<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ntp-ntpv5-requirements-04" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.1 -->
  <front>
    <title abbrev="NTPv5 Use Cases and Requirements">NTPv5 Use Cases and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-ntpv5-requirements-04"/>
    <author initials="J." surname="Gruessing" fullname="James Gruessing">
      <organization>Nederlandse Publieke Omroep</organization>
      <address>
        <postal>
          <country>Netherlands</country>
        </postal>
        <email>james.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="January" day="25"/>
    <area>Internet</area>
    <workgroup>Network Time Protocol</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 53?>

<t>This document describes the use cases, requirements, and considerations that
should be factored in the design of a successor protocol to supersede version 4
of the NTP protocol presently referred to as NTP version 5 ("NTPv5"). It aims to
define what capabilities and requirements such a protocol possesses, informing
the design of the protocol in addition to capturing any working group consensus
made in development.</t>
    </abstract>
    <note>
      <name>Note to Readers</name>
      <?line 62?>

<t><em>RFC Editor: please remove this section before publication</em></t>
      <t>Source code and issues for this draft can be found at
<eref target="https://github.com/fiestajetsam/draft-gruessing-ntp-ntpv5-requirements">https://github.com/fiestajetsam/draft-gruessing-ntp-ntpv5-requirements</eref>.</t>
    </note>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>NTP version 4 <xref target="RFC5905"/> has seen active use for over a decade, and within
this time period the protocol has not only been extended to support new
requirements but has also fallen victim to vulnerabilities that have been used
for distributed denial of service (DDoS) amplification attacks. In order to
advance the protocol and address these known issues alongside add capabilities
for future usage this document defines the current known and applicable use
cases in existing NTPv4 deployments and defines requirements for the future.</t>
      <section anchor="notational-conventions">
        <name>Notational Conventions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>Use of time specific terminology used in this document may further be specified
in <xref target="RFC7384"/> or NTP specific terminology and concepts within <xref target="RFC5905"/>.</t>
      </section>
    </section>
    <section anchor="use-cases-and-existing-deployments-of-ntp">
      <name>Use Cases and Existing Deployments of NTP</name>
      <t>As a protocol, NTP is used synchronise large amounts of computers via both
private networks and the open internet, and there are several common scenarios
for existing NTPv4 deployments: publicly accessible NTP services such as the NTP
Pool <xref target="ntppool"/> are used to offer clock synchronisation for end users and
embedded devices, ISP-provided servers are used to synchronise devices such as
customer-premises equipment. Depending on the network and path these deployments
may be affected by variable latency as well as throttling or blocking by
providers.</t>
      <t>Data centres and cloud computing providers have also deployed and offer NTP
services both for internal use and for customers, particularly where the network
is unable to offer or does not require the capabilities other protocols can
provide, and where there may already be familiarity with NTP. As these
deployments are less likely to be constrained by network latency or power, the
potential for higher levels of accuracy and precision within the bounds of the
protocol are possible, particularly through the use of modifications such as the
use of bespoke algorithms.</t>
    </section>
    <section anchor="threat-analysis-and-modeling">
      <name>Threat Analysis and Modeling</name>
      <t>A considerable motivation towards a new version of the protocol is the inclusion
of security primitives such as authentication and encryption to bring the
protocol in-line with current best practices for protocol design.</t>
      <t>There are numerous potential threats to a deployment or network handling traffic
time synchronisation protocols that <xref target="RFC7384"/> section 3 describes, which can
be summarised into three basic groups: Denial of Service (DoS), degradation of
accuracy, and false time, all of which in various forms apply to NTP. However,
not all threats apply specifically to NTP directly, most notable attacks on time
sources (section 3.2.10) and L2/L3 DoS Attacks (section 3.2.7) as both are
outside the scope of the protocol, and the protocol itself cannot provide much
in the way of mitigations.</t>
      <section anchor="denial-of-service-and-amplification">
        <name>Denial of Service and Amplification</name>
        <t>NTPv4 has previously suffered from DDoS amplification attacks using a
combination of IP address spoofing and private mode commands used in some NTP
implementations, leading to an attacker being able to direct very large volumes
of traffic to a victim IP address. Current mitigations are disabling private
mode commands susceptible to attacks and encouraging network operators to
implement BCP 38 <xref target="RFC2827"/> as well as source address validation where
possible.</t>
        <t>The NTPv5 protocol specification should be designed with current best practices
for UDP based protocols in mind <xref target="RFC8085"/>. It should reduce the potential
amplification factors in request/response payload sizes <xref target="drdos-amplification"/>
through the use of padding of payload data, in addition to restricting command
and diagnostic modes which could be exploited.</t>
      </section>
      <section anchor="accuracy-degradation">
        <name>Accuracy Degradation</name>
        <t>The risk that an on-path attacker can systemically delay packets between a
client and server exists in all time protocols operating on insecure networks
and its mitigations within the protocol are limited for a clock which is not yet
synchronised. Increased path diversity and protocol support for synchronisation
across multiple heterogeneous sources are likely the most effective mitigations.</t>
      </section>
      <section anchor="false-time">
        <name>False Time</name>
        <t>Conversely, on-path attackers who can manipulate timestamps could also speed up
a client's clock resulting in drift-related malfunctions and errors such as
premature expiration of certificates on affected hosts. An attacker may also
manipulate other data in flight to disrupt service and cause de-synchronisation.
Additionally attacks via replaying previously transmitted packets can also delay
or confuse receiving clocks, impacting ongoing synchronisation.</t>
        <t>Message authentication with regular key rotation should mitigate all of these
cases; however deployments should consider finding an appropriate compromise
between the frequency of rotation to balance the window of attack and the rate
of re-keying.</t>
      </section>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>At a high level, NTPv5 should be a protocol that is capable of operating in
local networks and over public internet connections where packet loss,
delay, and filtering may occur. It should provide both basic time information
and synchronisation.</t>
      <section anchor="resource-management">
        <name>Resource Management</name>
        <t>Historically there have been many documented instances of NTP servers receiving
ongoing large volumes of unauthorised traffic <xref target="ntp-misuse"/> and the design of
NTPv5 must ensure the risk of these can be minimised through the use of
signalling unwanted traffic (e.g Kiss of Death) or easily identifiable packet
formats which make rate-limiting, filtering, or blocking by firewalls possible.</t>
        <t>The protocol's loop avoidance mechanisms <bcp14>SHOULD</bcp14> be able to use identifiers that
change over time. Identifiers <bcp14>MUST NOT</bcp14> relate to network topology, in
particular such mechanism should not rely on any FQDN, IP address or identifier
tied to a public certificate used or owned by the server. Servers <bcp14>SHOULD</bcp14> be
able to migrate and change any identifier used as stratum topologies or network
configuration changes occur.</t>
        <t>An additional identifier mechanism <bcp14>MAY</bcp14> be considered for the purposes of client
allow/deny lists, logging and monitoring. Such a mechanism when included, <bcp14>SHOULD</bcp14>
be independent of any loop avoidance mechanism, and authenticity requirements
<bcp14>SHOULD</bcp14> be considered.</t>
        <t>The protocol <bcp14>MUST</bcp14> have the capability for servers to notify clients that the
service is unavailable and clients <bcp14>MUST</bcp14> have clearly defined behaviours for
honouring this signalling. In addition servers <bcp14>SHOULD</bcp14> be able to communicate to
clients that they should reduce their query rate when the server is
under high load or has reduced capacity.</t>
        <t>Clients <bcp14>SHOULD</bcp14> periodically re-establish connections with servers to prevent
maintaining prolonged connectivity to unavailable hosts and give operators
the ability to move traffic away from hosts in a timely manner.</t>
        <t>The protocol <bcp14>SHOULD</bcp14> have provisions for deployments where Network Address
Translation occurs and define behaviours when NAT rebinding occurs. This should
also not compromise any DDoS mitigation(s) that the protocol may define.</t>
        <t>Client and server protocol modes <bcp14>MUST</bcp14> be supported. Other modes such as
symmetric and broadcast <bcp14>MAY</bcp14> be supported by the protocol but <bcp14>SHOULD NOT</bcp14> be
required by implementers to implement. Considerations should be made in these
modes to avoid implementation vulnerabilities and to protect deployments from
attacks.</t>
      </section>
      <section anchor="data-minimisation">
        <name>Data Minimisation</name>
        <t>To minimise ongoing use of deprecated fields and exposing identifying
information of implementations and deployments, payload formats <bcp14>SHOULD</bcp14> use the
least amount of fields and information where possible, realising that data
minimisation and resource management can be at odds with one another. The use of
extensions should be preferred when transmitting optional data.</t>
      </section>
      <section anchor="algorithms">
        <name>Algorithms</name>
        <t>The use of algorithms describing functions such as clock filtering, selection,
and clustering <bcp14>SHOULD</bcp14> have agility, allowing for implementations to develop and
deploy new algorithms independently. Signalling of algorithm use or preference
<bcp14>SHOULD NOT</bcp14> be transmitted by servers, however essential properties of the
algorithm (e.g. precision) <bcp14>SHOULD</bcp14> be obvious.</t>
        <t>The working group should consider creating a separate informational document to
describe an algorithm to assist with implementation, and consider adopting
future documents which describe new algorithms as they are developed. Specifying
client algorithms separately from the protocol will allow NTPv5 to meet
the needs of applications with a variety of network properties and performance
requirements.</t>
      </section>
      <section anchor="timescales">
        <name>Timescales</name>
        <t>The protocol should adopt a linear, monotonic timescale as the basis for
communicating time. The format should provide sufficient scale, precision, and
resolution to meet or exceed NTPv4's capabilities, and have a roll-over date
sufficiently far into the future that the protocol's complete obsolescence is
likely to occur first. Ideally it should be similar or identical to the existing
epoch and data model that NTPv4 defines to allow for implementations to better
support both versions of the protocol, simplifying implementation.</t>
        <t>The timescale, in addition to any other time-sensitive information, <bcp14>MUST</bcp14> be
sufficient to calculate representations of both UTC and TAI <xref target="TF.460-6"/>, noting
that UTC itself as the current timescale used in NTPv4 is neither linear nor
monotonic unlike TAI. Through extensions the protocol <bcp14>SHOULD</bcp14> support additional
timescale representations outside of the main specification, and all
transmissions of time data <bcp14>MUST</bcp14> indicate the timescale in use.</t>
      </section>
      <section anchor="leap-seconds">
        <name>Leap seconds</name>
        <t>Transmission of UTC leap second information <bcp14>MUST</bcp14> be included in the protocol in
order for clients to generate a UTC representation, but must be transmitted as
separate information to the timescale. The specification <bcp14>MUST</bcp14> require that
servers transmit upcoming leap seconds greater than 24 hours in linear timescale
in advance if that information is known by the server. If the server learns of a
leap second less than 24 hours before an upcoming leap second event, it <bcp14>MUST</bcp14>
start transmitting the information immediately.</t>
        <t>Smearing <xref target="google-smear"/> of leap seconds <bcp14>SHOULD</bcp14> be supported in the protocol,
and the protocol <bcp14>MUST</bcp14> support servers transmitting information if they are
configured to smear leap seconds and if they are actively doing so. Behaviours
for both client and server in handling leap seconds <bcp14>MUST</bcp14> be part of the
specification; in particular how clients handle multiple servers where some may
use leap seconds and others smearing, that servers should not apply both leap
seconds and smearing, as well as details around smearing timescales. Supported
smearing algorithms <bcp14>MUST</bcp14> be defined or referenced.</t>
      </section>
      <section anchor="backwards-compatibility-with-nts-and-ntpv4">
        <name>Backwards Compatibility with NTS and NTPv4</name>
        <t>The desire for compatibility with older protocols should not prevent addressing
deployment issues or cause ossification of the protocol caused by middleboxes
<xref target="RFC9065"/>.</t>
        <t>Servers that support multiple versions of NTP <bcp14>MUST</bcp14> send a response in the same
version as the request as the model of backwards compatibility. This does not
preclude servers from acting as a client in one version of NTP and a server in
another.</t>
        <t>Protocol ossification <bcp14>MUST</bcp14> be addressed to prevent existing NTPv4
deployments which respond incorrectly to clients posing as NTPv5 from causing
issues. Forward prevention of ossification (for a potential NTPv6 protocol in
the future) should also be taken into consideration.</t>
        <section anchor="dependent-specifications">
          <name>Dependent Specifications</name>
          <t>Many other documents make use of NTP's data formats (<xref target="RFC5905"/> Section 6) for
representing time, notably for media and packet timestamp measurements, such as
SDP <xref target="RFC4566"/> and STAMP <xref target="RFC8762"/>. Any changes to the data formats should
consider the potential implementation complexity that may be incurred.</t>
        </section>
      </section>
      <section anchor="extensibility">
        <name>Extensibility</name>
        <t>The protocol <bcp14>MUST</bcp14> have the capability to be extended; implementations <bcp14>MUST</bcp14>
ignore unknown extensions. Unknown extensions received from a lower stratum
server <bcp14>SHALL NOT</bcp14> be re-transmitted towards higher stratum servers.</t>
      </section>
      <section anchor="security">
        <name>Security</name>
        <t>Data authentication and integrity <bcp14>MUST</bcp14> be supported by the protocol, with
optional support for data confidentiality. Downgrade attacks by an in-path
attacker must be mitigated. The protocol <bcp14>MUST</bcp14> define at least one common
mechanism to ensure interoperability, but should also include support for
different mechanisms to support different deployment use cases. Extensions
and additional modes <bcp14>SHOULD</bcp14> also incorporate authentication and integrity
on data which could be manipulated by an attacker, on-path or off-path.</t>
        <t>Upgrading cryptographic algorithms must be supported, allowing for more secure
cryptographic primitives to be incorporated as they are developed and as attacks
and vulnerabilities with incumbent primitives are discovered.</t>
        <t>Intermediate devices such as networking equipment capable of modifying NTP
packets, for example to adjust timestamps <bcp14>MUST</bcp14> be able to do so
without compromising authentication or confidentiality. Extension fields with
separate authentication may be used to facilitate this.</t>
        <t>Consideration must be given to how this will be incorporated into any
applicable trust model. Downgrading attacks that could lead to an adversary
disabling or removing encryption or authentication <bcp14>MUST NOT</bcp14> be possible in the
design of the protocol.</t>
      </section>
    </section>
    <section anchor="non-requirements">
      <name>Non-requirements</name>
      <t>This section covers topics that are explicitly out of scope.</t>
      <section anchor="server-malfeasance-detection">
        <name>Server Malfeasance Detection</name>
        <t>Detection and reporting of server malfeasance should remain out of scope as
<xref target="I-D.ietf-ntp-roughtime"/> already provides this capability as a core
functionality of the protocol.</t>
      </section>
      <section anchor="additional-time-information-and-metadata">
        <name>Additional Time Information and Metadata</name>
        <t>Previous versions of NTP do not transmit additional time information such as
time zone data or historical leap seconds, and NTPv5 should not explicitly add
support for it by default as existing protocols (e.g. TZDIST <xref target="RFC7808"/>)
already provide mechanisms to do so. This does not prevent however, further
extensions enabling this.</t>
      </section>
      <section anchor="remote-monitoring-support">
        <name>Remote Monitoring Support</name>
        <t>Largely due to previous DDoS amplification attacks, mode 6 messages which have
historically provided the ability for monitoring of servers <bcp14>SHOULD NOT</bcp14> be
supported in the core of the protocol. However, it may be provided as a separate
extension specification. It is likely that even with a new version of the
protocol middleboxes may continue to block this mode in default configurations
into the future.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests of IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As this document is intended to create discussion and consensus, it introduces
no security considerations of its own.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC7384">
          <front>
            <title>Security Requirements of Time Protocols in Packet Switched Networks</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>As time and frequency distribution protocols are becoming increasingly common and widely deployed, concern about their exposure to various security threats is increasing. This document defines a set of security requirements for time protocols, focusing on the Precision Time Protocol (PTP) and the Network Time Protocol (NTP). This document also discusses the security impacts of time protocol practices, the performance implications of external security practices on time protocols, and the dependencies between other security services and time synchronization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7384"/>
          <seriesInfo name="DOI" value="10.17487/RFC7384"/>
        </reference>
        <reference anchor="RFC8085">
          <front>
            <title>UDP Usage Guidelines</title>
            <author fullname="L. Eggert" initials="L." surname="Eggert"/>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="G. Shepherd" initials="G." surname="Shepherd"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>The User Datagram Protocol (UDP) provides a minimal message-passing transport that has no inherent congestion control mechanisms. This document provides guidelines on the use of UDP for the designers of applications, tunnels, and other protocols that use UDP. Congestion control guidelines are a primary focus, but the document also provides guidance on other topics, including message sizes, reliability, checksums, middlebox traversal, the use of Explicit Congestion Notification (ECN), Differentiated Services Code Points (DSCPs), and ports.</t>
              <t>Because congestion control is critical to the stable operation of the Internet, applications and other protocols that choose to use UDP as an Internet transport must employ mechanisms to prevent congestion collapse and to establish some degree of fairness with concurrent traffic. They may also need to implement additional mechanisms, depending on how they use UDP.</t>
              <t>Some guidance is also applicable to the design of other protocols (e.g., protocols layered directly on IP or via IP-based tunnels), especially when these protocols do not themselves provide congestion control.</t>
              <t>This document obsoletes RFC 5405 and adds guidelines for multicast UDP usage.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="145"/>
          <seriesInfo name="RFC" value="8085"/>
          <seriesInfo name="DOI" value="10.17487/RFC8085"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-ntp-roughtime">
          <front>
            <title>Roughtime</title>
            <author fullname="Aanchal Malhotra" initials="A." surname="Malhotra">
              <organization>Boston University</organization>
            </author>
            <author fullname="Adam Langley" initials="A." surname="Langley">
              <organization>Google</organization>
            </author>
            <author fullname="Watson Ladd" initials="W." surname="Ladd">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Marcus Dansarie" initials="M." surname="Dansarie">
         </author>
            <date day="18" month="October" year="2023"/>
            <abstract>
              <t>   This document specifies Roughtime - a protocol that aims to achieve
   rough time synchronization even for clients without any idea of what
   time it is.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-roughtime-08"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4566">
          <front>
            <title>SDP: Session Description Protocol</title>
            <author fullname="M. Handley" initials="M." surname="Handley"/>
            <author fullname="V. Jacobson" initials="V." surname="Jacobson"/>
            <author fullname="C. Perkins" initials="C." surname="Perkins"/>
            <date month="July" year="2006"/>
            <abstract>
              <t>This memo defines the Session Description Protocol (SDP). SDP is intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4566"/>
          <seriesInfo name="DOI" value="10.17487/RFC4566"/>
        </reference>
        <reference anchor="RFC7808">
          <front>
            <title>Time Zone Data Distribution Service</title>
            <author fullname="M. Douglass" initials="M." surname="Douglass"/>
            <author fullname="C. Daboo" initials="C." surname="Daboo"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>This document defines a time zone data distribution service that allows reliable, secure, and fast delivery of time zone data and leap-second rules to client systems such as calendaring and scheduling applications or operating systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7808"/>
          <seriesInfo name="DOI" value="10.17487/RFC7808"/>
        </reference>
        <reference anchor="RFC8762">
          <front>
            <title>Simple Two-Way Active Measurement Protocol</title>
            <author fullname="G. Mirsky" initials="G." surname="Mirsky"/>
            <author fullname="G. Jun" initials="G." surname="Jun"/>
            <author fullname="H. Nydell" initials="H." surname="Nydell"/>
            <author fullname="R. Foote" initials="R." surname="Foote"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This document describes the Simple Two-way Active Measurement Protocol (STAMP), which enables the measurement of both one-way and round-trip performance metrics, like delay, delay variation, and packet loss.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8762"/>
          <seriesInfo name="DOI" value="10.17487/RFC8762"/>
        </reference>
        <reference anchor="RFC9065">
          <front>
            <title>Considerations around Transport Header Confidentiality, Network Operations, and the Evolution of Internet Transport Protocols</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="C. Perkins" initials="C." surname="Perkins"/>
            <date month="July" year="2021"/>
            <abstract>
              <t>To protect user data and privacy, Internet transport protocols have supported payload encryption and authentication for some time. Such encryption and authentication are now also starting to be applied to the transport protocol headers. This helps avoid transport protocol ossification by middleboxes, mitigate attacks against the transport protocol, and protect metadata about the communication. Current operational practice in some networks inspect transport header information within the network, but this is no longer possible when those transport headers are encrypted.</t>
              <t>This document discusses the possible impact when network traffic uses a protocol with an encrypted transport header. It suggests issues to consider when designing new transport protocols or features.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9065"/>
          <seriesInfo name="DOI" value="10.17487/RFC9065"/>
        </reference>
        <reference anchor="drdos-amplification" target="https://arxiv.org/abs/1505.07892">
          <front>
            <title>Amplification and DRDoS Attack Defense -- A Survey and New Perspectives</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ntp-misuse" target="https://en.wikipedia.org/wiki/NTP_server_misuse_and_abuse">
          <front>
            <title>NTP server misuse and abuse</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ntppool" target="https://www.ntppool.org">
          <front>
            <title>pool.ntp.org: the internet cluster of ntp servers</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TF.460-6" target="https://www.itu.int/rec/R-REC-TF.460-6-200202-I/en">
          <front>
            <title>Standard-frequency and time-signal emissions</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="google-smear" target="https://developers.google.com/time/smear">
          <front>
            <title>Google Leap Smear</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 374?>

<section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The author would like to thank Doug Arnold, Hal Murray, Paul Gear, and David
Venhoek for contributions to this document, and would like to acknowledge Daniel
Franke, Watson Ladd, Miroslav Lichvar for their existing documents and ideas.
The author would also like to thank Angelo Moriondo, Franz Karl Achard, and
Malcom McLean for providing the author with motivation.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA41b25IbuZF9x1dgNQ+WHCR1GUmjkR32ttUaT9tqSVZLu+F1
OCaKLJAsd7HArUu3OAr9y37LftmekwmgUGSP146wpkkWgEReT15qPp+bvupr
99Lee/vx/c0z+6lz9lXRuc4WTWk/uP8eqtbtXNN390yxXLbu5l96tPSrpthh
27It1v28cv163vR7/v/m2bzNnp0/emrKoncvjSmGfuvbl8bif3P519qq6V7a
Py3sH9vBdV3VbML3uvuf8G938ptvN0VT/Vz0lW9e2reudG0NEkHu+2FZV+7a
2Xe71rt9eH7lh6ZvD3y034Znw09uV1T1S/sPnrPgLf59w28WK78zptq3L23f
Dl3/5NGj7x89MSvcY+O5U9WsvSlaV7y0F03v2sb15ta315vWD3s5iJ/sx2oH
olrf+5WvzbU74NtyXDI/J/dM14Oin4raN7jywXVmX720f8OamcU/VVOCjzPb
+bZv3brDX4dd+KNvqxV+ArX7gn90wzL9jT9EADMQW1eN+7sxjW934NqNUxl8
+OHVk8ePvx8/vHjyXfrw7PtHz9KH77598TR9ePHoxfjLi8ffhV8u5ueLpAdg
w2bb4/YQO3l1fO7TZ8+fj7tjx3HD754/SR++f/Q8HFW2pe/mxW5fV+tqpaIP
MrQ2qvhZ/rNo7fmHc39lz/q+WF3bc7d2DbRkPrdn9mpob9xBHnrrbu1713Z7
tyKRUO+0cdFuXP/Sbvt+3718+LBoP1c3C+jfw2LZPXz87NGzxaPvXnz/RBbw
3ruqGzp3ShksynYOJ7ZWH5GDiyX++uXTXLO4ra6rvSurQg7lp4fY6ifd6ifd
6ifRHm4Vydh7X5/SwG8X+JVbQa+3DoqhemhXNZQctPk1lwdK7+DDvUja7e3t
IhzE7fTJjz8snj5/NH9+evQVNbxoy/marsE1K2U8FWTeVZumqGGJFWzcN//f
qVU/LED3w9atHn6Yf3j9ah6PncNKnzx6Mr8A43STjfebGifsXNGeEvVH+dW+
ccXeXvGRf3Jy6W5c7fdgykI3pYd4SPofdrrUzKFW0Iq+hfUZ83FbdRZecqAN
2tJ1q7ZawpeR7RT/io51ZnNPOROerMCCCh5NdJjPF3AQWz/UpV06u8bmvnUl
RCdbYWOwj3IrYPyrFfykb+0+eBy4D3xLquEjLUVKu3hq8DgXUynTo/vWdaCi
PoCmtWt5BlYXnTwVlz6z9zU43HuwsBe9LaodSPSmdGt4GHsLYnGzfbGs6qqv
QuTI70git6B1PNZ3YITwQv0E3fz0ZvyUnse9i7KsxMBBHw7rhxZrcNLB0ufy
b/HCwknY+9CZXVFS2W2QIilZqMAa37uf3vKf3v/0weG5tjPm13A99jVOQbSy
+9pBVrjFzt84EAO5dnQUIGDpQDGIY9RRp/NrY6780K4gYF+qkUOtEb4sntTF
EjFBeCPyRGiCH+jNb6Ombap+OyxFvdbgYF/8w/VdsXuogXYTQ+EvRNvfhXvt
qrKsnTHfMNa0vhyEYGNyYT61X74ER//1q90WvJcDe8UJipKSZk+fVYB1KzBH
VfQWJFaNkdvQBCw0rPLlVFDcD9y1voFKLbmx+9w7xLIyaOUe8cw27tZM9GM5
9LK0qDsPba9rLLxBkKt2XHYz1A1MI6kXrQOPg1w5ATSXhkSXFUMj9sJpiJ4V
/AsUiW6tgmjunyMoPLDFNFpIjOig1lC6FnpAvS7Km6JZuenNxHOXJexFzBl8
um78bRMFzTi+oQnzoYk1CGnrAQpL9haboE2Zl6AVqY9YDTBBfKdby5H7PbVs
WYtsjDgQKrX7jMtS62mYT7HJvvYHZSaXxU0nXFZldIEY6Mw331hYgXACvHrl
mxs8RwdET4YLOjGusrP3Lj9dfbw30//at+/k7w+v//Lp4sPrc/599ePZmzfp
DxOeuPrx3ac35+Nf48pX7y4vX78918X41k6+Mvcuz/56T9Xu3rv3Hy/evT17
c0+9X846QDHqxzLENDgzir7oTPS84jH/8Or9//7PY+r9vwXsA8XXD8Qx+HC7
dY2eJnqrH8GpgwH74efF/9Q1xVr10NEZPSTcM2QEZElO/vpv5MzfX9rfLlf7
x09/F77ghSdfRp5NvhSenX5zsliZeMdXdxyTuDn5/ojTU3rP/jr5HPmeffnb
3xNS2vnjF7//nTGGqQI9NZ0BYRTNykIO8Oa+9puDWOap1HbFASrYEpRTdGEl
bBhPim8i7oRUoK0CoO7aOcTMldtDr9Uz5X6Nun2UybyOBnOemQqoxxHGnHVZ
dJrJsaBYyO8OzWrb+qbCbjUBAjwIMwtZTNgNd9N28FaFXfp+a/ZtdYOEAT5O
kgE9nFYHHNEk7DWLX0ODqcUdYlQLGyR8h1vqVq4p4F3Vefyyrb8MUQhKWwgM
qOgoIuyE14uht4uh37wHeAOrAowDmwvxS+qg/RogALjQAzePF1dXKZSAaDzb
yq2M28HCSnG2ctbMXly9n4ONNxW/DXhyckDOzbAqUmhWQKN+51rsQFiIX+i8
NG5TajicTPCKgQJ/hY/7ot8Gp5wxx1DRoGAFLrWiY1ge7A24Ks60howEkEJ9
HExbOAQF6Gs5A5pJJvDv5cGEKwEGGnNe9IWFeJCVqWzBraEMmsDn08MaoiSk
KVX0TfQxwmTKIgmJmiMMVv2AIsRkgV9GxoDB+6Ltq9UARVQ/1bqcGYZK28j9
kjAZF73TqByigYaaHLB5McZoAB1xSrx0CP7xKPxLthY1suDyoOB0h23A1/4g
lsibLexZiJJmEpmwumYAratrhwuo7yZiA36GZxERRcFGCRHZ+lvXikc2e6A2
xChwiJzZVhsSXhPhiUHCCgZAcXUQ0KNVJaAneAjee0ns1QWEacbwTkTn1YCO
2Ey9QF6bQDyW7nyZMMTExEx4AKB/768p/Y0HZ7a7TlzSxy3Y1tszSPjQVao/
l4CMVDp4oTENoAh3vqcrUcx7WzAOF4ROCcqdoOQu5HdM7Aj8BP2AIRQN/NKu
kkQ30cvKDJmZZc7geHvYR5y9FIw94VPVzCUGiKQjXMFtexxADLkKoDctUES/
EEQRnF2DOACWdnYUZi+M6ST5yGyYwo/6sAV9YpzQlTWYbzTuHHmpUYcFJebx
JOL3b8fEbAbFrsAM6jtD0bDbQZE1aoEUUgWNKTpEH8ku4HDPE7C8SsASuHKG
TTdtUSoVfm2iJqr9ANNCMUjxTJAEluvJ0Er6JHKDeVAngE8sQ8zoR2g+xD0z
NF8ujIzSx2JsxC9xDVAw1B4Z3QwKBLFgoWhTQLriPkGG6SRh6ez9xJbFk8Xj
Rw+E3DdPHr751o5FlKPHvntA9RGnBXkaP/SCfKl83Qpx7lgzU7TLdLXvXL0m
43mz4GvsDpppgqHews3Q1KC0GzU0RaynAuDmkyKQZDyIlEwp4ARuyF5ya6BH
hHDXrd9ZpgN3ZwOwcsktDZz6smqiSO3F+5QBwLr9WhNQ+hkN+Tsmf4zgLDUm
8NPBdYu3r3CWIHG9zQxuq5CIRqWPhwsmko2DF1dx0uYPAX/c+BoG1Ek+r6ag
ZhMSppHKhX0VDDRjolggMiXsr9FKaDdT2pE+E1pVgYbIl+AhoDnFhoujabJE
UiBtlqpAuiaBt/32hdogq4wEG2O4VQVMHL0p6ipYjwQbE72xug6r1emkP0nz
ZcVYKlF348p/5qAEVH06f0/LdmXmMiAtIMxSKWbBE0iSBY+wPVRniGlh9Fxm
qkFaqZGdpObVsWQFZWEBcl8cal8AF1U/w+6+fLmjuPn1q7kj2uxZ+yAqWac9
wKlidlwWwUlSGuazQZRGksGq2DTwBVAUirmLTi/yzH2Gv62AkNTAzmIMPR89
msoArvFa/Sr01TdzwV1Jb1nc6A5dD/CmDglxDTa856/M8aEsUmkwq7qS7K2J
GFERbhfTLK0uJKmodgXoVzUS0UZ8LTeEN5noeBbvJxG+Zgx0iqqKgHODH1aE
dHC9yTBqycLAqnWqJ7xtWUn07SPCiOoYKhvc+CgkIRK0UGX4trqvYBpIGYHx
/MY1jl4/+mElT2HR1qnvdoJcWZc58YI/SEBhp8EYSdxb+FP4/GOpUNheRAN1
qPYDUZUwuOuheV1QAgGpMCncctgbcoYS+lUXWATFIvGQAMtpbbXu563jTiV2
rddDswquhf6hbWkAEdQTyxdS+4CWVW3ypSsHhCVq7yQmJZC+xcXhuc4yh6iA
s/Mmu4IiVpoBaVrXAIK9usuuHfZ9qvoIQi8GyQzmR5JZmLNgPaKu0csxlWsB
QYqDOsgUP+Btmw6S6EUZVKvJ2QDxscAQrftmPUjpcOWqG7FFMpGlTunRqCJv
PP97QpC5hC9kjegIm4k3a92GkFTqMm2o20TfFBTERXSh4FvKRb8BTwVFTKpE
YV1EnBbRrNSARmzRegQGbse8BtEStmCiAUsJKVX0cVaihZCxqFPt7BZb+luB
5dqKiSigZcThQjfHXXCqgOO81wgwDAch+F7R/SwEgNHTZ+VkcUlVpzlNLT5z
dBpVY8B/IIZJRi4FTk2es4aIbxoXdFkzHhWzrWHAMyMiDniuqrGG21M5PT1m
HikinhGIpPhRnFpqitEtNOUd8v+GfAih8bJooArkhzE/wkEikwhIT2gbK6A7
lsFjfUVQB5uL9Cpa4EipeNJJEzVwAin4OPJHadgKCo74QuoFoc3FKB7kmKr1
RoWzG+i0mm4IOabEi6iMsfiNCFvtdPeTUGe0LSTIZGhuC7lNJOK+W2zsn6tO
yDwHCt4+YH4A51yBJxX7pfAoogAqNqPMjvFuV1yr6s0lDOCM2SjH2VHOj19a
dwtSOnsERKLWwTvW3u9tceMBXKjzO7dCklJ1QPGhLkc1DRiKF4w0UhTS4uHz
YL8oIxUEOpQ9EiuIVp0td4mIq/d7KYQRA5gxW1W3m+iI6qi5P5gkWd7B/vCX
87ezHM6y8pAORmIV2kDRQDJnrbCWHYLbkK8L6hf9WggiJ+Xp+iZef1dtWnFP
9Md6a1IynqobExdC3v2wi1eU8kTKAg29a7UZQiDRnbpggHAaIyCCwWebjyy5
PPtrLDrQ7wUwIEhhaCFqtQINgAby97cPsQ2wNxEKMLvfbCLu38FwaZTwX/ZK
O1zjOSwiaypeunIWOGKkVF1KLUvS27Vw4Zf0SH1NCgVEHXlB34xaNl7nSEtV
icRVTKo+B4UqQV7ULA9WHcLFQ/bMzD8GUi0t3RRVremkVL702fGIFVKaVpDf
Wss5Dl8jeraS3Zqtb/wQagpsqCVjl/5LgrLdsRYlIyKqHRpVRKQax8QeTpF6
1VoEKuROon0ilFFhcSkzNIx+GmiIrFlVKrqwg3ZyyHiw9VU4LZCl7a/gkRHJ
iKhgLd12GkYYuDM2E05Qs3YFog7+HyqG7B65Mq28oYDoNDKOCzASvm+ICFPO
JX3TKFRamjQsg88smEVLuqvLibDF04BmRI3Gtcf6Em4n4pQwJu150ZYcPmh4
jBMvZ+pHzEcipDqAPNpk3o3KtUEE8faMrm0ZgIc+v7DSQ1c5GkFW9F4jDBGD
kdx9xMT3uwdJB8abMDLryUl4ec4xPic5kSix1IAEyRP6vxOMqT9HPNsddjvH
LEu2WrZQGYCsPrqVtDp6xnQKW5xjt4auMZiyPJqS5qAm6fOCbbl8NGAEQLG/
rVBPyaTXph+x02LDSQtVIrgX6lhdyCVLbTGxL6oVF6LsSw3bMRv0KY4nMBuy
VewFmCHJAVxvXYa04DN8q8AxdcpEfSaDQ1x5VCAJqpMom6XsN8b1wE8eTFfF
ln0f2jPcLzs+Pykgu1TsRXoHs1WvBB1iTmF22W3DOEMAZbsEyiKgwRpflsHU
fUMNleyEqpyAjbTBuyMJ7tPQhTqmmF+IOexDFCM9ITFPxWS12cDwscYcC5tc
P2ZlsdyruVyGeJAxqpuaGXXnMg7ExbkTKDbiWqRu6W9la8KFI1kx9dI5C2kN
qdikWp2Rl4W++oCYOYK9/Bp6rzZwB0mGMxPDmeRhsJ3gXWcpzeFkiZaVmccQ
u7hU8B9PIZxcjD2CB1m48UtJ+YJrnM6XHOdNrA6IwAoQAiTGMJNpGwUYG58y
MqOVZ0mzEikyctMBYKgOTXk7HRBClKRmwHjCSEHcPaLcdMIR77U/cdDyX5hr
go+7kjqaWGMsy4xr4oXqEEMmDu22Yh2POhFSM8YeB9StDSmnTZYwv5AFw0IK
3q6X1DHi2UxQUldxrXCQss8Rj9oBqx4d4q7rjmJXkI2wCOewUVG0rIPDIIHV
NAmTlbEjytxMsckILcQTCBjn5irJ48SOpWQAMvJL9puNiiTyMvQX9RCzYvJF
cpXPK9ZYpDr9q27Sg1Mxq8Uho67ruWQFHKI142mUhMwjSHcijnKcBj9u7qlG
LJUsQYpjS1lgnBmbbxJymel0vWQeAmWqPvNQHbwg84qUIDCRDmfHtrRxe08P
02hZUgJmyMljwzpMuPigL7/gQJYOJt2aWEuT5Dn0urrTlkJXSeVUijTTzYLd
JmGfFEoJIbSApLOI9MxSZssMdxYRQcZ9nT2rV1qCal2Yngs3YNuPJH/6+EqY
8fHsAolznFP8+nUmGFsG3cAaPhWaIMV0+GdU0thCUDayROkqIVs1G/u1ZlTu
oaFkeSw1V1PrLOz0d6C8yOoxaTLj6Sf3C22eIAki2GkZPqQrNTZRD92NomP1
Q7RDuErIpyA+lxOviiurkcuAZufg90qaebYh9yP36vGJSXyPSC4mX/a4EoyU
WWe9pLkecwhvWZLVJFX2n95/JghOKhxHIYio8A7PH80kXU/9ybRxIbSObXlO
fcZcIZxghz0sWUo1GUcQjBB2qMDIFO2Tp4h9g7YdgmqkU43ovg60VetQKsuo
hFbptNlRKn+xzhMl5nUqycLkfK91HC6nIYxH4qu7KLeS/szoZXh3TsFD/ybI
R3vYGYVA3GUlYQiqITO7fOzLl3zQl/NC6ymLxng+ovIjVVDg05/ky9EujoUR
CooZbesUVVNpIky6kKopQQJExwVh5pLpshaD/cL+IaVI0qQSf3LaLsEtUjd8
ckJUfVaEIuKZKNxvuDarFwEyJQuQLd3Yp4iXV7wsbUykVDLhcHIt8aadXlqw
pehZ3CErQ2nfWu7FTUy+ybg6axOWDmlyzf6IDM3GZ0YF71h8CfI16ecMxUSm
xKIE+JqQZWh5/QHJjk5YvOKLFH0V0ukwz3KlLwzQC2toYeGz1UnZ1ekCX5eT
aZrs+iH9j4U3RoNs2iHMknJXaVkwRUmu4njaQx4RAKxjv0v/GYBIWpd8gUKG
4GI9TqURlDoJOI+trBKr6nPGiw2Q0LUMFtMVO2fi4EkIWKHDGT9q3GcUTNyc
MCek9nEaia0hcdBJTQRjhg4Jx1Oi5leNpFXZ2AuplVgzWoSJWZcx8dWbKf+i
GgTWuzIrxxyN2JlppYOwWvlBB7LyrQ5YCBoIthOSWx2cBxaWq1BCkuaKWBf2
B9+SLfHQcJcJkfe1MzkOxnC755PQNcK+BwnwskzCqFRc64yhn75QIEr+TZih
43Wvcp+A8Ho5IqIxn5B6ecgxQQYgpQTwmHzfz+fIr8J0yPMHAqZT6IyWOgtz
KFp2FH8eJvekv5IakvipYPsgJPyx6nJ1/l6b8nyDKDQgrj6eXYZv+fYQW/Vn
uEUsCYfoOyE5VJVSLjXp5B+XTBQ/f5aqGs0nTBNCAYjTguN4rfhKFfxfrbzq
2FscjP/NCRSWwIjcmGF0aDQ6j0BuYT+dfBcaO3G0BakPJ+ZiKT1gCpuminl8
6+Y5iIkTZmGiLhbhg2nqZa/CLFkYgrxjfIydtI2Mm52U044LYjPxlSaVOfIO
ughNwmmpshHvcY47cyBhnGVasgvPkTS2vM3YLw4gLfZES0VeU8GEmiQEq2Uj
ehidvjVjER+SCu0s6RFKzXUZyiGEg7n9BbiZX8SUlUwccQJn7A1lL0KMv2dR
IL0otIjqRRsN7x/E3oaW+wLEief7FrsKgP0nojH4Qhh8NAUyNtfLwNjI0HGq
gH2f9Vr+hkp82lMc0uHm0KDHp/2WldEx9kZRJDU4KiPtvAw/c6LDTDfJ5hXj
iH+6X3l3NUNDQhfVQ1h2XPjUAgtseLckr7NTwlzUimm3mLe8rxmg5/Gwcixc
8B5pSjnvP8uE6CFEFBOmBWY6RP2ZMz86WFX+gwzK5jFSlIrjX1AWb0g10q+x
DC7BZirkMHowMZmkP7EWKjaXspWjHYKHi7Pa62JFrmmaVtEHTErRSbZsR0i2
QzApjR0pDR2LTMIS4ozJXmmR12wVOIz2LXcLFi6eV1WU03JxVK6kUyragxkH
2QTV7bwMXGRTrAyn01umrupyLAIHlGPufv1MphPewgYmzTd92S+ORYraUFX3
1SqQXejQS83GHXuvg0ByGZCM/lTc8mVRr+GCJEM7d70LL22lP0P9mfYTSqXx
ndJsYWp8SVqen8X4+eXL3e/pMpSGSe5Q2epUglm0UiQGOzWxpCzKdReTvrHj
QI2+BX2R5Uoy7Aw0LwV2gDSdqzlBoaV2fFL+mzm94xmKhA/kh5/pwsWzyWR4
nJeYJCuzhOSf5bA8ExOOM3ksAgVL6SMVgM1kRoKKI8DXUvLH/zq/gGrpyPGL
Ry++fn1gjrh7FAbEuI9gcYKkoZo9i+/K5C0E1wStD4YpUyM7IBl7mXrSMSsy
5g1nPJhmDi5iXuH8L0/AznSW9TnolXGkiIKJZsw2H0VJb3vkXUj17ImQpLHd
UQfsJC+nmp0oVhqCpiyCj0rHinZGhzayaFpmkdGcanztgNZJJseC9OlQ/Tjw
niVXcjjUCNJXTsq8iBqM8EteNlVFmcwpdOaoYCse5eLs7dlRd+/4DWJCcGpF
TLXESLhONoh47GSTs+7olauqk/gf38OUnoVGu0FLarHFIG/OCqOr8AYpckqc
n14jOHpRmV07UnXbhFdQmfuRtrMVMWrtys3oLjXgQDdu1aGzWilsKZpreP9h
Y8/aBsnzzP4Is70EzOa41Xvw0/5RCvnybn8BwZv/cM3Wu+uQgTf62mesI0/u
Ht5fmZxYjMRhvwah0fwAd3ONNOU/kSeAH2/gBmb2smp9Vxc39g2U/6Zo46hI
lb2TNeZLgrJKOOTF6V0FoU0vfIY0pfYw2BZ0l35mScLP9s9FW4N7W6Bx7SQg
PCDs28vVG1c08d0K8CCWyuI5VOXxlZGF+T8c4FY4BkQAAA==

-->

</rfc>
