<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ntp-ntpv5-requirements-02" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="NTPv5 use cases and requirements">NTPv5 use cases and requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-ntpv5-requirements-02"/>
    <author initials="J." surname="Gruessing" fullname="James Gruessing">
      <organization>Nederlandse Publieke Omroep</organization>
      <address>
        <postal>
          <country>Netherlands</country>
        </postal>
        <email>james.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="29"/>
    <area>Internet</area>
    <workgroup>Network Time Protocol</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 49?>

<t>This document describes the use cases, requirements, and considerations that
should be factored in the design of a successor protocol to supersede version 4
of the NTP protocol <xref target="RFC5905"/> presently referred to as NTP version 5
("NTPv5").</t>
    </abstract>
    <note>
      <name>Note to Readers</name>
      <?line 56?>

<t><em>RFC Editor: please remove this section before publication</em></t>
      <t>Source code and issues for this draft can be found at
<eref target="https://github.com/fiestajetsam/draft-gruessing-ntp-ntpv5-requirements">https://github.com/fiestajetsam/draft-gruessing-ntp-ntpv5-requirements</eref>.</t>
    </note>
  </front>
  <middle>
    <?line 63?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>NTP version 4 <xref target="RFC5905"/> has seen active use for over a decade, and within
this time period the protocol has not only been extended to support new
requirements but has also fallen victim to vulnerabilities that have been used
for distributed denial of service (DDoS) amplification attacks. In order to
advance the protocol and address these known issues alongside add capabilities
for future usage this document defines the current known and applicable use
cases in existing NTPv4 deployments and defines requirements for the future.</t>
      <section anchor="notational-conventions">
        <name>Notational Conventions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>Use of time specific terminology used in this document may further be specified
in <xref target="RFC7384"/> or NTP specific terminology and concepts within <xref target="RFC5905"/>.</t>
      </section>
    </section>
    <section anchor="use-cases-and-existing-deployments-of-ntp">
      <name>Use cases and existing deployments of NTP</name>
      <t>There are several common scenarios for existing NTPv4 deployments: publicly
accessible NTP services such as the NTP Pool <xref target="ntppool"/> are used to offer clock
synchronisation for end users and embedded devices, ISP-provided servers are
used to synchronise devices such as customer-premises equipment where reduced
accuracy may be tolerable. Depending on the network and path these deployments
may be affected by variable latency as well as throttling or blocking by
providers.</t>
      <t>Data centres and cloud computing providers also have deployed and offer NTP
services both for internal use and for customers, particularly where the network
is unable to offer or does not require PTP <xref target="IEEE-1588-2019"/>, and where they
may already be familiar with NTP. As these deployments are less likely to be
constrained by network latency or power the potential for higher levels of
accuracy and precision within the bounds of the protocol are possible,
particular through the use of modifications such as the use of bespoke
algorithms.</t>
    </section>
    <section anchor="threat-analysis-and-modeling">
      <name>Threat Analysis and Modeling</name>
      <t>A considerable motivation towards a new version of the protocol is the inclusion
of security primitives such as authentication and encryption to bring the
protocol in-line with current best practices for protocol design.</t>
      <t>There are numerous potential threats to a deployment or network handling traffic
time synchronisation protocols that <xref target="RFC7384"/> section 3 describes, which can
be summarised into three basic groups: Denial of Service (DoS), degradation of
accuracy, and false time, all of which in various forms apply to NTP. However,
not all threats apply specifically to NTP directly, most notable attacks on time
sources (§3.2.10) and L2/L3 DoS Attacks (§3.2.7) as both are outside the scope
of the protocol, and the protocol itself cannot provide much in the way of
mitigations.</t>
      <section anchor="denial-of-service-and-amplification">
        <name>Denial of Service and Amplification</name>
        <t>NTPv4 has previously suffered from DDoS amplification attacks using a
combination of IP address spoofing and private mode commands used in many NTP
implementations, leading to an attacker being able to direct very large volumes
of traffic to a victim IP address. Current mitigations are disabling private
mode commands and encouraging network operators to implement BCP 38 <xref target="RFC2827"/>.
The NTPv5 protocol specification should reduce the amplification factor in
request/response payload sizes <xref target="drdos-amplification"/> through the use of
padding and consideration of payload data, in addition to restricting command
and diagnostic modes which could be exploited.</t>
      </section>
      <section anchor="accuracy-degradation">
        <name>Accuracy Degradation</name>
        <t>The risk that an on-path attacker can delay packets between a client and server
exists in all time protocols operating on insecure networks and its mitigations
within the protocol are limited for a clock which is not yet synchronised.
Increased path diversity and protocol support for synchronisation across
multiple heterogeneous sources are likely the most effective mitigations.</t>
      </section>
      <section anchor="false-time">
        <name>False Time</name>
        <t>Conversely, on-path attackers who can manipulate timestamps could also speed up
a client's clock, resulting in drift-related malfunctions and errors such as
premature expiration of certificates on affected hosts. An attacker may also
manipulate other data in flight to disrupt service and cause de-synchronisation.
Message authentication with regular key rotation should mitigate both of these
cases; however consideration should also be made for hardware-based
timestamping.</t>
      </section>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>At a high level, NTPv5 should be a protocol that is capable of operating in
local networks and over public internet connections where packet loss,
delay, and filtering may occur. It should be able to provide enough
information for both basic time information and synchronisation.</t>
      <section anchor="resource-management">
        <name>Resource management</name>
        <t>Historically there have been many documented instances of NTP servers receiving
large amounts of unauthorised traffic <xref target="ntp-misuse"/> and the design of NTPv5
must ensure the risk of these can be minimised.</t>
        <t>The protocol's loop avoidance mechanisms <bcp14>SHOULD NOT</bcp14> use identifiers tied to
network topology. In particular such mechanism should not rely on any FQDN, IP
address or identifier tied to a public certificate used or owned by the server.
Servers <bcp14>SHOULD</bcp14> be able to migrate and change any identifier used as stratum
topologies or network configuration changes occur.</t>
        <t>An additional identifier mechanism <bcp14>MAY</bcp14> be considered for the purposes of client
allow/deny lists, logging and monitoring. Such a mechanism, when included, <bcp14>SHOULD</bcp14>
be independent of any loop avoidance mechanism, and authenticity requirements
<bcp14>SHOULD</bcp14> be considered.</t>
        <t>The protocol <bcp14>MUST</bcp14> have the capability for servers to notify clients that the
service is unavailable, and clients <bcp14>MUST</bcp14> have clearly defined behaviours for
honouring this signalling. In addition servers <bcp14>SHOULD</bcp14> be able to communicate to
clients that they should reduce their query rate when the server is
under high load or has reduced capacity.</t>
        <t>Clients <bcp14>SHOULD</bcp14> periodically re-establish connections with servers to prevent
attempting to maintain connectivity to a dead host and give network operators
the ability to move traffic away from hosts in a timely manner.</t>
        <t>The protocol <bcp14>SHOULD</bcp14> have provisions for deployments where Network Address
Translation occurs, and define behaviours when NAT rebinding occurs. This should
also not compromise any DDoS mitigation(s) that the protocol may define.</t>
        <t>Client and server protocol modes <bcp14>MUST</bcp14> be supported, and other modes such as
symmetric and broadcast <bcp14>MAY</bcp14> be supported and <bcp14>SHOULD NOT</bcp14> be required by
implementors to implement. Considerations should be made in these modes to
avoid implementations and deployments from vulnerabilities and attacks.</t>
      </section>
      <section anchor="data-minimisation">
        <name>Data Minimisation</name>
        <t>To minimise ongoing use of deprecated fields and exposing identifying
information of implementations and deployments payload formats <bcp14>SHOULD</bcp14> use the
least amount of fields and information where possible, favouring the use of
extensions to transmit optional data.</t>
      </section>
      <section anchor="algorithms">
        <name>Algorithms</name>
        <t>The use of algorithms describing functions such as clock filtering, selection,
and clustering <bcp14>SHOULD</bcp14> have agility, allowing for implementations to develop and
deploy new algorithms independently. Signalling of algorithm use or preference
<bcp14>SHOULD NOT</bcp14> be transmitted by servers.</t>
        <t>The working group should consider creating a separate informational document to
describe an algorithm to assist with implementation, and consider adopting
future documents which describe new algorithms as they are developed. Specifying
client algorithms separately from the protocol will allow NTPv5 to meet
the needs of applications with a variety of network properties and performance
requirements.</t>
      </section>
      <section anchor="timescales">
        <name>Timescales</name>
        <t>The protocol should adopt a linear, monotonic timescale as the basis for
communicating time. The format should provide sufficient scale, precision, and
resolution to meet or exceed NTPv4's capabilities, and have a rollover date
sufficiently far into the future that the protocol's complete obsolescence is
likely to occur first. Ideally it should be similar or identical to the existing
epoch and data model that NTPv4 defines to allow for implementations to more
easily support both versions of the protocol.</t>
        <t>The timescale, in addition to any other time-sensitive information, <bcp14>MUST</bcp14> be
sufficient to calculate representations of both UTC and TAI <xref target="TF.460-6"/>.
Through extensions the protocol <bcp14>SHOULD</bcp14> support additional timescale
representations outside of the main specification, and all transmissions of time
data <bcp14>SHALL</bcp14> indicate the timescale in use.</t>
      </section>
      <section anchor="leap-seconds">
        <name>Leap seconds</name>
        <t>Transmission of UTC leap second information <bcp14>MUST</bcp14> be included in the protocol in
order for clients to generate a UTC representation, but must be transmitted as
separate information to the timescale. The specification <bcp14>MUST</bcp14> require that
servers transmit upcoming leap seconds greater than 1 calendar day in advance
if that information is known by the server. If the server learns of a leap
second less than 1 calendar day before a leap second event, it will start
transmitting the information immediately.</t>
        <t>Smearing of leap seconds <bcp14>SHOULD</bcp14> be supported in the protocol, and the protocol
<bcp14>MUST</bcp14> support servers transmitting both if they are configured to smear leap
seconds and if they are actively doing so. Behaviours for both client and server
in handling leap seconds <bcp14>MUST</bcp14> be part of the specification; in particular how
clients handle multiple servers where some may use leap seconds and others
smearing, that servers should not apply both leap seconds and smearing, as well
as details around smearing timescales.</t>
      </section>
      <section anchor="backwards-compatibility-with-nts-and-ntpv4">
        <name>Backwards compatibility with NTS and NTPv4</name>
        <t>The desire for compatibility with older protocols should not prevent addressing
deployment issues or cause ossification of the protocol.</t>
        <t>Servers that support multiple versions of NTP must send a response in the same
version as the request as the model of backwards compatibility. This does not
preclude servers from acting as a client in one version of NTP and a server in
another.</t>
        <t>Protocol ossification <bcp14>MUST</bcp14> be addressed to prevent existing NTPv4
deployments which respond incorrectly to clients posing as NTPv5 from causing
issues. Forward prevention of ossification (for a potential NTPv6 protocol in
the future) should also be taken into consideration.</t>
        <section anchor="dependent-specifications">
          <name>Dependent Specifications</name>
          <t>Many other documents make use of NTP's data formats (<xref target="RFC5905"/> Section 6) for
representing time, notably for media and packet timestamp measurements. Any
changes to the data formats should consider the potential implementation
complexity that may be incurred.</t>
        </section>
      </section>
      <section anchor="extensibility">
        <name>Extensibility</name>
        <t>The protocol <bcp14>MUST</bcp14> have the capability to be extended; implementations
<bcp14>MUST</bcp14> ignore unknown extensions. Unknown extensions received by a server from a
lower stratum server <bcp14>SHALL</bcp14> not be added to response messages sent by the server
receiving these extensions.</t>
      </section>
      <section anchor="security">
        <name>Security</name>
        <t>Data authentication and optional data confidentiality <bcp14>MUST</bcp14> be integrated into
the protocol, and downgrade attacks by an in-path attacker must be mitigated.
The protocol <bcp14>SHOULD</bcp14> support different mechanisms to support different use cases.</t>
        <t>Cryptographic agility must be supported, allowing for more secure cryptographic
primitives to be incorporated as they are developed and as
attacks and vulnerabilities with incumbent primitives are discovered.</t>
        <t>Intermediate devices such as hardware capable of performing timestamping of
packets <bcp14>SHOULD</bcp14> be able to add information to packets in flight without
requiring modification or removal of authentication or confidentiality on the
packet.</t>
        <t>Consideration must be given to how this will be incorporated into any
applicable trust model. Downgrading attacks that could lead to an adversary
disabling or removing encryption or authentication <bcp14>MUST NOT</bcp14> be possible in the
design of the protocol.</t>
      </section>
    </section>
    <section anchor="non-requirements">
      <name>Non-requirements</name>
      <t>This section covers topics that are explicitly out of scope.</t>
      <section anchor="server-malfeasance-detection">
        <name>Server malfeasance detection</name>
        <t>Detection and reporting of server malfeasance should remain out of scope as
<xref target="I-D.ietf-ntp-roughtime"/> already provides this capability as a core
functionality of the protocol.</t>
      </section>
      <section anchor="additional-time-information-and-metadata">
        <name>Additional time information and metadata</name>
        <t>Previous versions of NTP do not transmit additional time information such as
time zone data or historical leap seconds, and NTPv5 should not explicitly add
support for it by default as existing protocols (e.g. TZDIST <xref target="RFC7808"/>)
already provide mechanisms to do so. This does not prevent however, further
extentions enabling this.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests of IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As this document is intended to create discussion and consensus, it introduces
no security considerations of its own.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC7384">
          <front>
            <title>Security Requirements of Time Protocols in Packet Switched Networks</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>As time and frequency distribution protocols are becoming increasingly common and widely deployed, concern about their exposure to various security threats is increasing. This document defines a set of security requirements for time protocols, focusing on the Precision Time Protocol (PTP) and the Network Time Protocol (NTP). This document also discusses the security impacts of time protocol practices, the performance implications of external security practices on time protocols, and the dependencies between other security services and time synchronization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7384"/>
          <seriesInfo name="DOI" value="10.17487/RFC7384"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-ntp-roughtime">
          <front>
            <title>Roughtime</title>
            <author fullname="Aanchal Malhotra" initials="A." surname="Malhotra">
              <organization>Boston University</organization>
            </author>
            <author fullname="Adam Langley" initials="A." surname="Langley">
              <organization>Google</organization>
            </author>
            <author fullname="Watson Ladd" initials="W." surname="Ladd">
              <organization>Sealance, Inc.</organization>
            </author>
            <author fullname="Marcus Dansarie" initials="M." surname="Dansarie">
         </author>
            <date day="26" month="September" year="2022"/>
            <abstract>
              <t>   This document specifies Roughtime - a protocol that aims to achieve
   rough time synchronization while detecting servers that provide
   inaccurate time and providing cryptographic proof of their
   malfeasance.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-roughtime-07"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7808">
          <front>
            <title>Time Zone Data Distribution Service</title>
            <author fullname="M. Douglass" initials="M." surname="Douglass"/>
            <author fullname="C. Daboo" initials="C." surname="Daboo"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>This document defines a time zone data distribution service that allows reliable, secure, and fast delivery of time zone data and leap-second rules to client systems such as calendaring and scheduling applications or operating systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7808"/>
          <seriesInfo name="DOI" value="10.17487/RFC7808"/>
        </reference>
        <reference anchor="drdos-amplification" target="https://arxiv.org/abs/1505.07892">
          <front>
            <title>Amplification and DRDoS Attack Defense -- A Survey and New Perspectives</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ntp-misuse" target="https://en.wikipedia.org/wiki/NTP_server_misuse_and_abuse">
          <front>
            <title>NTP server misuse and abuse</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ntppool" target="https://www.ntppool.org">
          <front>
            <title>pool.ntp.org: the internet cluster of ntp servers</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IEEE-1588-2019">
          <front>
            <title>IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TF.460-6" target="https://www.itu.int/rec/R-REC-TF.460-6-200202-I/en">
          <front>
            <title>Standard-frequency and time-signal emissions</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 338?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The author would like to thank Doug Arnold, Hal Murray, Paul Gear, and David
Venhoek for contributions to this document, and would like to acknowledge Daniel
Franke, Watson Ladd, Miroslav Lichvar for their existing documents and ideas.
The author would also like to thank Angelo Moriondo, Franz Karl Achard, and
Malcom McLean for providing the author with motivation.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
