<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.19 (Ruby 3.1.3) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ntp-ntpv5-requirements-01" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="NTPv5 use cases and requirements">NTPv5 use cases and requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-ntpv5-requirements-01"/>
    <author initials="J." surname="Gruessing" fullname="James Gruessing">
      <organization>Nederlandse Publieke Omroep</organization>
      <address>
        <postal>
          <country>Netherlands</country>
        </postal>
        <email>james.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="January" day="18"/>
    <area>Internet</area>
    <workgroup>Network Time Protocol</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the use cases, requirements, and considerations that
should be factored in the design of a successor protocol to supersede version 4
of the NTP protocol <xref target="RFC5905"/> presently referred to as NTP version 5
("NTPv5").</t>
    </abstract>
    <note>
      <name>Note to Readers</name>
      <t><em>RFC Editor: please remove this section before publication</em></t>
      <t>Source code and issues for this draft can be found at
<eref target="https://github.com/fiestajetsam/draft-gruessing-ntp-ntpv5-requirements">https://github.com/fiestajetsam/draft-gruessing-ntp-ntpv5-requirements</eref>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>NTP version 4 <xref target="RFC5905"/> has seen active use for over a decade, and within
this time period the protocol has not only been extended to support new
requirements but has also fallen victim to vulnerabilities that have been used
for distributed denial of service (DDoS) amplification attacks. In order to
advance the protocol and address these known issues alongside add capabilities
for future usage this document defines the current known and applicable use
cases in existing NTPv4 deployments and defines requirements for the future.</t>
      <section anchor="notational-conventions">
        <name>Notational Conventions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="use-cases-and-existing-deployments-of-ntp">
      <name>Use cases and existing deployments of NTP</name>
      <t>There are several common scenarios for existing NTPv4 deployments: publicly
accessible NTP services such as the NTP Pool <xref target="ntppool"/> are used to offer clock
synchronisation for end users and embedded devices, ISP-provided servers are used to
synchronise devices such as customer-premises equipment where reduced accuracy
may be tolerable. Depending on the network and path these deployments may be
affected by variable latency as well as throttling or blocking by providers.</t>
      <t>Data centres and cloud computing providers also have deployed and offer NTP
services both for internal use and for customers, particularly where the network
is unable to offer or does not require PTP <xref target="IEEE-1588-2008"/>. As these
deployments are less likely to be constrained by network latency or power the
potential for higher levels of accuracy and precision within the bounds of the
protocol are possible.</t>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>At a high level, NTPv5 should be a protocol that is capable of operating in
local networks and over public internet connections where packet loss,
delay, and filtering may occur. It should be able to provide enough
information for both basic time information and synchronisation.</t>
      <section anchor="resource-management">
        <name>Resource management</name>
        <t>Historically there have been many documented instances of NTP servers receiving
large amounts of unauthorised traffic <xref target="ntp-misuse"/> and the design of NTPv5
must ensure the risk of these can be minimised.</t>
        <t>The protocol's loop avoidance mechanisms <bcp14>SHOULD NOT</bcp14> use identifiers tied to network
topology. In particular, any such mechanism should not rely on any FQDN, IP address
or identifier tied to a public certificate used or owned by the server. Servers
<bcp14>SHOULD</bcp14> be able to migrate and change any identifier used as stratum topologies or
network configuration changes occur.</t>
        <t>An additional identifier mechanism <bcp14>MAY</bcp14> be considered for the purposes of client
allow/deny lists, logging and monitoring. Such a mechanism, when included, <bcp14>SHOULD</bcp14>
be independent of any loop avoidance mechanism, and authenticity requirements
<bcp14>SHOULD</bcp14> be considered.</t>
        <t>The protocol <bcp14>MUST</bcp14> have the capability for servers to notify clients that the
service is unavailable, and clients <bcp14>MUST</bcp14> have clearly defined behaviours for
honouring this signalling. In addition servers <bcp14>SHOULD</bcp14> be able to communicate to
clients that they should reduce their query rate when the server is
under high load or has reduced capacity.</t>
        <t>Clients <bcp14>SHOULD</bcp14> periodically re-establish connections with servers to prevent
attempting to maintain connectivity to a dead host and give network operators
the ability to move traffic away from hosts in a timely manner.</t>
        <t>The protocol <bcp14>SHOULD</bcp14> have provisions for deployments where Network Address
Translation occurs, and define behaviours when NAT rebinding occurs. This should
also not compromise any DDoS mitigation(s) that the protocol may define.</t>
      </section>
      <section anchor="data-minimisation">
        <name>Data Minimisation</name>
        <t>Payload formats <bcp14>SHOULD</bcp14> use the least amount of fields and information where
possible, favouring the use of extensions to transmit optional data. This is
done in part to minimise ongoing use of deprecated fields, in addition to
reducing risks of exposing identifying information of implementations and
deployments.</t>
      </section>
      <section anchor="algorithms">
        <name>Algorithms</name>
        <t>The use of algorithms describing functions such as clock filtering, selection,
and clustering <bcp14>SHOULD</bcp14> have agility, allowing for implementations to develop and
deploy new algorithms independently. Signalling of algorithm use or preference
<bcp14>SHOULD NOT</bcp14> be transmitted by servers.</t>
        <t>The working group should consider creating a separate informational document to
describe an algorithm to assist with implementation, and consider adopting
future documents which describe new algorithms as they are developed. Specifying
client algorithms separately from the protocol will allow NTPv5 to meet
the needs of applications with a variety of network properties and performance
requirements.</t>
      </section>
      <section anchor="timescales">
        <name>Timescales</name>
        <t>The protocol <bcp14>SHOULD</bcp14> adopt a linear, monotonic timescale as the basis for
communicating time. The format should provide sufficient scale, precision, and
resolution to meet or exceed NTPv4's capabilities, and have a rollover date
sufficiently far into the future that the protocol's complete
obsolescence is likely to occur first.</t>
        <t>The timescale, in addition to any other time-sensitive information, <bcp14>MUST</bcp14> be
sufficient to calculate representations of both UTC and TAI <xref target="TF.460-6"/>.
Through extensions the protocol <bcp14>SHOULD</bcp14> support additional timescale
representations outside of the main specification, and all transmissions of time
data <bcp14>SHALL</bcp14> indicate the timescale in use.</t>
      </section>
      <section anchor="leap-seconds">
        <name>Leap seconds</name>
        <t>Transmission of UTC leap second information <bcp14>MUST</bcp14> be included in the protocol in
order for clients to generate a UTC representation, but must be transmitted as
separate information to the timescale. The specification <bcp14>MUST</bcp14> require that
servers transmit upcoming leap seconds greater than 1 calendar day in advance
if that information is known by the server. If the server learns of a leap
second less than 1 calendar day before a leap second event, it will start
transmitting the information immediately.</t>
        <t>Leap second smearing <bcp14>SHOULD NOT</bcp14> be applied to timestamps transmitted by the
server, however this should not prevent implementers from applying leap second
smearing between the client and any clock it is training.</t>
      </section>
      <section anchor="backwards-compatibility-with-nts-and-ntpv4">
        <name>Backwards compatibility with NTS and NTPv4</name>
        <t>The desire for compatibility with older protocols should not prevent addressing
deployment issues or cause ossification of the protocol.</t>
        <t>The model for backward compatibility is: servers that support multiple versions
of NTP must send a response in the same version as the request. This does not
preclude servers from acting as a client in one version of NTP and
a server in another.</t>
        <t>Protocol ossification <bcp14>MUST</bcp14> be addressed to prevent existing NTPv4
deployments which respond incorrectly to clients posing as NTPv5 from causing
issues. Forward prevention of ossification (for a potential NTPv6 protocol in
the future) should also be taken into consideration.</t>
        <section anchor="dependent-specifications">
          <name>Dependent Specifications</name>
          <t>Many other documents make use of NTP's data formats (<xref target="RFC5905"/> Section 6) for
representing time, notably for media and packet timestamp measurements. Any
changes to the data formats should consider the potential implementation
complexity that may be incurred.</t>
        </section>
      </section>
      <section anchor="extensibility">
        <name>Extensibility</name>
        <t>The protocol <bcp14>MUST</bcp14> have the capability to be extended; implementations
<bcp14>MUST</bcp14> ignore unknown extensions. Unknown extensions received by a server from a
lower stratum server <bcp14>SHALL</bcp14> not be added to response messages sent by the server
receiving these extensions.</t>
      </section>
      <section anchor="security">
        <name>Security</name>
        <t>Data authentication and optional data confidentiality <bcp14>MUST</bcp14> be integrated into
the protocol, and downgrade attacks by an in-path attacker must be mitigated.</t>
        <t>Cryptographic agility must be supported, allowing for more secure cryptographic
primitives to be incorporated as they are developed and as
attacks and vulnerabilities with incumbent primitives are discovered.</t>
        <t>Intermediate devices such as hardware capable of performing timestamping of
packets <bcp14>SHOULD</bcp14> be able to add information to packets in flight without
requiring modification or removal of authentication or confidentiality on the
packet.</t>
        <t>Consideration must be given to how this will be incorporated into any
applicable trust model. Downgrading attacks that could lead to an adversary
disabling or removing encryption or authentication <bcp14>MUST NOT</bcp14> be possible in the
design of the protocol.</t>
      </section>
    </section>
    <section anchor="non-requirements">
      <name>Non-requirements</name>
      <t>This section covers topics that are explicitly out of scope.</t>
      <section anchor="server-malfeasance-detection">
        <name>Server malfeasance detection</name>
        <t>Detection and reporting of server malfeasance should remain out of scope as
<xref target="I-D.ietf-ntp-roughtime"/> already provides this capability as a core
functionality of the protocol.</t>
      </section>
    </section>
    <section anchor="threat-model">
      <name>Threat model</name>
      <t>The assumptions that apply to all of the threats and risks within this section
are based on observations of the use cases defined earlier in this document, and
focus on external threats outside of the trust boundaries which may be in place
within a network. Internal threats and risks such as a trusted operator are out
of scope.</t>
      <section anchor="delay-based-attacks">
        <name>Delay-based attacks</name>
        <t>The risk that an on-path attacker can delay packets between a client and server
exists in all time protocols operating on insecure networks and its mitigations
within the protocol are limited for a clock which is not yet synchronised.
Increased path diversity and protocol support for synchronisation across
multiple heterogeneous sources are likely the most effective mitigations.</t>
      </section>
      <section anchor="payload-manipulation">
        <name>Payload manipulation</name>
        <t>Conversely, on-path attackers who can manipulate timestamps could also speed up a
client's clock, resulting in drift-related malfunctions and errors such
as premature expiration of certificates on affected hosts. An
attacker may also manipulate other data in flight to disrupt service and cause
de-synchronisation. Message authentication with regular key rotation should mitigate
both of these cases; however consideration should also be made for
hardware-based timestamping.</t>
      </section>
      <section anchor="denial-of-service-and-amplification">
        <name>Denial of Service and Amplification</name>
        <t>NTPv4 has previously suffered from DDoS amplification attacks using a
combination of IP address spoofing and private mode commands used in many NTP
implementations, leading to an attacker being able to direct very large volumes of
traffic to a victim IP address. Current mitigations are
disabling private mode commands and encouraging network
operators to implement BCP 38 <xref target="RFC2827"/>. The NTPv5
protocol specification should reduce the amplification factor in
request/response payload sizes <xref target="drdos-amplification"/> through the use of
padding and consideration of payload data.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests of IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As this document is intended to create discussion and consensus, it introduces
no security considerations of its own.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson">
              <organization/>
            </author>
            <author fullname="D. Senie" initials="D." surname="Senie">
              <organization/>
            </author>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills">
              <organization/>
            </author>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin">
              <organization/>
            </author>
            <author fullname="J. Burbank" initials="J." surname="Burbank">
              <organization/>
            </author>
            <author fullname="W. Kasch" initials="W." surname="Kasch">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet.  This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family.  NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs.  It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required.  It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-ntp-roughtime">
          <front>
            <title>Roughtime</title>
            <author fullname="Aanchal Malhotra" initials="A." surname="Malhotra">
              <organization>Boston University</organization>
            </author>
            <author fullname="Adam Langley" initials="A." surname="Langley">
              <organization>Google</organization>
            </author>
            <author fullname="Watson Ladd" initials="W." surname="Ladd">
              <organization>Sealance, Inc.</organization>
            </author>
            <author fullname="Marcus Dansarie" initials="M." surname="Dansarie">
         </author>
            <date day="26" month="September" year="2022"/>
            <abstract>
              <t>   This document specifies Roughtime - a protocol that aims to achieve
   rough time synchronization while detecting servers that provide
   inaccurate time and providing cryptographic proof of their
   malfeasance.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-roughtime-07"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="drdos-amplification" target="https://arxiv.org/abs/1505.07892">
          <front>
            <title>Amplification and DRDoS Attack Defense -- A Survey and New Perspectives</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ntp-misuse" target="https://en.wikipedia.org/wiki/NTP_server_misuse_and_abuse">
          <front>
            <title>NTP server misuse and abuse</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ntppool" target="https://www.ntppool.org">
          <front>
            <title>pool.ntp.org: the internet cluster of ntp servers</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IEEE-1588-2008">
          <front>
            <title>IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TF.460-6" target="https://www.itu.int/rec/R-REC-TF.460-6-200202-I/en">
          <front>
            <title>Standard-frequency and time-signal emissions</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The author would like to thank Doug Arnold, Hal Murray, Paul Gear, and David
Venhoek for contributions to this document, and would like to acknowledge Daniel
Franke, Watson Ladd, Miroslav Lichvar for their existing documents and ideas.
The author would also like to thank Angelo Moriondo, Franz Karl Achard, and
Malcom McLean for providing the author with motivation.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
