t>
      <section anchor="server-malfeasence-detection">
        <name>Server malfeasence detection</name>
        <t>Detection and reporting of server malfeasance should remain out of scope as
<xref target="I-D.ietf-ntp-roughtime"/> already provides this capability as a core
functionality of the protocol.</t>
      </section>
    </section>
    <section anchor="threat-model">
      <name>Threat model</name>
      <t>The assumptions that apply to all of the threats and risks within this section
are based on observations of the use cases defined earlier in this document, and
focus on external threats outside of the trust boundaries which may be in place
within a network. Internal threats and risks such as a trusted operator are out
of scope.</t>
      <section anchor="delay-based-attacks">
        <name>Delay-based attacks</name>
        <t>The risk that an on-path attacker can delay packets between a client and server
exists in all time protocols operating on insecure networks and its mitigations
within the protocol are limited for a clock which is not yet synchronised.
Increased path diversity and protocol support for synchronisation across
multiple heterogeneous sources are likely the most effective mitigations.</t>
      </section>
      <section anchor="payload-manipulation">
        <name>Payload manipulation</name>
        <t>Conversely, on-path attackers who can manipulate timestamps could also speed up a
client's clock, resulting in drift-related malfunctions and errors such
as premature expiration of certificates on affected hosts. An
attacker may also manipulate other data in flight to disrupt service and cause
de-synchronisation. Message authentication with regular key rotation should mitigate
both of these cases; however consideration should also be made for
hardware-based timestamping.</t>
      </section>
      <section anchor="denial-of-service-and-amplification">
        <name>Denial of Service and Amplification</name>
        <t>NTPv4 has previously suffered from DDoS amplification attacks using a
combination of IP address spoofing and private mode commands used in many NTP
implementations, leading to an attacker being able to direct very large volumes of
traffic to a victim IP address. Current mitigations are
disabling private mode commands and encouraging network
operators to implement BCP 38 <xref target="RFC2827"/>. The NTPv5
protocol specification should reduce the amplification factor in
request/response payload sizes <xref target="drdos-amplification"/> through the use of
padding and consideration of payload data.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests of IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As this document is intended to create discussion and consensus, it introduces
no security considerations of its own.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson">
              <organization/>
            </author>
            <author fullname="D. Senie" initials="D." surname="Senie">
              <organization/>
            </author>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills">
              <organization/>
            </author>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin">
              <organization/>
            </author>
            <author fullname="J. Burbank" initials="J." surname="Burbank">
              <organization/>
            </author>
            <author fullname="W. Kasch" initials="W." surname="Kasch">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet.  This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family.  NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs.  It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required.  It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-ntp-roughtime">
          <front>
            <title>Roughtime</title>
            <author fullname="Aanchal Malhotra">
              <organization>Boston University</organization>
            </author>
            <author fullname="Adam Langley">
              <organization>Google</organization>
            </author>
            <author fullname="Watson Ladd">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Marcus Dansarie">
	 </author>
            <date day="24" month="May" year="2021"/>
            <abstract>
              <t>   This document specifies Roughtime - a protocol that aims to achieve
   rough time synchronization while detecting servers that provide
   inaccurate time and providing cryptographic proof of their
   malfeasance.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-roughtime-05"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="drdos-amplification" target="https://arxiv.org/abs/1505.07892">
          <front>
            <title>Amplification and DRDoS Attack Defense -- A Survey and New Perspectives</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ntp-misuse" target="https://en.wikipedia.org/wiki/NTP_server_misuse_and_abuse">
          <front>
            <title>NTP server misuse and abuse</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ntppool" target="https://www.ntppool.org">
          <front>
            <title>pool.ntp.org: the internet cluster of ntp servers</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IEEE-1588-2008">
          <front>
            <title>IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The author would like to thank Doug Arnold, Hal Murray, and Paul Gear for
contributions to this document, and would like to acknowledge Daniel Franke,
Watson Ladd, Miroslav Lichvar for their existing documents and ideas. The author
would also like to thank Angelo Moriondo, Franz Karl Achard, and Malcom McLean
for providing the author with motivation.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
