<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.14 (Ruby 3.1.2) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ntp-ntpv5-requirements-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="NTPv5 use cases and requirements">NTPv5 use cases and requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-ntpv5-requirements-00"/>
    <author initials="J." surname="Gruessing" fullname="James Gruessing">
      <organization>Nederlandse Publieke Omroep</organization>
      <address>
        <postal>
          <country>Netherlands</country>
        </postal>
        <email>james.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2022" month="July" day="25"/>
    <area>Internet</area>
    <workgroup>Network Time Protocol</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the use cases, requirements, and considerations that
should be factored in the design of a successor protocol to supersede version 4
of the NTP protocol <xref target="RFC5905"/> presently referred to as NTP version 5
("NTPv5"). This document is non-exhaustive and does not in its current version
represent working group consensus.</t>
    </abstract>
    <note>
      <name>Note to Readers</name>
      <t><em>RFC Editor: please remove this section before publication</em></t>
      <t>Source code and issues for this draft can be found at
<eref target="https://github.com/fiestajetsam/draft-gruessing-ntp-ntpv5-requirements">https://github.com/fiestajetsam/draft-gruessing-ntp-ntpv5-requirements</eref>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>NTP version 4 <xref target="RFC5905"/> has seen active use for over a decade, and within
this time period the protocol has not only been extended to support new
requirements but has also fallen victim to vulnerabilities that have been used
for distributed denial of service (DDoS) amplification attacks.</t>
      <section anchor="notational-conventions">
        <name>Notational Conventions</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="use-cases-and-existing-deployments-of-ntp">
      <name>Use cases and existing deployments of NTP</name>
      <t>There are several common scenarios for existing NTPv4 deployments: publicly
accessible NTP services such as the NTP Pool <xref target="ntppool"/> are used to offer clock
synchronisation for end users and embedded devices, ISP-provided servers are used to
synchronise devices such as customer-premises equipment where reduced accuracy
may be tolerable. Depending on the network and path these deployments may be
affected by variable latency as well as throttling or blocking by providers.</t>
      <t>Data centres and cloud computing providers also have deployed and offer NTP
services both for internal use and for customers, particularly where the network
is unable to offer or does not require PTP <xref target="IEEE-1588-2008"/>. As these
deployments are less likely to be constrained by network latency or power the
potential for higher levels of accuracy and precision within the bounds of the
protocol are possible.</t>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>At a high level, NTPv5 should be a protocol that is capable of operating in
local networks and over public internet connections where packet loss,
delay, and filtering may occur. It should be able to provide enough
information for both basic time information and synchronisation.</t>
      <section anchor="resource-management">
        <name>Resource management</name>
        <t>Historically there have been many documented instances of NTP servers receiving
large amounts of unauthorised traffic <xref target="ntp-misuse"/> and the design of NTPv5
must ensure the risk of these can be minimised.</t>
        <t>Servers SHOULD have a new identifier that peers use as reference, this SHOULD
NOT be a FQDN, an IP address, or an identifier tied to a public certificate. Servers
SHOULD be able to migrate and change their identifiers as stratum topologies or
network configuration changes occur.</t>
        <t>The protocol MUST have the capability for servers to notify clients that the
service is unavailable, and clients MUST have clearly defined behaviours for
honouring this signalling. In addition servers SHOULD be able to communicate to
clients that they should reduce their query rate when the server is
under high load or has reduced capacity.</t>
        <t>Clients SHOULD periodically re-establish connections with servers to prevent
attempting to maintain connectivity to a dead host and give network operators
the ability to move traffic away from hosts in a timely manner.</t>
        <t>The protocol SHOULD have provisions for deployments where Network Address
Translation occurs, and define behaviours when NAT rebinding occurs. This should
also not compromise any DDoS mitigation(s) that the protocol may define.</t>
      </section>
      <section anchor="algorithms">
        <name>Algorithms</name>
        <t>The use of algorithms describing functions such as clock filtering, selection,
and clustering SHOULD have agility, allowing for implementations to develop and
deploy new algorithms independently. Signalling of algorithm use or preference
SHOULD NOT be transmitted by servers.</t>
        <t>The working group should consider creating a separate informational document to
describe an algorithm to assist with implementation, and consider adopting
future documents which describe new algorithms as they are developed. Specifying
client algorithms separately from the protocol will allow NTPv5 to meet
the needs of applications with a variety of network properties and performance
requirements.</t>
      </section>
      <section anchor="timescales">
        <name>Timescales</name>
        <t>The protocol SHOULD adopt a linear, monotonic timescale as the basis for
communicating time. The format should provide sufficient scale, precision, and
resolution to meet or exceed NTPv4's capabilties, and have a rollover date
sufficiently far into the future that the protocol's complete
obsolescence is likely to occur first.</t>
        <t>The timescale, in addition to any other time-sensitive information, MUST be
sufficient to calculate representations of both UTC and TAI. Through extensions
the protocol SHOULD support additional timescale representations outside of the
main specification, and all transmissions of time data SHALL indicate the
timescale in use.</t>
      </section>
      <section anchor="leap-seconds">
        <name>Leap seconds</name>
        <t>Tranmission of UTC leap second information MUST be included in the protocol in
order for clients to generate a UTC representation, but must be transmitted as
separate information to the timescale. The specification SHOULD be capable
of transmitting upcoming leap seconds greater than 1 calendar day in advance.</t>
        <t>Leap second smearing SHOULD NOT be applied to timestamps transmitted by the
server, however this should not prevent implementers from applying leap second
smearing between the client and any clock it is training.</t>
      </section>
      <section anchor="backwards-compatibility-with-nts-and-ntpv4">
        <name>Backwards compatibility with NTS and NTPv4</name>
        <t>The desire for compatibility with older protocols should not prevent addressing
deployment issues or cause ossification of the protocol.</t>
        <t>The model for backward compatibility is: servers that support multiple versions
of NTP must send a response in the same version as the request. This does not
preclude servers from acting as a client in one version of NTP and
a server in another.</t>
        <t>Protocol ossification MUST be addressed to prevent existing NTPv4
deployments which respond incorrectly to clients posing as NTPv5 from causing
issues. Forward prevention of ossification (for a potential NTPv6 protocol in
the future) should also be taken into consideration.</t>
        <section anchor="dependent-specifications">
          <name>Dependent Specifications</name>
          <t>Many other documents make use of NTP's data formats (<xref target="RFC5905"/> Section 6) for
representing time, notably for media and packet timestamp measurements. Any
changes to the data formats should consider the potential implementation
complexity that may be incurred.</t>
        </section>
      </section>
      <section anchor="extensibility">
        <name>Extensibility</name>
        <t>The protocol MUST have the capability to be extended; implementations
MUST ignore unknown extensions. Unknown extensions received by a server from a
lower stratum server SHALL not be added to response messages sent by the server
receiving these extensions.</t>
      </section>
      <section anchor="security">
        <name>Security</name>
        <t>Data authentication and optional data confidentiality MUST be integrated into
the protocol, and downgrade attacks by an in-path attacker must be mitigated.</t>
        <t>Cryptographic agility must be supported, allowing for more secure cryptographic
primitives to be incorporated as they are developed and as
attacks and vulnerabilities with incumbent primitives are discovered.</t>
        <t>Intermediate devices such as hardware capable of performing timestamping of
packets SHOULD be able to add information to packets in flight without
requiring modification or removal of authentication or confidentiality on the
packet.</t>
        <t>Consideration must be given to how this will be incorporated into any
applicable trust model. Downgrading attacks that could lead to an adversary
disabling or removing encryption or authentication MUST NOT be possible in the
design of the protocol.</t>
      </section>
    </section>
    <section anchor="non-requirements">
      <name>Non-requirements</name>
      <t>This section covers topics that are explicitly out of scope.</t>
      <section anchor="server-malfeasence-detection">
        <name>Server malfeasence detection</name>
        <t>Detection and reporting of server malfeasance should remain out of scope as
<xref target="I-D.ietf-ntp-roughtime"/> already provides this capability as a core
functionality of the protocol.</t>
      </section>
    </section>
    <section anchor="threat-model">
      <name>Threat model</name>
      <t>The assumptions that apply to all of the threats and risks within this section
are based on observations of the use cases defined earlier in this document, and
focus on external threats outside of the trust boundaries which may be in place
within a network. Internal threats and risks such as a trusted operator are out
of scope.</t>
      <section anchor="delay-based-attacks">
        <name>Delay-based attacks</name>
        <t>The risk that an on-path attacker can delay packets between a client and server
exists in all time protocols operating on insecure networks and its mitigations
within the protocol are limited for a clock which is not yet synchronised.
Increased path diversity and protocol support for synchronisation across
multiple heterogeneous sources are likely the most effective mitigations.</t>
      </section>
      <section anchor="payload-manipulation">
        <name>Payload manipulation</name>
        <t>Conversely, on-path attackers who can manipulate timestamps could also speed up a
client's clock, resulting in drift-related malfunctions and errors such
as premature expiration of certificates on affected hosts. An
attacker may also manipulate other data in flight to disrupt service and cause
de-synchronisation. Message authentication with regular key rotation should mitigate
both of these cases; however consideration should also be made for
hardware-based timestamping.</t>
      </section>
      <section anchor="denial-of-service-and-amplification">
        <name>Denial of Service and Amplification</name>
        <t>NTPv4 has previously suffered from DDoS amplification attacks using a
combination of IP address spoofing and private mode commands used in many NTP
implementations, leading to an attacker being able to direct very large volumes of
traffic to a victim IP address. Current mitigations are
disabling private mode commands and encouraging network
operators to implement BCP 38 <xref target="RFC2827"/>. The NTPv5
protocol specification should reduce the amplification factor in
request/response payload sizes <xref target="drdos-amplification"/> through the use of
padding and consideration of payload data.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests of IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As this document is intended to create discussion and consensus, it introduces
no security considerations of its own.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson">
              <organization/>
            </author>
            <author fullname="D. Senie" initials="D." surname="Senie">
              <organization/>
            </author>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills">
              <organization/>
            </author>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin">
              <organization/>
            </author>
            <author fullname="J. Burbank" initials="J." surname="Burbank">
              <organization/>
            </author>
            <author fullname="W. Kasch" initials="W." surname="Kasch">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet.  This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family.  NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs.  It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required.  It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-ntp-roughtime">
          <front>
            <title>Roughtime</title>
            <author fullname="Aanchal Malhotra">
              <organization>Boston University</organization>
            </author>
            <author fullname="Adam Langley">
              <organization>Google</organization>
            </author>
            <author fullname="Watson Ladd">
              <organization>Sealance, Inc.</organization>
            </author>
            <author fullname="Marcus Dansarie">
	 </author>
            <date day="7" month="June" year="2022"/>
            <abstract>
              <t>   This document specifies Roughtime - a protocol that aims to achieve
   rough time synchronization while detecting servers that provide
   inaccurate time and providing cryptographic proof of their
   malfeasance.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-roughtime-06"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="drdos-amplification" target="https://arxiv.org/abs/1505.07892">
          <front>
            <title>Amplification and DRDoS Attack Defense -- A Survey and New Perspectives</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ntp-misuse" target="https://en.wikipedia.org/wiki/NTP_server_misuse_and_abuse">
          <front>
            <title>NTP server misuse and abuse</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ntppool" target="https://www.ntppool.org">
          <front>
            <title>pool.ntp.org: the internet cluster of ntp servers</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IEEE-1588-2008">
          <front>
            <title>IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The author would like to thank Doug Arnold, Hal Murray, and Paul Gear for
contributions to this document, and would like to acknowledge Daniel Franke,
Watson Ladd, Miroslav Lichvar for their existing documents and ideas. The author
would also like to thank Angelo Moriondo, Franz Karl Achard, and Malcom McLean
for providing the author with motivation.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
