<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ntp-roughtime-17" category="exp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Roughtime</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-roughtime-17"/>
    <author fullname="Watson Ladd">
      <organization>Akamai Technologies</organization>
      <address>
        <email>watsonbladd@gmail.com</email>
      </address>
    </author>
    <author fullname="Marcus Dansarie">
      <organization>Netnod</organization>
      <address>
        <email>marcus@dansarie.se</email>
        <uri>https://orcid.org/0000-0001-9246-0263</uri>
      </address>
    </author>
    <date year="2026" month="February" day="21"/>
    <area>Internet</area>
    <workgroup>Network Time Protocols</workgroup>
    <keyword>timing</keyword>
    <keyword>authenticity</keyword>
    <keyword>roughtime</keyword>
    <abstract>
      <?line 51?>

<t>This document describes Roughtime—a protocol that aims to
achieve two things: secure rough time synchronization even for clients
without any idea of what time it is, and giving clients a format by
which to report any inconsistencies they observe between time servers.
This document specifies the on-wire protocol required for these goals,
and discusses aspects of the ecosystem needed for it to work.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ntp-roughtime/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-ntp/draft-roughtime"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Time synchronization is essential to Internet security as many
security protocols and other applications require synchronization
<xref target="RFC738"/>. Unfortunately, widely deployed protocols such as
the Network Time Protocol (NTP) <xref target="RFC5905"/> lack essential security
features, and even newer protocols like Network Time Security (NTS)
<xref target="RFC8915"/> lack mechanisms to observe that the servers behave
correctly. Furthermore, clients may lack even a basic idea of the
time, creating bootstrapping problems as a time is required for
X.509 certificate validation.</t>
      <t>The primary design goal of Roughtime is to permit devices to obtain a
rough idea of the current time from fairly static configuration and to
enable them to report any inconsistencies they observe between
servers. The configuration consists of a list of servers and their
associated long-term keys, which ideally remain unchanged throughout a
server's lifetime. This makes the long-term public keys the roots of
trust in Roughtime. With a sufficiently long list of trusted servers
and keys, a client will be able to acquire authenticated time with
high probability, even after long periods of inactivity. Proofs of
malfeasance constructed by chaining together responses from different
trusted servers can be used to prove misbehavior by a server, and
after analysis result in revoking trust in that particular key.</t>
      <t>Unlike Khronos <xref target="RFC9523"/> Roughtime produces external evidence that
timeservers are reporting incompatible times. This requires changes
to the format of the timestamps and hence cannot be a mere extension to
NTP.</t>
      <t>This memo is limited to describing the Roughtime on-wire protocol.
Apart from describing the server list and malfeasance report formats,
this memo does not describe the ecosystem required for maintaining
lists of trusted servers and processing malfeasance reports, nor the
means by which the server list is maintained and distributed or the
policies to apply to such a list.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <t>Roughtime is a protocol for authenticated rough time synchronization
that enables clients to provide cryptographic proof of server
malfeasance. It does so by having responses from servers include a
signature over a value derived from the client's request, which
includes a nonce. This provides cryptographic proof that the response
was issued after the server received the client's request. The derived
value included in the server's response is the root of a Merkle tree
<xref target="Merkle"/> which includes the hash value of the client's request as
the value of one of its leaf nodes. This enables the server to
amortize the relatively costly signing operation over a number of
client requests.</t>
      <section anchor="single-server-mode">
        <name>Single Server Mode</name>
        <t>At its most basic level, Roughtime is a one round protocol in which a
completely fresh client requests the current time and the server sends
a signed response. The response includes a timestamp and a radius used
to indicate the server's certainty about the reported time.</t>
        <t>The client's request contains a nonce which the server incorporates
into its signed response. The client can verify the server's
signatures and—provided that the nonce has sufficient
entropy—this proves that the signed response could only have
been generated after the nonce.</t>
      </section>
      <section anchor="multi-server-mode">
        <name>Multi Server Mode</name>
        <t>When using multiple servers, a client can detect, cryptographically
prove, and report inconsistencies between different servers.</t>
        <t>A Roughtime server guarantees that the timestamp included in the response
to a query is generated after the reception of the query and prior to
the transmission of the associated response. If the time response from
a server is not consistent with time responses from other servers,
this indicates server error or intentional malfeasance that can be
reported and potentially used to impeach the server.</t>
        <t>Proofs of malfeasance are constructed by chaining requests to
different Roughtime servers. Details on proofs and malfeasance
reporting are provided in <xref target="roughtime-clients"/>. For the reporting to
result in impeachment, an additional mechanism is required that
provides a review and impeachment process. Defining such a mechanism
is beyond the scope of this document. A simple option could be an
online forum where a court of human observers judge cases after
reviewing input reports.</t>
      </section>
    </section>
    <section anchor="message-format">
      <name>Message Format</name>
      <t>Roughtime messages are maps consisting of one or more (tag, value)
pairs. They start with a header, which contains the number of pairs,
the tags, and value offsets. The header is followed by a message
values section which contains the values associated with the tags in
the header. Messages <bcp14>MUST</bcp14> be formatted according to <xref target="figmessage"/> as
described in the following sections.</t>
      <t>Messages <bcp14>MAY</bcp14> be recursive, i.e. the value of a tag can itself be a
Roughtime message.</t>
      <figure anchor="figmessage">
        <name>Roughtime Message</name>
        <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                   Number of pairs, N (uint32)                 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
.                                                               .
.                     N-1 offsets (uint32)                      .
.                                                               .
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
.                                                               .
.                        N tags (uint32)                        .
.                                                               .
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
.                                                               .
.                           N Values                            .
.                                                               .
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <section anchor="data-types">
        <name>Data types</name>
        <section anchor="uint32">
          <name>uint32</name>
          <t>A uint32 is a 32 bit unsigned integer. It is serialized
with the least significant byte first.</t>
        </section>
        <section anchor="uint64">
          <name>uint64</name>
          <t>A uint64 is a 64 bit unsigned integer. It is serialized with the least
significant byte first.</t>
        </section>
        <section anchor="type-tag">
          <name>Tag</name>
          <t>Tags are used to identify values in Roughtime messages. A tag is a
uint32 but can also be represented as a sequence of up to four ASCII
characters <xref target="RFC20"/> with the first character in the most significant
byte. ASCII strings shorter than four characters can be unambiguously
converted to tags by padding them with zero bytes. Tags <bcp14>MUST NOT</bcp14>
contain any other bytes than capital letters (A-Z) or padding zero
bytes. For example, the ASCII string "NONC" would correspond to the
tag 0x434e4f4e and "VER" would correspond to 0x00524556. On the wire
VER would be serialized as {0x56, 0x45, 0x52, 0x00} because of the
little-endian encoding of uint32.</t>
        </section>
        <section anchor="timestamp">
          <name>Timestamp</name>
          <t>A timestamp is a representation of UTC time as a uint64 count of
seconds since 00:00:00 on 1 January 1970 (the Unix epoch), assuming
every day has 86400 seconds. This is a constant offset from the NTP
timestamp in seconds. Leap seconds do not have an unambiguous
representation in a timestamp, and this has implications for the
attainable accuracy and setting of the RADI tag.</t>
        </section>
      </section>
      <section anchor="header">
        <name>Header</name>
        <t>All Roughtime messages start with a header. The first four bytes of
the header is the uint32 number of tags N, and hence of (tag, value)
pairs.</t>
        <t>The following 4*(N-1) bytes are offsets, each a uint32. The last 4*N
bytes in the header are tags. Offsets refer to the positions of the
values in the message values section. All offsets <bcp14>MUST</bcp14> be multiples of
four and placed in increasing order. The first post-header byte is at
offset 0. The offset array is considered to have a not explicitly
encoded value of 0 as its zeroth entry.</t>
        <t>The value associated with the ith tag begins at offset[i] and ends at
offset[i+1]-1, with the exception of the last value which ends at the
end of the message. Values may have zero length. All lengths and
offsets are in bytes.</t>
        <t>Tags <bcp14>MUST</bcp14> be listed in the same order as the offsets of their values
and be sorted in ascending order by numeric value. A tag <bcp14>MUST NOT</bcp14>
appear more than once in a header.</t>
      </section>
    </section>
    <section anchor="protocol-details">
      <name>Protocol Details</name>
      <t>As described in <xref target="protocol-overview"/>, clients initiate time
synchronization by sending requests containing a nonce to servers who
send signed time responses in return. Roughtime packets can be sent
between clients and servers either as UDP datagrams or via TCP
streams. Servers <bcp14>SHOULD</bcp14> support both the UDP and TCP transport modes.</t>
      <t>A Roughtime packet <bcp14>MUST</bcp14> be formatted according to <xref target="figpack"/> and as
described here. The first field is a uint64 with the value
0x4d49544847554f52 ("ROUGHTIM" in ASCII). The second field is a uint32
and contains the length of the third field. The third and last field
contains a Roughtime message as specified in <xref target="message-format"/>.</t>
      <figure anchor="figpack">
        <name>Roughtime packet</name>
        <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  0x4d49544847554f52 (uint64)                  |
|                        ("ROUGHTIM")                           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Message length (uint32)                    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
.                                                               .
.                      Roughtime message                        .
.                                                               .
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <t>Roughtime request and response packets <bcp14>MUST</bcp14> be transmitted in a single
datagram when the UDP transport mode is used. Setting the packet's
don't fragment bit <xref target="RFC791"/> is <bcp14>OPTIONAL</bcp14> in IPv4 networks. Setting
it may cause packets to get dropped, but not setting it could lead to
long delays due to reconstruction and dropped fragments.</t>
      <t>A Roughtime packet may exceed the maximum deliverable length of a UDP
packet. A client <bcp14>SHOULD</bcp14> deliver the request over TCP if it cannot be
delivered over UDP, as evidenced by repeated nonresponse. MTU issues
may lead to persistent nonresponse due to network devices between
client and server.</t>
      <t>Clients <bcp14>SHOULD</bcp14> implement exponential backoff in establishing TCP
connections and making requests over UDP as per <xref target="RFC8085"/>. It is
<bcp14>RECOMMENDED</bcp14> that clients use an initial interval of 1 seconds,
a maximum interval of 24 hours, and a base of 1.5. Therefore the
minimum interval for retry after n failures
in seconds is min(1.5^{n-1}, 84600).</t>
      <t>Clients <bcp14>MUST NOT</bcp14> reset the retry interval until they receive a properly
signed response.</t>
      <t>Multiple requests and responses can be exchanged over an established
TCP connection. Clients <bcp14>MAY</bcp14> send multiple outstanding requests and
servers <bcp14>MAY</bcp14> send responses out of order. The connection <bcp14>SHOULD</bcp14> be
closed by the client when it has no more requests to send and has
received all expected responses. Either side <bcp14>SHOULD</bcp14> close the
connection in response to synchronization, format,
implementation-defined timeouts, or other errors.</t>
      <t>All requests and responses <bcp14>MUST</bcp14> contain the VER tag. It contains a
list of one or more uint32 version numbers. The version of Roughtime
specified by this  has version number 1.</t>
      <t>NOTE TO RFC EDITOR: remove this paragraph before publication. For
testing this draft of the document, a version number of 0x8000000c is
used.</t>
      <section anchor="transport-considerations">
        <name>Transport considerations.</name>
      </section>
      <section anchor="requests">
        <name>Requests</name>
        <t>A request <bcp14>MUST</bcp14> contain the tags VER, NONC, and TYPE. It <bcp14>SHOULD</bcp14> include
the tag SRV. Other tags <bcp14>SHOULD</bcp14> be ignored by the server. Requests not
containing the three mandatory tags <bcp14>MUST</bcp14> be ignored by servers. A
future version of this protocol may mandate additional tags in the
message and assign them semantic meaning.</t>
        <t>The size of the request message <bcp14>SHOULD</bcp14> be at least 1024 bytes when the
UDP transport mode is used. To attain this size the ZZZZ tag <bcp14>SHOULD</bcp14> be
added to the message. Responding to request messages shorter than 1024
bytes is <bcp14>OPTIONAL</bcp14> and servers <bcp14>MUST NOT</bcp14> send responses larger than the
request messages they are replying to, see <xref target="amplification-attacks"/>.</t>
        <section anchor="ver">
          <name>VER</name>
          <t>In a request, the VER tag contains a list of uint32 version numbers.
The VER tag <bcp14>MUST</bcp14> include at least one Roughtime version supported by
the client and <bcp14>MUST NOT</bcp14> contain more than 32 version numbers. The
client <bcp14>MUST</bcp14> ensure that the version numbers and tags included in the
request are not incompatible with each other or the packet contents.</t>
          <t>The version numbers <bcp14>MUST NOT</bcp14> repeat and <bcp14>MUST</bcp14> be sorted in ascending
numerical order.</t>
          <t>Servers <bcp14>SHOULD</bcp14> ignore any unknown version numbers in the list supplied
by the client. If the list contains no version numbers supported by
the server, it <bcp14>MAY</bcp14> respond with another version or ignore the request
entirely, see <xref target="response-srep"/>.</t>
        </section>
        <section anchor="nonc">
          <name>NONC</name>
          <t>The value of the NONC tag is a 32-byte nonce. It <bcp14>SHOULD</bcp14> be generated
in a manner indistinguishable from random. BCP 106 <xref target="RFC4086"/>
contains specific guidelines regarding this.</t>
        </section>
        <section anchor="type">
          <name>TYPE</name>
          <t>The TYPE tag is used to unambiguously distinguish between request and
response messages. In a request, it <bcp14>MUST</bcp14> contain a uint32 with value
0. Requests containing a TYPE tag with any other value <bcp14>MUST</bcp14> be ignored
by servers.</t>
        </section>
        <section anchor="srv">
          <name>SRV</name>
          <t>The SRV tag is used by the client to indicate which long-term public
key it expects to verify the response with. The value of the SRV tag
is <tt>H(0xff || public_key)</tt> where <tt>public_key</tt> is the server's
long-term, 32-byte Ed25519 public key and H is SHA-512 truncated to
the first 32 bytes.</t>
        </section>
        <section anchor="zzzz">
          <name>ZZZZ</name>
          <t>The ZZZZ tag is used to expand the response to the minimum required
length. Its value <bcp14>MUST</bcp14> be all zero bytes.</t>
        </section>
      </section>
      <section anchor="responses">
        <name>Responses</name>
        <t>The server begins the request handling process with a set of long-term
keys. It resolves which long-term key to use with the following
procedure:</t>
        <ol spacing="normal" type="1"><li>
            <t>If the request contains a SRV tag, then the server looks up the
long-term key indicated by the SRV value. If no such key exists,
then the server <bcp14>MUST</bcp14> ignore the request.</t>
          </li>
          <li>
            <t>If the request contains no SRV tag, but the server has just one
long-term key, it <bcp14>SHOULD</bcp14> select that key. Otherwise, if the server
has multiple long-term keys, then it <bcp14>MUST</bcp14> ignore the request.</t>
          </li>
        </ol>
        <t>A response <bcp14>MUST</bcp14> contain the tags SIG, NONC, TYPE, PATH, SREP, CERT,
and INDX. The structure of a response message is illustrated in
<xref target="figresponse"/>.</t>
        <figure anchor="figresponse">
          <name>Roughtime response message structure.</name>
          <artwork><![CDATA[
|--SIG
|--NONC
|--TYPE
|--PATH
|--SREP
|  |--VER
|  |--RADI
|  |--MIDP
|  |--VERS
|  |--ROOT
|--CERT
|  |--DELE
|  |  |--MINT
|  |  |--MAXT
|  |  |--PUBK
|  |--SIG
|--INDX
]]></artwork>
        </figure>
        <section anchor="sig">
          <name>SIG</name>
          <t>In general, a SIG tag value is a 64-byte Ed25519 signature
<xref target="RFC8032"/> over a concatenation of a signature context ASCII string
and the entire value of a tag. All context strings <bcp14>MUST</bcp14> include a
terminating zero byte.</t>
          <t>The SIG tag in the root of a response <bcp14>MUST</bcp14> be a signature over the
SREP value using the public key contained in CERT. The context string
<bcp14>MUST</bcp14> be "RoughTime v1 response signature".</t>
        </section>
        <section anchor="nonc-1">
          <name>NONC</name>
          <t>The NONC tag <bcp14>MUST</bcp14> contain the nonce of the message being responded to.</t>
        </section>
        <section anchor="type-1">
          <name>TYPE</name>
          <t>In a response, the TYPE tag <bcp14>MUST</bcp14> contain a uint32 with value 1.
Responses containing a TYPE tag with any other value <bcp14>MUST</bcp14> be ignored
by clients.</t>
        </section>
        <section anchor="path">
          <name>PATH</name>
          <t>The PATH tag value <bcp14>MUST</bcp14> be a multiple of 32 bytes long and represent a
path of 32-byte hash values in the Merkle tree used to generate the
ROOT value as described in a <xref target="merkle-tree"/>. In the case where a
response is prepared for a single request and the Merkle tree contains
only the root node, the size of PATH <bcp14>MUST</bcp14> be zero.</t>
          <t>The PATH <bcp14>MUST NOT</bcp14> contain more than 32 hash values. The maximum length
of PATH is normally limited by the maximum size of the response
message, see <xref target="requests"/> and <xref target="amplification-attacks"/>. Server
implementations <bcp14>SHOULD</bcp14> select a maximum Merkle tree height (see
<xref target="merkle-tree"/>) that ensures this.</t>
        </section>
        <section anchor="response-srep">
          <name>SREP</name>
          <t>The SREP tag contains a signed response. Its value <bcp14>MUST</bcp14> be a Roughtime
message with the tags VER, RADI, MIDP, VERS, and ROOT.</t>
          <t>The VER tag, when used in a response, <bcp14>MUST</bcp14> contain a single uint32
version number. It <bcp14>SHOULD</bcp14> be one of the version numbers supplied by
the client in its request. The server <bcp14>MUST</bcp14> ensure that the version
number corresponds with the rest of the packet contents.</t>
          <t>The RADI tag value <bcp14>MUST</bcp14> be a uint32 representing the server's estimate
of the accuracy of MIDP in seconds. Servers <bcp14>MUST</bcp14> ensure that the true
time is within <tt>(MIDP-RADI, MIDP+RADI)</tt> at the moment of processing.
The value of RADI <bcp14>MUST NOT</bcp14> be zero. Since leap seconds can not be
unambiguously represented by Roughtime timestamps, servers <bcp14>MUST</bcp14> take
this into account when setting the RADI value during leap second
events. Servers that do not have any leap second information <bcp14>SHOULD</bcp14>
set the value of RADI to at least 3. Failure to do so will impact the
observed correctness of Roughtime servers and can lead to malfeasance
reports.</t>
          <t>The MIDP tag value <bcp14>MUST</bcp14> be the timestamp of the moment of processing.</t>
          <t>The VERS tag value <bcp14>MUST</bcp14> contain a list of uint32 version numbers
supported by the server, sorted in ascending numerical order. It <bcp14>MUST</bcp14>
contain the version number specified in the VER tag. It <bcp14>MUST NOT</bcp14>
contain more than 32 version numbers.</t>
          <t>The ROOT tag <bcp14>MUST</bcp14> contain a 32-byte value of a Merkle tree root as
described in <xref target="merkle-tree"/>.</t>
        </section>
        <section anchor="cert">
          <name>CERT</name>
          <t>The CERT tag contains a public key certificate signed with the
server's private long-term key. Its value <bcp14>MUST</bcp14> be a Roughtime message
with the tags DELE and SIG, where SIG is a signature over the DELE
value. The context string used to generate SIG <bcp14>MUST</bcp14> be "RoughTime v1
delegation signature".</t>
          <t>The DELE tag contains a delegated public key certificate used by the
server to sign the SREP tag. Its value <bcp14>MUST</bcp14> be a Roughtime message
with the tags MINT, MAXT, and PUBK. The purpose of the DELE tag is to
enable separation of a long-term public key from keys on devices
exposed to the public Internet.</t>
          <t>The MINT tag is the minimum timestamp for which the key in PUBK is
trusted to sign responses. MIDP <bcp14>MUST</bcp14> be more than or equal to MINT for
a response to be considered valid.</t>
          <t>The MAXT tag is the maximum timestamp for which the key in PUBK is
trusted to sign responses. MIDP <bcp14>MUST</bcp14> be less than or equal to MAXT for
a response to be considered valid.</t>
          <t>The PUBK tag <bcp14>MUST</bcp14> contain a temporary 32-byte Ed25519 public key which
is used to sign the SREP tag.</t>
        </section>
        <section anchor="indx">
          <name>INDX</name>
          <t>The INDX tag value <bcp14>MUST</bcp14> be a uint32 determining the position of NONC
in the Merkle tree used to generate the ROOT value as described in
<xref target="merkle-tree"/>.</t>
        </section>
      </section>
      <section anchor="merkle-tree">
        <name>The Merkle Tree</name>
        <t>A Merkle tree <xref target="Merkle"/> is a binary tree where the value of each
non-leaf node is a hash value derived from its two children. The root
of the tree is thus dependent on all leaf nodes.</t>
        <t>In Roughtime, each leaf node in the Merkle tree represents one
request. Leaf nodes are indexed left to right, beginning with zero.</t>
        <t>The values of all nodes are calculated from the leaf nodes and up
towards the root node using the first 32 bytes of the output of the
SHA-512 hash algorithm <xref target="RFC6234"/>. For leaf nodes, the byte 0x00 is
prepended to the full value of the client's request packet, including
the "ROUGHTIM" header, before applying the hash function. For all
other nodes, the byte 0x01 is concatenated with first the left and
then the right child node value before applying the hash function.</t>
        <t>The value of the Merkle tree's root node is included in the ROOT tag
of the response.</t>
        <t>The index of a request leaf node is included in the INDX tag of the
response.</t>
        <t>The values of all sibling nodes in the path between a request leaf
node and the root node are stored in the PATH tag so that the client
can reconstruct and validate the value in the ROOT tag using its
request packet. These values are each 32 bytes and are stored one
after the other with no additional padding or structure. The order in
which they are stored is described in the next section.</t>
        <section anchor="check-algorithm">
          <name>Root Value Validity Check Algorithm</name>
          <t>This section describes how to compute the value of the root of the
Merkle tree from the values in the tags PATH, INDX, and NONC. The bits
of INDX are ordered from least to most significant. <tt>H(x)</tt> denotes the
first 32 bytes of the SHA-512 hash digest of x and <tt>||</tt> denotes
concatenation.</t>
          <t>The algorithm maintains a current value <tt>h</tt>. At initialization, <tt>h</tt> is
set to <tt>H(0x00 || request_packet)</tt>. For each step of the algorithm,
let node be the next 32 bytes in PATH. If the current bit in INDX is 0
then <tt>h = H(0x01 || h || node)</tt>, else <tt>h = H(0x01 || node || h)</tt>.
When no more entries remain in PATH, <tt>h</tt> is compared to the value of
the root of the Merkle tree contained in ROOT. If they are equal, the
algorithm succeeds. If they are not, or if any of the remaining bits
of INDX is non-zero, the algorithm fails.</t>
        </section>
      </section>
      <section anchor="validity-of-response">
        <name>Validity of Response</name>
        <t>A client <bcp14>MUST</bcp14> check the following properties when it receives a
response. We assume the long-term server public key is known to the
client through other means.</t>
        <t>The signature in CERT was made with the long-term key of the server.</t>
        <t>The MIDP timestamp lies in the interval specified by the MINT and MAXT
timestamps.</t>
        <t>The INDX and PATH values prove a hash value derived from the request
packet was included in the Merkle tree with value ROOT using the
algorithm in <xref target="check-algorithm"/>.</t>
        <t>The signature of SREP in SIG validates with the public key in DELE.</t>
        <t>A response that passes these checks is said to be valid. Validity of a
response does not prove that the timestamp's value in the response is
correct, but merely that the server guarantees that it signed the
timestamp and computed its signature during the time interval
(MIDP-RADI, MIDP+RADI).</t>
      </section>
    </section>
    <section anchor="integration-into-ntp">
      <name>Integration into NTP</name>
      <t>We assume that there is a bound PHI on the frequency error in the
clock on the machine. Let delta be the time difference between the
clock on the client and the clock on the server, and let sigma
represent the error in the measured value of delta introduced by the
measurement process.</t>
      <t>Given a measurement taken at a local time t, we
know the true time is in (t-delta-sigma, t-delta+sigma). After d
seconds have elapsed we know the true time is within
(t-delta-sigma-d<em>PHI, t-delta+sigma+d</em>PHI). A simple and effective way
to mix with NTP or Precision Time Protocol (PTP) discipline of the
clock is to trim the observed intervals in NTP to fit entirely within
this window or reject measurements that fall too far outside. This
assumes time has not been stepped. If the NTP process decides to step
the time, it <bcp14>MUST</bcp14> use Roughtime to ensure the new true time estimate
that will be stepped to is consistent with the true time. Should this
window become too large, another Roughtime measurement is called for.
The definition of "too large" is implementation defined.
Implementations <bcp14>MAY</bcp14> use other, more sophisticated means of adjusting
the clock respecting Roughtime information. Other applications such as
X.509 verification may wish to apply different rules.</t>
      <t>If an NTP server uses a Roughtime server as a time source for
synchronization (and not only for filtering its NTP measurements), the
root dispersion <bcp14>SHOULD</bcp14> include the server's RADI value and root delay
<bcp14>SHOULD</bcp14> include the interval between sending the Roughtime request and
receiving the response.</t>
    </section>
    <section anchor="grease">
      <name>Grease</name>
      <t>The primary purpose of grease is to prevent protocol ossification,
which could prohibit future protocol extensions and development
<xref target="RFC9170"/>. In Roughtime, grease is also intended to ensure that
clients validate signatures. To grease the Roughtime protocol, servers
<bcp14>SHOULD</bcp14> send back a fraction of responses with any of the following:
lack of mandatory tags, version numbers not in the request, undefined
tags, or invalid signatures together with incorrect times. Clients
<bcp14>MUST</bcp14> properly ignore undefined tags and reject invalid responses.
Servers <bcp14>MUST NOT</bcp14> send back responses with incorrect times and valid
signatures. Either signature <bcp14>MAY</bcp14> be invalid for this application.</t>
    </section>
    <section anchor="roughtime-clients">
      <name>Roughtime Clients</name>
      <section anchor="necessary-configuration">
        <name>Necessary configuration</name>
        <t>To carry out a Roughtime measurement, a client <bcp14>SHOULD</bcp14> be equipped with
a list of servers, a minimum of three of which are operational and not
run by the same parties. Roughtime clients <bcp14>SHOULD</bcp14> regularly update
their view of which servers are trustworthy in order to benefit from
the detection of misbehavior. Clients <bcp14>SHOULD</bcp14> also have a means of
reporting to the provider of such a list, such as an operating system
or software vendor, a malfeasence report as described below.</t>
      </section>
      <section anchor="measurement-sequence">
        <name>Measurement Sequence</name>
        <t>The client randomly selects at least three servers from the list, and
sequentially queries them. The query sequence <bcp14>SHOULD</bcp14> be repeated twice
with the servers in the same order, to ensure that all possible
inconsistences can be detected.</t>
        <t>The first probe uses a nonce that is randomly generated. The second
query uses <tt>H(resp || rand)</tt> where <tt>rand</tt> is a random 32-byte value
and <tt>resp</tt> is the entire response to the first probe, including the
"ROUGHTIM" header. Each subsequent query uses <tt>H(resp || rand)</tt> for
the previous response and a different 32-byte <tt>rand</tt> value. <tt>H(x)</tt> and
<tt>||</tt> are defined as in <xref target="check-algorithm"/>.</t>
        <t>For each pair of responses <tt>(i, j)</tt>, where <tt>i</tt> was received before
<tt>j</tt>, the client <bcp14>MUST</bcp14> check that <tt>MIDP_i-RADI_i</tt> is less than or equal
to <tt>MIDP_j+RADI_j</tt>. If all checks pass, the times are consistent with
causal ordering. If at least one check fails, there has been a
malfeasance and the client <bcp14>SHOULD</bcp14> store a report for evaluation, alert
the user, and make another measurement. If the times reported are
consistent with the causal ordering, and the delay between request and
response is within an implementation-dependent maximum value, the
measurement succeeds.</t>
      </section>
      <section anchor="server-lists">
        <name>Server Lists</name>
        <t>To facilitate regular updates of lists of trusted servers, clients
<bcp14>SHOULD</bcp14> implement the server list format specified here. Server lists
<bcp14>MUST</bcp14> be formatted as JSON <xref target="RFC8259"/> objects and contain the key
"servers". Server lists <bcp14>MAY</bcp14> also contain the keys "sources" and
"reports".</t>
        <t>The value of the "servers" key <bcp14>MUST</bcp14> be a list of server objects, each
containing the keys "name", "version", "publicKeyType", "publicKey",
and "addresses".</t>
        <t>The value of "name" <bcp14>MUST</bcp14> be a string and <bcp14>SHOULD</bcp14> contain a server name
suitable for display to a user.</t>
        <t>The value of "version" <bcp14>MUST</bcp14> be an integer that indicates the highest
Roughtime version number supported by the server.</t>
        <t>NOTE TO RFC EDITOR: remove this paragraph before publication. To
indicate compatibility with drafts of this document, a decimal
representation of the version number indicated in <xref target="protocol-details"/>
          <bcp14>SHOULD</bcp14> be used. For indicating compatibility with pre-IETF
specifications of Roughtime, the version number 3000600613 <bcp14>SHOULD</bcp14> be
used.</t>
        <t>The value of "publicKeyType" <bcp14>MUST</bcp14> be a string indicating the signature
scheme used by the server. The value for servers supporting version 1
of Roughtime <bcp14>MUST</bcp14> be "ed25519".</t>
        <t>The value of "publicKey" <bcp14>MUST</bcp14> be a base64-encoded <xref target="RFC4648"/> string
representing the long-term public key of the server in a format
consistent with the value of "publicKeyType".</t>
        <t>The value of "addresses" <bcp14>MUST</bcp14> be a list of address objects. An address
object <bcp14>MUST</bcp14> contain the keys "protocol" and "address". The value of
"protocol" <bcp14>MUST</bcp14> be either "tcp" or "udp", indicating the transport
mode to use. The value of "address" <bcp14>MUST</bcp14> be string indicating a host
and a port number, separated by a colon character, for example
"roughtime.example.com:2002". The host part <bcp14>SHALL</bcp14> be either an IPv4
address, an IPv6 address, or a fully qualified domain name (FQDN).
IPv4 addresses <bcp14>MUST</bcp14> be in dotted decimal notation. IPv6 addresses <bcp14>MUST</bcp14>
conform to the "Text Representation of Addresses" <xref target="RFC4291"/> and
<bcp14>MUST NOT</bcp14> include zone identifiers <xref target="RFC9844"/>. The port part <bcp14>SHALL</bcp14> be
a decimal integer representing a valid port number, i.e. in the range
0-65535.</t>
        <t>To disambiguate IPv6 addresses from ports when zero compression happens,
IPv6 addresses <bcp14>MUST</bcp14> be encapsulated within [].</t>
        <t>The value of "sources", if present, <bcp14>MUST</bcp14> be a list of strings
indicating where updated versions of the list may be aquired. Each
string <bcp14>MUST</bcp14> be a URL <xref target="RFC3986"/> pointing to a list in the format
specified here. The URI scheme <bcp14>MUST</bcp14> be HTTPS <xref target="RFC9110"/>.</t>
        <t>The value of "reports", if present, <bcp14>MUST</bcp14> be a string indicating a URL
<xref target="RFC1738"/> where malfeasance reports can be sent by clients using
the HTTP POST method <xref target="RFC9110"/>. The URI scheme <bcp14>MUST</bcp14> be HTTPS
<xref target="RFC9110"/>.</t>
        <t>Server lists have the "application/roughtime-server+json" media
type.</t>
      </section>
      <section anchor="malfeasance-reporting">
        <name>Malfeasance Reporting</name>
        <t>A malfeasance report is cryptographic proof that a sequence of
responses arrived in that order. It can be used to demonstrate that at
least one server sent the wrong time.</t>
        <section anchor="malfeasance-report-structure">
          <name>Malfeasance report structure</name>
          <t>A malfeasance report <bcp14>MUST</bcp14> be formatted as a JSON <xref target="RFC8259"/> object
and contain the key "responses". Its value <bcp14>MUST</bcp14> be an ordered list of
response objects. Each response object <bcp14>MUST</bcp14> contain the keys "rand",
"request", "response", and "publicKey". The values of all four keys
<bcp14>MUST</bcp14> be represented as base64-encoded <xref target="RFC4648"/> strings.</t>
          <t>The "rand" key <bcp14>MAY</bcp14> be omitted from the first response object in the
list. In all other cases, its value <bcp14>MUST</bcp14> be the 32-byte value used
to generate the request nonce value from the previous response packet.</t>
          <t>The value of "request" <bcp14>MUST</bcp14> be the transmitted request packet,
including the "ROUGHTIM" header.</t>
          <t>The value of "response" <bcp14>MUST</bcp14> be the received response packet,
including the "ROUGHTIM" header.</t>
          <t>The value of "publicKey" <bcp14>MUST</bcp14> be the long-term key that the server was
expected to use for deriving the response signature.</t>
          <t>Malfeasance reports have the "application/roughtime-malfeasence+json" media
type.</t>
        </section>
        <section anchor="reporting">
          <name>Reporting</name>
          <t>When the client's list of servers has an associated URL for
malfeasance reports, it <bcp14>SHOULD</bcp14> post a malfeasance report to the URL
whenever it has performed a measurement sequence in accordance with
<xref target="measurement-sequence"/> and detected that at least one of the
responses is inconsistent with causal ordering. Since the failure of a
popular Roughtime server can cause numerous clients to send
malfeasance reports at the same time, clients <bcp14>MUST</bcp14> use a reporting
mechanism that avoids overloading the server receiving the
reports. Clients <bcp14>SHOULD</bcp14> use exponential backoff for this purpose, with
an initial and minimum retry interval of at least 10 seconds.</t>
          <t>Clients <bcp14>MUST NOT</bcp14> send malfeasance reports in response to signature
verification failures or any other protocol errors.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="confidentiality">
        <name>Confidentiality</name>
        <t>This protocol does not provide any confidentiality. Given the nature
of timestamps, such impact is minor.</t>
      </section>
      <section anchor="integrity-and-authenticity">
        <name>Integrity and Authenticity</name>
        <t>The Roughtime protocol only provides integrity and authenticity
protection for data contained in the SREP tag. Accordingly, new tags
<bcp14>SHOULD</bcp14> be added to the SREP tag whenever possible.</t>
      </section>
      <section anchor="generating-private-keys">
        <name>Generating Private Keys</name>
        <t>Although any random 256-bit string can be used as a private Ed25519
key, it has a high risk of being vulnerable to small-subgroup attacks
and timing side-channel leaks. For this reason, all private keys used
in Roughtime <bcp14>MUST</bcp14> be generated following the procedure described in
Section 5.1.5 of RFC 8032 <xref target="RFC8032"/>.</t>
      </section>
      <section anchor="private-key-compromise">
        <name>Private Key Compromise</name>
        <t>The compromise of a PUBK's private key, even past MAXT, is a problem
as the private key can be used to sign invalid times that are in the
range MINT to MAXT, and thus violate the good-behavior guarantee of
the server. To protect against this, it is necessary for clients to
query multiple servers in accordance with the procedure described in
<xref target="measurement-sequence"/>.</t>
      </section>
      <section anchor="quantum-resistance">
        <name>Quantum Resistance</name>
        <t>Since the only supported signature scheme, Ed25519, is not quantum
resistant, the Roughtime version described in this document will not
survive the advent of quantum computers. A later version will have to
be devised and implemented before then. The use of a single version
number as negotiation point rather than defining a suite of acceptable
signatures is intended to prevent fragmentation and misconfiguration.</t>
      </section>
      <section anchor="maintaining-lists-of-servers">
        <name>Maintaining Lists of Servers</name>
        <t>The infrastructure and procedures for maintaining a list of trusted
servers and adjudicating violations of the rules by servers is not
discussed in this document and is essential for security.</t>
      </section>
      <section anchor="amplification-attacks">
        <name>Amplification Attacks</name>
        <t>UDP protocols that send responses significantly larger than requests,
such as NTP, have previously been leveraged for amplification attacks.
To prevent Roughtime from being used for such attacks, servers <bcp14>MUST
NOT</bcp14> send response packets larger than the request packets sent by
clients.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>This protocol is designed to obscure all client identifiers. Servers
necessarily have persistent long-term identities essential to
enforcing correct behavior. Generating nonces in a nonrandom manner
can cause leaks of private data or enable tracking of clients as they
move between networks.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>It is expected that clients identify a server by its long-term public
key. In multi-tenancy environments, where multiple servers may be
listening on the same IP or port space, the protocol is designed so
that the client indicates which server it expects to respond. This is
done with the SRV tag. Additional recommendations for clients are listed in
<xref target="roughtime-clients"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="service-name-and-transport-protocol-port-number-registry">
        <name>Service Name and Transport Protocol Port Number Registry</name>
        <t>IANA is requested to allocate the following entry in the Service
Name and Transport Protocol Port Number Registry:</t>
        <artwork><![CDATA[
  Service Name: roughtime

  Transport Protocol: tcp,udp

  Assignee: IESG <iesg@ietf.org>

  Contact: IETF Chair <chair@ietf.org>

  Description: Roughtime time synchronization

  Reference: [[this document]]

  Port Number: [[TBD1]], selected by IANA from the User Port range
]]></artwork>
      </section>
      <section anchor="roughtime-version-registry">
        <name>Roughtime Version Registry</name>
        <t>IANA is requested to create a new top-level registry entitled "Roughtime
 Version Registry".  Entries shall have the following fields:</t>
        <t>Version ID (<bcp14>REQUIRED</bcp14>): a 32-bit unsigned integer</t>
        <t>Version name (<bcp14>REQUIRED</bcp14>): A short text string naming the version being
identified.</t>
        <t>Reference (<bcp14>REQUIRED</bcp14>): A reference to a relevant specification
document.</t>
        <t>The policy for allocation of new entries <bcp14>SHOULD</bcp14> be: IETF Review.</t>
        <t>The initial contents of this registry shall be as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Version ID</th>
              <th align="left">Version name</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x0</td>
              <td align="left">Reserved</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="left">0x1</td>
              <td align="left">Roughtime version 1</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="left">0x2-0x7fffffff</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">0x80000000-0xffffffff</td>
              <td align="left">Reserved for Private</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">or Experimental use</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="roughtime-tag-registry">
        <name>Roughtime Tag Registry</name>
        <t>IANA is requested to create a new top-level registry entitled "Roughtime Tag
Registry".  Entries <bcp14>SHALL</bcp14> have the following fields:</t>
        <t>Tag (<bcp14>REQUIRED</bcp14>): A 32-bit unsigned integer in hexadecimal format.</t>
        <t>ASCII Representation (<bcp14>REQUIRED</bcp14>): The ASCII representation of the tag
in accordance with <xref target="type-tag"/> of this memo.</t>
        <t>Reference (<bcp14>REQUIRED</bcp14>): A reference to a relevant specification
document.</t>
        <t>The policy for allocation of new entries in this registry <bcp14>SHOULD</bcp14> be:
Specification Required.</t>
        <t>The initial contents of this registry <bcp14>SHALL</bcp14> be as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="right">Tag</th>
              <th align="left">ASCII Representation</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">0x00474953</td>
              <td align="left">SIG</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x00524556</td>
              <td align="left">VER</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x00565253</td>
              <td align="left">SRV</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x434e4f4e</td>
              <td align="left">NONC</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x454c4544</td>
              <td align="left">DELE</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x45505954</td>
              <td align="left">TYPE</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x48544150</td>
              <td align="left">PATH</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x49444152</td>
              <td align="left">RADI</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x4b425550</td>
              <td align="left">PUBK</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x5044494d</td>
              <td align="left">MIDP</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x50455253</td>
              <td align="left">SREP</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x53524556</td>
              <td align="left">VERS</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x544e494d</td>
              <td align="left">MINT</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x544f4f52</td>
              <td align="left">ROOT</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x54524543</td>
              <td align="left">CERT</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x5458414d</td>
              <td align="left">MAXT</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x58444e49</td>
              <td align="left">INDX</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x5a5a5a5a</td>
              <td align="left">ZZZZ</td>
              <td align="left">[[this memo]]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="roughtime-malfeasance-mime-type">
        <name>Roughtime Malfeasance MIME type</name>
        <t>IANA is requested to register the "application/roughtime-malfeasance+json" media
type.</t>
      </section>
      <section anchor="roughtime-server-list-mime-type">
        <name>Roughtime Server List MIME type</name>
        <t>IANA is requested to register the "application/roughtime-server+json" media
type.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC20">
          <front>
            <title>ASCII format for network interchange</title>
            <author fullname="V.G. Cerf" initials="V.G." surname="Cerf"/>
            <date month="October" year="1969"/>
          </front>
          <seriesInfo name="STD" value="80"/>
          <seriesInfo name="RFC" value="20"/>
          <seriesInfo name="DOI" value="10.17487/RFC0020"/>
        </reference>
        <reference anchor="RFC791">
          <front>
            <title>Internet Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="791"/>
          <seriesInfo name="DOI" value="10.17487/RFC0791"/>
        </reference>
        <reference anchor="RFC8085">
          <front>
            <title>UDP Usage Guidelines</title>
            <author fullname="L. Eggert" initials="L." surname="Eggert"/>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="G. Shepherd" initials="G." surname="Shepherd"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>The User Datagram Protocol (UDP) provides a minimal message-passing transport that has no inherent congestion control mechanisms. This document provides guidelines on the use of UDP for the designers of applications, tunnels, and other protocols that use UDP. Congestion control guidelines are a primary focus, but the document also provides guidance on other topics, including message sizes, reliability, checksums, middlebox traversal, the use of Explicit Congestion Notification (ECN), Differentiated Services Code Points (DSCPs), and ports.</t>
              <t>Because congestion control is critical to the stable operation of the Internet, applications and other protocols that choose to use UDP as an Internet transport must employ mechanisms to prevent congestion collapse and to establish some degree of fairness with concurrent traffic. They may also need to implement additional mechanisms, depending on how they use UDP.</t>
              <t>Some guidance is also applicable to the design of other protocols (e.g., protocols layered directly on IP or via IP-based tunnels), especially when these protocols do not themselves provide congestion control.</t>
              <t>This document obsoletes RFC 5405 and adds guidelines for multicast UDP usage.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="145"/>
          <seriesInfo name="RFC" value="8085"/>
          <seriesInfo name="DOI" value="10.17487/RFC8085"/>
        </reference>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
        <reference anchor="RFC8032">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="RFC6234">
          <front>
            <title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="May" year="2011"/>
            <abstract>
              <t>Federal Information Processing Standard, FIPS</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6234"/>
          <seriesInfo name="DOI" value="10.17487/RFC6234"/>
        </reference>
        <reference anchor="RFC9170">
          <front>
            <title>Long-Term Viability of Protocol Extension Mechanisms</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The ability to change protocols depends on exercising the extension and version-negotiation mechanisms that support change. This document explores how regular use of new protocol features can ensure that it remains possible to deploy changes to a protocol. Examples are given where lack of use caused changes to be more difficult or costly.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9170"/>
          <seriesInfo name="DOI" value="10.17487/RFC9170"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC4291">
          <front>
            <title>IP Version 6 Addressing Architecture</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
              <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4291"/>
          <seriesInfo name="DOI" value="10.17487/RFC4291"/>
        </reference>
        <reference anchor="RFC9844">
          <front>
            <title>Entering IPv6 Zone Identifiers in User Interfaces</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="August" year="2025"/>
            <abstract>
              <t>This document describes how the zone identifier of an IPv6 scoped address, defined in the IPv6 Scoped Address Architecture specification (RFC 4007), should be entered into a user interface. This document obsoletes RFC 6874 and updates RFCs 4007, 7622, and 8089.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9844"/>
          <seriesInfo name="DOI" value="10.17487/RFC9844"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC1738">
          <front>
            <title>Uniform Resource Locators (URL)</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <author fullname="M. McCahill" initials="M." surname="McCahill"/>
            <date month="December" year="1994"/>
            <abstract>
              <t>This document specifies a Uniform Resource Locator (URL), the syntax and semantics of formalized information for location and access of resources via the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1738"/>
          <seriesInfo name="DOI" value="10.17487/RFC1738"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="Merkle" target="https://doi.org/10.1007/3-540-48184-2_32">
          <front>
            <title>A Digital Signature Based on a Conventional Encryption Function</title>
            <author initials="R. C." surname="Merkle" fullname="Ralph C. Merkle">
              <organization>Elxsi</organization>
            </author>
            <date year="1988"/>
          </front>
          <seriesInfo name="in" value="Pomerance, C. (eds) Advances in Cryptology"/>
          <seriesInfo name="Lecture Notes in Computer Science" value="vol 293"/>
          <seriesInfo name="DOI" value="10.1007/3-540-47184-2_32"/>
        </reference>
        <reference anchor="RFC738">
          <front>
            <title>Time server</title>
            <author fullname="K. Harrenstien" initials="K." surname="Harrenstien"/>
            <date month="October" year="1977"/>
          </front>
          <seriesInfo name="RFC" value="738"/>
          <seriesInfo name="DOI" value="10.17487/RFC0738"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC8915">
          <front>
            <title>Network Time Security for the Network Time Protocol</title>
            <author fullname="D. Franke" initials="D." surname="Franke"/>
            <author fullname="D. Sibold" initials="D." surname="Sibold"/>
            <author fullname="K. Teichel" initials="K." surname="Teichel"/>
            <author fullname="M. Dansarie" initials="M." surname="Dansarie"/>
            <author fullname="R. Sundblad" initials="R." surname="Sundblad"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This memo specifies Network Time Security (NTS), a mechanism for using Transport Layer Security (TLS) and Authenticated Encryption with Associated Data (AEAD) to provide cryptographic security for the client-server mode of the Network Time Protocol (NTP).</t>
              <t>NTS is structured as a suite of two loosely coupled sub-protocols. The first (NTS Key Establishment (NTS-KE)) handles initial authentication and key establishment over TLS. The second (NTS Extension Fields for NTPv4) handles encryption and authentication during NTP time synchronization via extension fields in the NTP packets, and holds all required state only on the client via opaque cookies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8915"/>
          <seriesInfo name="DOI" value="10.17487/RFC8915"/>
        </reference>
        <reference anchor="RFC9523">
          <front>
            <title>A Secure Selection and Filtering Mechanism for the Network Time Protocol with Khronos</title>
            <author fullname="N. Rozen-Schiff" initials="N." surname="Rozen-Schiff"/>
            <author fullname="D. Dolev" initials="D." surname="Dolev"/>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="M. Schapira" initials="M." surname="Schapira"/>
            <date month="February" year="2024"/>
            <abstract>
              <t>The Network Time Protocol version 4 (NTPv4), as defined in RFC 5905, is the mechanism used by NTP clients to synchronize with NTP servers across the Internet. This document describes a companion application to the NTPv4 client, named "Khronos", that is used as a "watchdog" alongside NTPv4 and that provides improved security against time-shifting attacks. Khronos involves changes to the NTP client's system process only. Since it does not affect the wire protocol, the Khronos mechanism is applicable to current and future time protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9523"/>
          <seriesInfo name="DOI" value="10.17487/RFC9523"/>
        </reference>
      </references>
    </references>
    <?line 951?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Aanchal Malhotra and Adam Langley authored early drafts of this memo.
Daniel Franke, Sarah Grant, Martin Langer, Ben Laurie, Peter Löthberg,
Michael McCourt, Hal Murray, Tal Mizrahi, Ruben Nijveld, Christopher
Patton, Thomas Peterson, Rich Salz, Dieter Sibold, Ragnar Sundblad,
Kristof Teichel, Luke Valenta, David Venhoek, Ulrich Windl, and the
other members of the NTP working group contributed comments and
suggestions as well as pointed out errors. We appreciate the last call
commentators, especially Colin Perkins for providing advice on transport
considerations.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
