<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ntp-ntpv5-requirements-03" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="NTPv5 Use Cases and Requirements">NTPv5 Use Cases and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-ntpv5-requirements-03"/>
    <author initials="J." surname="Gruessing" fullname="James Gruessing">
      <organization>Nederlandse Publieke Omroep</organization>
      <address>
        <postal>
          <country>Netherlands</country>
        </postal>
        <email>james.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="September" day="16"/>
    <area>Internet</area>
    <workgroup>Network Time Protocol</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 56?>

<t>This document describes the use cases, requirements, and considerations that
should be factored in the design of a successor protocol to supersede version 4
of the NTP protocol <xref target="RFC5905"/> presently referred to as NTP version 5
("NTPv5").</t>
    </abstract>
    <note>
      <name>Note to Readers</name>
      <?line 63?>

<t><em>RFC Editor: please remove this section before publication</em></t>
      <t>Source code and issues for this draft can be found at
<eref target="https://github.com/fiestajetsam/draft-gruessing-ntp-ntpv5-requirements">https://github.com/fiestajetsam/draft-gruessing-ntp-ntpv5-requirements</eref>.</t>
    </note>
  </front>
  <middle>
    <?line 70?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>NTP version 4 <xref target="RFC5905"/> has seen active use for over a decade, and within
this time period the protocol has not only been extended to support new
requirements but has also fallen victim to vulnerabilities that have been used
for distributed denial of service (DDoS) amplification attacks. In order to
advance the protocol and address these known issues alongside add capabilities
for future usage this document defines the current known and applicable use
cases in existing NTPv4 deployments and defines requirements for the future.</t>
      <section anchor="notational-conventions">
        <name>Notational Conventions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>Use of time specific terminology used in this document may further be specified
in <xref target="RFC7384"/> or NTP specific terminology and concepts within <xref target="RFC5905"/>.</t>
      </section>
    </section>
    <section anchor="use-cases-and-existing-deployments-of-ntp">
      <name>Use Cases and Existing Deployments of NTP</name>
      <t>There are several common scenarios for existing NTPv4 deployments: publicly
accessible NTP services such as the NTP Pool <xref target="ntppool"/> are used to offer clock
synchronisation for end users and embedded devices, ISP-provided servers are
used to synchronise devices such as customer-premises equipment where reduced
accuracy may be tolerable. Depending on the network and path these deployments
may be affected by variable latency as well as throttling or blocking by
providers.</t>
      <t>Data centres and cloud computing providers have also deployed and offer NTP
services both for internal use and for customers, particularly where the network
is unable to offer or does not require other protocols e.g. PTP
<xref target="IEEE-1588-2019"/>, and where there may already be familiarity with NTP. As
these deployments are less likely to be constrained by network latency or power
the potential for higher levels of accuracy and precision within the bounds of
the protocol are possible, particular through the use of modifications such as
the use of bespoke algorithms.</t>
    </section>
    <section anchor="threat-analysis-and-modeling">
      <name>Threat Analysis and Modeling</name>
      <t>A considerable motivation towards a new version of the protocol is the inclusion
of security primitives such as authentication and encryption to bring the
protocol in-line with current best practices for protocol design.</t>
      <t>There are numerous potential threats to a deployment or network handling traffic
time synchronisation protocols that <xref target="RFC7384"/> section 3 describes, which can
be summarised into three basic groups: Denial of Service (DoS), degradation of
accuracy, and false time, all of which in various forms apply to NTP. However,
not all threats apply specifically to NTP directly, most notable attacks on time
sources (§3.2.10) and L2/L3 DoS Attacks (§3.2.7) as both are outside the scope
of the protocol, and the protocol itself cannot provide much in the way of
mitigations.</t>
      <section anchor="denial-of-service-and-amplification">
        <name>Denial of Service and Amplification</name>
        <t>NTPv4 has previously suffered from DDoS amplification attacks using a
combination of IP address spoofing and private mode commands used in some NTP
implementations, leading to an attacker being able to direct very large volumes
of traffic to a victim IP address. Current mitigations are disabling private
mode commands susceptible to attackes and encouraging network operators to
implement BCP 38 <xref target="RFC2827"/> as well as source address validation where
possible.</t>
        <t>The NTPv5 protocol specification should be designed with current best practices
for UDP based protocols in mind <xref target="RFC8085"/>. It should reduce the potential
amplification factors in request/response payload sizes <xref target="drdos-amplification"/>
through the use of padding of payload data, in addition to restricting command
and diagnostic modes which could be exploited.</t>
      </section>
      <section anchor="accuracy-degradation">
        <name>Accuracy Degradation</name>
        <t>The risk that an on-path attacker can systemically delay packets between a
client and server exists in all time protocols operating on insecure networks
and its mitigations within the protocol are limited for a clock which is not yet
synchronised. Increased path diversity and protocol support for synchronisation
across multiple heterogeneous sources are likely the most effective mitigations.</t>
      </section>
      <section anchor="false-time">
        <name>False Time</name>
        <t>Conversely, on-path attackers who can manipulate timestamps could also speed up
a client's clock resulting in drift-related malfunctions and errors such as
premature expiration of certificates on affected hosts. An attacker may also
manipulate other data in flight to disrupt service and cause de-synchronisation.
Additionally attacks via replaying transmitted packets can also delay or confuse
receiving clocks impacting ongoing synchronisation.</t>
        <t>Message authentication with regular key rotation should mitigate all of these
cases; however deployments should consider finding an appropriate compromise
between the frequency of rotation to balance the window of attack vs rate of
re-keying.</t>
      </section>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>At a high level, NTPv5 should be a protocol that is capable of operating in
local networks and over public internet connections where packet loss,
delay, and filtering may occur. It should be able to provide enough
information for both basic time information and synchronisation.</t>
      <section anchor="resource-management">
        <name>Resource Management</name>
        <t>Historically there have been many documented instances of NTP servers receiving
ongoing large volumes of unauthorised traffic <xref target="ntp-misuse"/> and the design of
NTPv5 must ensure the risk of these can be minimised through the use of
signalling unwanted traffic (e.g Kiss of Death) or easily identifiable packet
formats which make rate-limiting, filtering, or blocking by firewalls possible.</t>
        <t>The protocol's loop avoidance mechanisms <bcp14>SHOULD</bcp14> be able to use identifiers that
change over time and <bcp14>MUST NOT</bcp14> use identifiers tied to network topology. In
particular such mechanism should not rely on any FQDN, IP address or identifier
tied to a public certificate used or owned by the server. Servers <bcp14>SHOULD</bcp14> be
able to migrate and change any identifier used as stratum topologies or network
configuration changes occur.</t>
        <t>An additional identifier mechanism <bcp14>MAY</bcp14> be considered for the purposes of client
allow/deny lists, logging and monitoring. Such a mechanism when included, <bcp14>SHOULD</bcp14>
be independent of any loop avoidance mechanism, and authenticity requirements
<bcp14>SHOULD</bcp14> be considered.</t>
        <t>The protocol <bcp14>MUST</bcp14> have the capability for servers to notify clients that the
service is unavailable and clients <bcp14>MUST</bcp14> have clearly defined behaviours for
honouring this signalling. In addition servers <bcp14>SHOULD</bcp14> be able to communicate to
clients that they should reduce their query rate when the server is
under high load or has reduced capacity.</t>
        <t>Clients <bcp14>SHOULD</bcp14> periodically re-establish connections with servers to prevent
maintaining prolonged connectivity to unavailable hosts and give operators
the ability to move traffic away from hosts in a timely manner.</t>
        <t>The protocol <bcp14>SHOULD</bcp14> have provisions for deployments where Network Address
Translation occurs and define behaviours when NAT rebinding occurs. This should
also not compromise any DDoS mitigation(s) that the protocol may define.</t>
        <t>Client and server protocol modes <bcp14>MUST</bcp14> be supported, and other modes such as
symmetric and broadcast <bcp14>MAY</bcp14> be supported by the protocol but <bcp14>SHOULD NOT</bcp14> be
required by implementers to implement. Considerations should be made in these
modes to avoid implementations and deployments from vulnerabilities and attacks.</t>
      </section>
      <section anchor="data-minimisation">
        <name>Data Minimisation</name>
        <t>To minimise ongoing use of deprecated fields and exposing identifying
information of implementations and deployments, payload formats <bcp14>SHOULD</bcp14> use the
least amount of fields and information where possible. The use of extensions
should be preferred when transmitting optional data.</t>
      </section>
      <section anchor="algorithms">
        <name>Algorithms</name>
        <t>The use of algorithms describing functions such as clock filtering, selection,
and clustering <bcp14>SHOULD</bcp14> have agility, allowing for implementations to develop and
deploy new algorithms independently. Signalling of algorithm use or preference
<bcp14>SHOULD NOT</bcp14> be transmitted by servers, however essential properties of the
algorithm (e.g. precision) <bcp14>SHOULD</bcp14> be obvious.</t>
        <t>The working group should consider creating a separate informational document to
describe an algorithm to assist with implementation, and consider adopting
future documents which describe new algorithms as they are developed. Specifying
client algorithms separately from the protocol will allow NTPv5 to meet
the needs of applications with a variety of network properties and performance
requirements.</t>
      </section>
      <section anchor="timescales">
        <name>Timescales</name>
        <t>The protocol should adopt a linear, monotonic timescale as the basis for
communicating time. The format should provide sufficient scale, precision, and
resolution to meet or exceed NTPv4's capabilities, and have a rollover date
sufficiently far into the future that the protocol's complete obsolescence is
likely to occur first. Ideally it should be similar or identical to the existing
epoch and data model that NTPv4 defines to allow for implementations to better
support both versions of the protocol, allowing for simpler implementations.</t>
        <t>The timescale, in addition to any other time-sensitive information, <bcp14>MUST</bcp14> be
sufficient to calculate representations of both UTC and TAI <xref target="TF.460-6"/>, with
UTC being the current timescale up to NTPv4. Through extensions the protocol
<bcp14>SHOULD</bcp14> support additional timescale representations outside of the main
specification, and all transmissions of time data <bcp14>MUST</bcp14> indicate the timescale in
use.</t>
      </section>
      <section anchor="leap-seconds">
        <name>Leap seconds</name>
        <t>Transmission of UTC leap second information <bcp14>MUST</bcp14> be included in the protocol in
order for clients to generate a UTC representation, but must be transmitted as
separate information to the timescale. The specification <bcp14>MUST</bcp14> require that
servers transmit upcoming leap seconds greater than 24 hours in linear timescale
in advance if that information is known by the server. If the server learns of a
leap second less than 24 hours before an upcoming leap second event, it will
start transmitting the information immediately.</t>
        <t>Smearing <xref target="google-smear"/> of leap seconds <bcp14>SHOULD</bcp14> be supported in the protocol,
and the protocol <bcp14>MUST</bcp14> support servers transmitting information if they are
configured to smear leap seconds and if they are actively doing so. Behaviours
for both client and server in handling leap seconds <bcp14>MUST</bcp14> be part of the
specification; in particular how clients handle multiple servers where some may
use leap seconds and others smearing, that servers should not apply both leap
seconds and smearing, as well as details around smearing timescales. Supported
smearing algorithms <bcp14>MUST</bcp14> be defined or referenced.</t>
      </section>
      <section anchor="backwards-compatibility-with-nts-and-ntpv4">
        <name>Backwards Compatibility with NTS and NTPv4</name>
        <t>The desire for compatibility with older protocols should not prevent addressing
deployment issues or cause ossification of the protocol caused by middleboxes
<xref target="RFC9065"/>.</t>
        <t>Servers that support multiple versions of NTP <bcp14>MUST</bcp14> send a response in the same
version as the request as the model of backwards compatibility. This does not
preclude servers from acting as a client in one version of NTP and a server in
another.</t>
        <t>Protocol ossification <bcp14>MUST</bcp14> be addressed to prevent existing NTPv4
deployments which respond incorrectly to clients posing as NTPv5 from causing
issues. Forward prevention of ossification (for a potential NTPv6 protocol in
the future) should also be taken into consideration.</t>
        <section anchor="dependent-specifications">
          <name>Dependent Specifications</name>
          <t>Many other documents make use of NTP's data formats (<xref target="RFC5905"/> Section 6) for
representing time, notably for media and packet timestamp measurements, such as
SDP <xref target="RFC4566"/> and STAMP <xref target="RFC8762"/>. Any changes to the data formats should
consider the potential implementation complexity that may be incurred.</t>
        </section>
      </section>
      <section anchor="extensibility">
        <name>Extensibility</name>
        <t>The protocol <bcp14>MUST</bcp14> have the capability to be extended; implementations <bcp14>MUST</bcp14>
ignore unknown extensions. Unknown extensions received from a lower stratum
server <bcp14>SHALL NOT</bcp14> be re-transmitted towards higher stratum servers.</t>
      </section>
      <section anchor="security">
        <name>Security</name>
        <t>Data authentication and integrity <bcp14>MUST</bcp14> be supported by the protocol, with
optional support for data confidentiality. Downgrade attacks by an in-path
attacker must be mitigated. The protocol <bcp14>SHOULD</bcp14> support different mechanisms to
support different deployment use cases. Extensions and additional modes <bcp14>SHOULD</bcp14>
also incorporate authentication and integrity on data which could be manipulated
by an attacker, in-path or off-path.</t>
        <t>Upgrading cryptographic algorithms must be supported, allowing for more secure
cryptographic primitives to be incorporated as they are developed and as attacks
and vulnerabilities with incumbent primitives are discovered.</t>
        <t>Intermediate devices such as networking equipment capable of modifying NTP
packets, for example to adjust timestamps <bcp14>MUST</bcp14> be able to do so
without compromising authentication or confidentiality. Extension fields with
separate authentication may be used to facilitate this.</t>
        <t>Consideration must be given to how this will be incorporated into any
applicable trust model. Downgrading attacks that could lead to an adversary
disabling or removing encryption or authentication <bcp14>MUST NOT</bcp14> be possible in the
design of the protocol.</t>
      </section>
    </section>
    <section anchor="non-requirements">
      <name>Non-requirements</name>
      <t>This section covers topics that are explicitly out of scope.</t>
      <section anchor="server-malfeasance-detection">
        <name>Server Malfeasance Detection</name>
        <t>Detection and reporting of server malfeasance should remain out of scope as
<xref target="I-D.ietf-ntp-roughtime"/> already provides this capability as a core
functionality of the protocol.</t>
      </section>
      <section anchor="additional-time-information-and-metadata">
        <name>Additional Time Information and Metadata</name>
        <t>Previous versions of NTP do not transmit additional time information such as
time zone data or historical leap seconds, and NTPv5 should not explicitly add
support for it by default as existing protocols (e.g. TZDIST <xref target="RFC7808"/>)
already provide mechanisms to do so. This does not prevent however, further
extensions enabling this.</t>
      </section>
      <section anchor="remote-monitoring-support">
        <name>Remote Monitoring Support</name>
        <t>Largely due to previous DDoS amplification attacks, mode 6 messages which have
historically provided the ability for monitoring of servers <bcp14>SHOULD NOT</bcp14> be
supported in the core of the protocol, however it may be provided as a separate
extension specification. It is likely that even with a new version of the
protocol middleboxes may continue to block this mode in default configurations
into the future.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests of IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As this document is intended to create discussion and consensus, it introduces
no security considerations of its own.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC7384">
          <front>
            <title>Security Requirements of Time Protocols in Packet Switched Networks</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>As time and frequency distribution protocols are becoming increasingly common and widely deployed, concern about their exposure to various security threats is increasing. This document defines a set of security requirements for time protocols, focusing on the Precision Time Protocol (PTP) and the Network Time Protocol (NTP). This document also discusses the security impacts of time protocol practices, the performance implications of external security practices on time protocols, and the dependencies between other security services and time synchronization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7384"/>
          <seriesInfo name="DOI" value="10.17487/RFC7384"/>
        </reference>
        <reference anchor="RFC8085">
          <front>
            <title>UDP Usage Guidelines</title>
            <author fullname="L. Eggert" initials="L." surname="Eggert"/>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="G. Shepherd" initials="G." surname="Shepherd"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>The User Datagram Protocol (UDP) provides a minimal message-passing transport that has no inherent congestion control mechanisms. This document provides guidelines on the use of UDP for the designers of applications, tunnels, and other protocols that use UDP. Congestion control guidelines are a primary focus, but the document also provides guidance on other topics, including message sizes, reliability, checksums, middlebox traversal, the use of Explicit Congestion Notification (ECN), Differentiated Services Code Points (DSCPs), and ports.</t>
              <t>Because congestion control is critical to the stable operation of the Internet, applications and other protocols that choose to use UDP as an Internet transport must employ mechanisms to prevent congestion collapse and to establish some degree of fairness with concurrent traffic. They may also need to implement additional mechanisms, depending on how they use UDP.</t>
              <t>Some guidance is also applicable to the design of other protocols (e.g., protocols layered directly on IP or via IP-based tunnels), especially when these protocols do not themselves provide congestion control.</t>
              <t>This document obsoletes RFC 5405 and adds guidelines for multicast UDP usage.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="145"/>
          <seriesInfo name="RFC" value="8085"/>
          <seriesInfo name="DOI" value="10.17487/RFC8085"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-ntp-roughtime">
          <front>
            <title>Roughtime</title>
            <author fullname="Aanchal Malhotra" initials="A." surname="Malhotra">
              <organization>Boston University</organization>
            </author>
            <author fullname="Adam Langley" initials="A." surname="Langley">
              <organization>Google</organization>
            </author>
            <author fullname="Watson Ladd" initials="W." surname="Ladd">
              <organization>Sealance, Inc.</organization>
            </author>
            <author fullname="Marcus Dansarie" initials="M." surname="Dansarie">
         </author>
            <date day="26" month="September" year="2022"/>
            <abstract>
              <t>   This document specifies Roughtime - a protocol that aims to achieve
   rough time synchronization while detecting servers that provide
   inaccurate time and providing cryptographic proof of their
   malfeasance.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-roughtime-07"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC4566">
          <front>
            <title>SDP: Session Description Protocol</title>
            <author fullname="M. Handley" initials="M." surname="Handley"/>
            <author fullname="V. Jacobson" initials="V." surname="Jacobson"/>
            <author fullname="C. Perkins" initials="C." surname="Perkins"/>
            <date month="July" year="2006"/>
            <abstract>
              <t>This memo defines the Session Description Protocol (SDP). SDP is intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4566"/>
          <seriesInfo name="DOI" value="10.17487/RFC4566"/>
        </reference>
        <reference anchor="RFC7808">
          <front>
            <title>Time Zone Data Distribution Service</title>
            <author fullname="M. Douglass" initials="M." surname="Douglass"/>
            <author fullname="C. Daboo" initials="C." surname="Daboo"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>This document defines a time zone data distribution service that allows reliable, secure, and fast delivery of time zone data and leap-second rules to client systems such as calendaring and scheduling applications or operating systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7808"/>
          <seriesInfo name="DOI" value="10.17487/RFC7808"/>
        </reference>
        <reference anchor="RFC8762">
          <front>
            <title>Simple Two-Way Active Measurement Protocol</title>
            <author fullname="G. Mirsky" initials="G." surname="Mirsky"/>
            <author fullname="G. Jun" initials="G." surname="Jun"/>
            <author fullname="H. Nydell" initials="H." surname="Nydell"/>
            <author fullname="R. Foote" initials="R." surname="Foote"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This document describes the Simple Two-way Active Measurement Protocol (STAMP), which enables the measurement of both one-way and round-trip performance metrics, like delay, delay variation, and packet loss.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8762"/>
          <seriesInfo name="DOI" value="10.17487/RFC8762"/>
        </reference>
        <reference anchor="RFC9065">
          <front>
            <title>Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="C. Perkins" initials="C." surname="Perkins"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>To protect user data and privacy, Internet transport protocols have supported payload encryption and authentication for some time. Such encryption and authentication are now also starting to be applied to the transport protocol headers. This helps avoid transport protocol ossification by middleboxes, mitigate attacks against the transport protocol, and protect metadata about the communication. Current operational practice in some networks inspect transport header information within the network, but this is no longer possible when those transport headers are encrypted.</t>
              <t>This document discusses the possible impact when network traffic uses a protocol with an encrypted transport header. It suggests issues to consider when designing new transport protocols or features.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9065"/>
          <seriesInfo name="DOI" value="10.17487/RFC9065"/>
        </reference>
        <reference anchor="drdos-amplification" target="https://arxiv.org/abs/1505.07892">
          <front>
            <title>Amplification and DRDoS Attack Defense -- A Survey and New Perspectives</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ntp-misuse" target="https://en.wikipedia.org/wiki/NTP_server_misuse_and_abuse">
          <front>
            <title>NTP server misuse and abuse</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ntppool" target="https://www.ntppool.org">
          <front>
            <title>pool.ntp.org: the internet cluster of ntp servers</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IEEE-1588-2019">
          <front>
            <title>IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TF.460-6" target="https://www.itu.int/rec/R-REC-TF.460-6-200202-I/en">
          <front>
            <title>Standard-frequency and time-signal emissions</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="google-smear" target="https://developers.google.com/time/smear">
          <front>
            <title>Google Leap Smear</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 371?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The author would like to thank Doug Arnold, Hal Murray, Paul Gear, and David
Venhoek for contributions to this document, and would like to acknowledge Daniel
Franke, Watson Ladd, Miroslav Lichvar for their existing documents and ideas.
The author would also like to thank Angelo Moriondo, Franz Karl Achard, and
Malcom McLean for providing the author with motivation.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
