<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.32 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ntp-roughtime-18" category="exp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Roughtime</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-roughtime-18"/>
    <author fullname="Watson Ladd">
      <organization>Akamai Technologies</organization>
      <address>
        <email>watsonbladd@gmail.com</email>
      </address>
    </author>
    <author fullname="Marcus Dansarie">
      <organization>Netnod</organization>
      <address>
        <email>marcus@dansarie.se</email>
        <uri>https://orcid.org/0000-0001-9246-0263</uri>
      </address>
    </author>
    <date year="2026" month="March" day="16"/>
    <area>Internet</area>
    <workgroup>Network Time Protocols</workgroup>
    <keyword>timing</keyword>
    <keyword>authenticity</keyword>
    <keyword>roughtime</keyword>
    <abstract>
      <?line 51?>

<t>This document describes Roughtime, an experimental protocol that aims
to achieve two things: secure rough time synchronization even for
clients without any idea of what time it is, and give clients a format
for reporting any inconsistencies they observe between timeservers.
This document specifies the on-wire protocol required for these goals,
and discusses aspects of the ecosystem needed for it to work.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ntp-roughtime/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-ntp/draft-roughtime"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Time synchronization is essential to Internet security as many
security protocols and other applications require it <xref target="RFC738"/>.
Unfortunately, widely deployed protocols such as the Network Time
Protocol (NTP) <xref target="RFC5905"/> lack essential security features, and even
newer protocols like Network Time Security (NTS) <xref target="RFC8915"/> lack
mechanisms to observe that the servers behave correctly. Furthermore,
clients may lack even a basic idea of the time, creating bootstrapping
problems as time is required for X.509 certificate validation.</t>
      <t>The primary design goal of Roughtime is to permit devices to obtain a
rough idea of the current time from a fairly static configuration and
to enable them to report any inconsistencies they observe between
servers. The configuration consists of a list of servers and their
associated long-term keys, which ideally remain unchanged throughout a
server's lifetime. This makes the long-term public keys the roots of
trust in Roughtime. With a sufficiently long list of trusted servers
and keys, a client will be able to acquire authenticated time with
high probability, even after long periods of inactivity. Proofs of
malfeasance constructed by chaining together responses from different
trusted servers can be used to prove misbehavior by a server and,
after analysis, result in revoking trust in that particular key.</t>
      <t>Unlike Khronos <xref target="RFC9523"/>, Roughtime produces external evidence that
timeservers are reporting incompatible times. This requires changes to
the format of the timestamps and hence cannot be a mere extension to
NTP.</t>
      <t>Operational experience is needed to evaluate the viability of using
Roughtime for secure time bootstrapping in Internet-connected systems.
This includes the need for experience with maintaining a Roughtime
ecosystem with services that maintain and distribute lists of trusted
servers and process malfeasance reports. To facilitate the experiments
necessary to gain that experience, this document is limited to
describing the Roughtime on-wire protocol. Apart from describing the
server list and malfeasance report formats, this document does not
describe the ecosystem, nor the means by which the server list is
maintained and distributed or the policies to apply to such a list.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <t>Roughtime is a protocol for authenticated rough time synchronization
that enables clients to provide cryptographic proof of server
malfeasance. It does so by having responses from servers include a
signature over a value derived from the client's request, which
includes a nonce. This provides cryptographic proof that the response
was issued after the server received the client's request. The derived
value included in the server's response is the root of a Merkle tree
<xref target="Merkle"/> which includes the hash value of the client's request as
the value of one of its leaf nodes. This enables the server to
amortize the relatively costly signing operation over a number of
client requests.</t>
      <section anchor="single-server-mode">
        <name>Single Server Mode</name>
        <t>At its most basic level, Roughtime is a one-round protocol in which a
completely fresh client requests the current time and the server sends
a signed response. The response includes a timestamp and a radius used
to indicate the server's certainty about the reported time.</t>
        <t>The client's request contains a nonce which the server incorporates
into its signed response. The client can verify the server's
signatures and—provided that the nonce has sufficient
entropy—this proves that the signed response could only have
been generated after the nonce.</t>
      </section>
      <section anchor="multi-server-mode">
        <name>Multi Server Mode</name>
        <t>When using multiple servers, a client can detect, cryptographically
prove, and report inconsistencies between different servers.</t>
        <t>A Roughtime server guarantees that the timestamp included in the
response to a request is generated after the reception of the request
and prior to the transmission of the associated response. If the time
response from a server is not consistent with time responses from
other servers, this indicates server error or intentional malfeasance
that can be reported and potentially used to impeach the server.</t>
        <t>Proofs of malfeasance are constructed by chaining requests to
different Roughtime servers. Details on proofs and malfeasance
reporting are provided in <xref target="roughtime-clients"/>. For the reporting to
result in impeachment, an additional mechanism is required that
provides a review and impeachment process. Defining such a mechanism
is beyond the scope of this document. A simple option could be an
online forum where a court of human observers evaluate cases after
reviewing input reports.</t>
      </section>
    </section>
    <section anchor="message-format">
      <name>Message Format</name>
      <t>Roughtime messages are maps consisting of one or more (tag, value)
pairs. They start with a header, which contains the number of pairs,
the value offsets, and the tags. The header is followed by a message
values section which contains the values associated with the tags in
the header. Messages are formatted according to <xref target="figmessage"/> as
described in the following sections.</t>
      <t>In some cases, messages are recursive, i.e. the value of a tag can
itself be a Roughtime message.</t>
      <figure anchor="figmessage">
        <name>Roughtime Message</name>
        <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                   Number of pairs, N (uint32)                 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
.                                                               .
.                     N-1 offsets (uint32)                      .
.                                                               .
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
.                                                               .
.                        N tags (uint32)                        .
.                                                               .
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
.                                                               .
.                           N values                            .
.                                                               .
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <section anchor="data-types">
        <name>Data types</name>
        <section anchor="uint32">
          <name>uint32</name>
          <t>A uint32 is a 32-bit unsigned integer. It is serialized with the least
significant byte first.</t>
        </section>
        <section anchor="uint64">
          <name>uint64</name>
          <t>A uint64 is a 64-bit unsigned integer. It is serialized with the least
significant byte first.</t>
        </section>
        <section anchor="type-tag">
          <name>Tag</name>
          <t>Tags are used to identify values in Roughtime messages. A tag is a
sequence of four octets. Each tag sequence starts with one to four
capital ASCII letters (A-Z) <xref target="RFC20"/> followed by zero to three
padding zero octets. Throughout this document, tags are referred to by
their ASCII string representation. However, they are registered and
sorted as uint32 values, where the least significant byte is the first
octet in the sequence.</t>
          <t>For example, the ASCII string "NONC" would correspond to the uint32
0x434e4f4e which is serialized as {0x4e, 0x4f, 0x4e, 0x43}. "VER"
would correspond to 0x00524556 and be serialized as
{0x56, 0x45, 0x52, 0x00}.</t>
        </section>
        <section anchor="timestamp">
          <name>Timestamp</name>
          <t>A timestamp is a representation of UTC time as a uint64 count of
seconds since 00:00:00 on 1 January 1970 (the Unix epoch), assuming
every day has 86400 seconds. This is a constant offset from the NTP
timestamp in seconds. Leap seconds do not have an unambiguous
representation in a timestamp, and this has implications for the
attainable accuracy and setting of the RADI tag (see
<xref target="response-srep"/>).</t>
        </section>
      </section>
      <section anchor="header">
        <name>Header</name>
        <t>As illustrated in <xref target="figmessage"/>, the first four bytes of the header
is the uint32 number of tags <tt>N</tt>, and hence of (tag, value) pairs. The
following <tt>4*(N-1)</tt> bytes are offsets, each a uint32, and the last
<tt>4*N</tt> bytes in the header are tags.</t>
        <t>The offsets array is considered to have an implicitly encoded value of
0 as its zeroth entry. Its members refer to the positions of the tag
values in the message values section. All offsets are multiples of
four.</t>
        <t>The members of the offsets and tags arrays, as well as the message
values section are sorted in ascending order by the tag's uint32
value. As a consequence, the offset array is also sorted in ascending
order. A tag <bcp14>MUST NOT</bcp14> appear more than once in a header.</t>
        <t>The first post-header byte, i.e. the first byte of the message values
section, is at offset 0. The value associated with the ith tag begins
at offset[i] and ends at offset[i+1]-1, with the exception of the last
value which ends at the end of the message. Values <bcp14>MAY</bcp14> have zero
length. All lengths and offsets are in bytes.</t>
      </section>
    </section>
    <section anchor="protocol-details">
      <name>Protocol Details</name>
      <t>As described in <xref target="protocol-overview"/>, clients initiate time
synchronization by sending requests containing a nonce to servers who
send signed time responses in return. Roughtime packets can be sent
between clients and servers either as UDP datagrams or via TCP
streams. Servers <bcp14>SHOULD</bcp14> support both the UDP and TCP transport modes.</t>
      <t>Roughtime packets are formatted according to <xref target="figpack"/> and as
described here. The first field is a uint64 with the value
0x4d49544847554f52 ("ROUGHTIM" in ASCII). The second field is a uint32
and contains the length of the third field. The third and last field
contains a Roughtime message as specified in <xref target="message-format"/>.</t>
      <figure anchor="figpack">
        <name>Roughtime packet</name>
        <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  0x4d49544847554f52 (uint64)                  |
|                        ("ROUGHTIM")                           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Message length (uint32)                    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
.                                                               .
.                      Roughtime message                        .
.                                                               .
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <t>Roughtime request and response packets <bcp14>MUST</bcp14> be transmitted in a single
datagram when the UDP transport mode is used. Setting the packet's
Don't Fragment bit <xref target="RFC791"/> is <bcp14>OPTIONAL</bcp14> in IPv4 networks. Setting
it may cause packets to get dropped, but not setting it could lead to
long delays due to reconstruction and dropped fragments.</t>
      <t>A Roughtime packet could exceed the maximum deliverable length of a
packet on a particular path, making Roughtime queries over UDP
impossible on that path. A client <bcp14>SHOULD</bcp14> attempt to use the TCP
transport mode for Roughtime queries to a server if it does not
receive responses to its UDP queries.</t>
      <t>Clients <bcp14>MUST</bcp14> implement exponential backoff in establishing TCP
connections and making requests over UDP. It is <bcp14>RECOMMENDED</bcp14> that
clients use an initial retry interval of 1 second, a maximum interval
of 24 hours, and a base of 1.5. Therefore, the minimum interval, in
seconds, before retrying after <tt>n</tt> failures is <tt>min(1.5^{n-1},
86400)</tt>. Guidance for implementers considering other values can be
found in Section 3.1.3 of <xref target="RFC8085"/>.</t>
      <t>Clients <bcp14>MUST NOT</bcp14> reset the retry interval until they receive a
properly signed response.</t>
      <t>Multiple requests and responses can be exchanged over an established
TCP connection. Clients <bcp14>MAY</bcp14> send multiple outstanding requests and
servers <bcp14>MAY</bcp14> send responses out of order. The connection <bcp14>SHOULD</bcp14> be
closed by the client when it has no more requests to send and has
received all expected responses. Either side <bcp14>SHOULD</bcp14> close the
connection in response to synchronization, format,
implementation-defined timeouts, or other errors.</t>
      <t>All requests and responses contain the VER tag. It contains a list of
one or more uint32 version numbers. The version of Roughtime specified
by this document has version number 1.</t>
      <t>NOTE TO RFC EDITOR: remove this paragraph before publication. For
testing this draft of the document, a version number of 0x8000000c is
used.</t>
      <section anchor="requests">
        <name>Requests</name>
        <t>A request contains the tags VER, NONC, and TYPE. It <bcp14>SHOULD</bcp14> include the
tag SRV. Unknown tags <bcp14>MUST</bcp14> be ignored by the server. Requests not
containing the three mandatory tags <bcp14>MUST</bcp14> be ignored. A future version
of this protocol may mandate additional tags in the message and assign
them semantic meaning.</t>
        <t>The size of the request message <bcp14>SHOULD</bcp14> be at least 1024 bytes when the
UDP transport mode is used. To attain this size, the ZZZZ tag is added
to the message. A reason for sending request messages smaller could be
to use the UDP transport mode over paths with low maximum deliverable
length. However, responding to request messages shorter than 1024
bytes is <bcp14>OPTIONAL</bcp14> and servers <bcp14>MUST NOT</bcp14> send responses larger than the
request messages they are replying to; see <xref target="amplification-attacks"/>.</t>
        <section anchor="request-ver">
          <name>VER</name>
          <t>In a request, the VER tag contains a list of uint32 version numbers.
The VER tag <bcp14>MUST</bcp14> include at least one Roughtime version supported by
the client and <bcp14>MUST NOT</bcp14> contain more than 32 version numbers. The
version numbers and tags included in the request <bcp14>MUST</bcp14> be compatible
with each other and the packet contents.</t>
          <t>The version numbers <bcp14>MUST NOT</bcp14> repeat and <bcp14>MUST</bcp14> be sorted in ascending
numerical order.</t>
          <t>Servers <bcp14>MUST</bcp14> ignore any unknown version numbers in the list supplied
by the client. If the list contains no version numbers supported by
the server, it <bcp14>MAY</bcp14> respond with another version or ignore the request
entirely, see <xref target="response-srep"/>.</t>
        </section>
        <section anchor="nonc">
          <name>NONC</name>
          <t>The value of the NONC tag is a 32-byte nonce. It <bcp14>SHOULD</bcp14> be generated
in a manner indistinguishable from random. BCP 106 <xref target="RFC4086"/>
contains specific guidelines regarding this. <xref target="measurement-sequence"/>
describes how to securely generate nonces when querying multiple
servers in sequence.</t>
        </section>
        <section anchor="type">
          <name>TYPE</name>
          <t>The TYPE tag is used to unambiguously distinguish between request and
response messages. In a request, it <bcp14>MUST</bcp14> contain a uint32 with value
0. Requests containing a TYPE tag with any other value <bcp14>MUST</bcp14> be ignored
by servers.</t>
        </section>
        <section anchor="srv">
          <name>SRV</name>
          <t>The SRV tag is used by the client to indicate which long-term public
key it expects to verify the response with. The value of the SRV tag
is <tt>H(0xff || public_key)</tt> where <tt>public_key</tt> is the server's
long-term, 32-byte Ed25519 public key and <tt>H</tt> is SHA-512 truncated to
the first 32 bytes.</t>
        </section>
        <section anchor="zzzz">
          <name>ZZZZ</name>
          <t>The ZZZZ tag is used to expand the request to the minimum required
length. Its value is all zero bytes.</t>
        </section>
      </section>
      <section anchor="responses">
        <name>Responses</name>
        <t>The server begins the request handling process with a set of long-term
keys. It resolves which long-term key to use with the following
procedure:</t>
        <ol spacing="normal" type="1"><li>
            <t>If the request contains a SRV tag, then the server looks up the
long-term key indicated by the SRV value. If no such key exists,
then the server <bcp14>MUST</bcp14> ignore the request.</t>
          </li>
          <li>
            <t>If the request contains no SRV tag, but the server has just one
long-term key, it <bcp14>SHOULD</bcp14> select that key. Otherwise, if the server
has multiple long-term keys, then it <bcp14>MUST</bcp14> ignore the request.</t>
          </li>
        </ol>
        <t>A response contains the tags SIG, NONC, TYPE, PATH, SREP, CERT, and
INDX. The structure of a response message is illustrated in
<xref target="figresponse"/>.</t>
        <figure anchor="figresponse">
          <name>Roughtime response message structure.</name>
          <artwork><![CDATA[
|--SIG
|--NONC
|--TYPE
|--PATH
|--SREP
|  |--VER
|  |--RADI
|  |--MIDP
|  |--VERS
|  |--ROOT
|--CERT
|  |--SIG
|  |--DELE
|  |  |--PUBK
|  |  |--MINT
|  |  |--MAXT
|--INDX
]]></artwork>
        </figure>
        <t>No mechanism for reporting errors—such as wrong request format,
unsupported version, or unknown SRV value—back to the client is
provided. This is based on experience from the NTP protocol, where
Kiss-o'-Death packets (see Section 7.4 of <xref target="RFC5905"/>) are used to
indicate errors. The existence of this unauthenticated protocol
feature in NTP makes it possible for on-path attackers to make a
client stop using authenticated modes or certain servers altogether
(see Section 5.4 of <xref target="RFC8633"/> and Sections 8.3 and 8.7 of
<xref target="RFC8915"/>). Considering the protocol's dependence on multiple
independent servers for security, error reporting functionality has
been excluded from this version of Roughtime.</t>
        <section anchor="sig">
          <name>SIG</name>
          <t>In general, a SIG tag value is a 64-byte Ed25519 signature
<xref target="RFC8032"/> over a concatenation of a signature context ASCII string
and the entire value of a tag. All context strings include a
terminating zero byte.</t>
          <t>The SIG tag in the root of a response is a signature over the SREP
value using the public key contained in CERT and the context string
"RoughTime v1 response signature".</t>
        </section>
        <section anchor="nonc-1">
          <name>NONC</name>
          <t>The NONC tag contains the nonce of the message being responded to.</t>
        </section>
        <section anchor="type-1">
          <name>TYPE</name>
          <t>In a response, the TYPE tag <bcp14>MUST</bcp14> contain a uint32 with value 1.
Responses containing a TYPE tag with any other value <bcp14>MUST</bcp14> be ignored
by clients.</t>
        </section>
        <section anchor="path">
          <name>PATH</name>
          <t>The PATH tag value is a multiple of 32 bytes long and represents a
path of 32-byte hash values in the Merkle tree used to generate the
ROOT value as described in <xref target="merkle-tree"/>. In the case where a
response is prepared for a single request and the Merkle tree contains
only the root node, the size of PATH is zero.</t>
          <t>The PATH <bcp14>MUST NOT</bcp14> contain more than 32 hash values. The maximum length
of PATH is normally limited by the maximum size of the response
message, see <xref target="requests"/> and <xref target="amplification-attacks"/>. Server
implementations <bcp14>MUST</bcp14> select a maximum Merkle tree height (see
<xref target="merkle-tree"/>) that ensures this.</t>
        </section>
        <section anchor="response-srep">
          <name>SREP</name>
          <t>The SREP tag contains a signed response. Its value is a Roughtime
message with the tags VER, RADI, MIDP, VERS, and ROOT.</t>
          <t>The VER tag, when used in a response, contains a single uint32 version
number. It <bcp14>SHOULD</bcp14> be one of the version numbers supplied by the client
in its request; see <xref target="request-ver"/>. The server <bcp14>MUST</bcp14> ensure that the
version number corresponds with the rest of the packet contents.</t>
          <t>The RADI tag value is a uint32 representing the server's estimate of
the accuracy of MIDP in seconds. Servers <bcp14>MUST</bcp14> ensure that the true
time is within <tt>(MIDP-RADI, MIDP+RADI)</tt> at the moment of processing.
The value of RADI <bcp14>MUST NOT</bcp14> be zero. Since leap seconds cannot be
unambiguously represented by Roughtime timestamps, servers <bcp14>MUST</bcp14> take
this into account when setting the RADI value during leap second
events. Servers that do not have any leap second information <bcp14>SHOULD</bcp14>
set the value of RADI to at least 3. Failure to do so will impact the
observed correctness of Roughtime servers and can lead to malfeasance
reports.</t>
          <t>The MIDP tag value is the timestamp of the moment of processing.</t>
          <t>The VERS tag value contains a list of uint32 version numbers supported
by the server, sorted in ascending numerical order. It <bcp14>MUST</bcp14> contain
the version number specified in the VER tag. It <bcp14>MUST NOT</bcp14> contain more
than 32 version numbers.</t>
          <t>The ROOT tag contains a 32-byte value of a Merkle tree root as
described in <xref target="merkle-tree"/>.</t>
        </section>
        <section anchor="cert">
          <name>CERT</name>
          <t>The CERT tag contains a public-key certificate signed with the
server's private long-term key. Its value is a Roughtime message with
the tags SIG and DELE, where SIG is a signature over the DELE value
with the context string "RoughTime v1 delegation signature".</t>
          <t>The DELE tag contains a delegated public-key certificate used by the
server to sign the SREP tag. Its value is a Roughtime message with the
tags PUBK, MINT, and MAXT. The purpose of the DELE tag is to enable
separation of a long-term public key from keys on devices exposed to
the public Internet.</t>
          <t>The PUBK tag contains a temporary 32-byte Ed25519 public key which
is used to sign the SREP tag.</t>
          <t>The MINT tag is the minimum timestamp for which the key in PUBK is
trusted to sign responses. MIDP <bcp14>MUST</bcp14> be more than or equal to MINT for
a response to be considered valid.</t>
          <t>The MAXT tag is the maximum timestamp for which the key in PUBK is
trusted to sign responses. MIDP <bcp14>MUST</bcp14> be less than or equal to MAXT for
a response to be considered valid.</t>
        </section>
        <section anchor="indx">
          <name>INDX</name>
          <t>The INDX tag value is a uint32 determining the position of NONC in the
Merkle tree used to generate the ROOT value as described in
<xref target="merkle-tree"/>.</t>
        </section>
      </section>
      <section anchor="merkle-tree">
        <name>The Merkle Tree</name>
        <t>A Merkle tree <xref target="Merkle"/> is a binary tree where the value of each
non-leaf node is a hash value derived from its two children. The root
of the tree is thus dependent on all leaf nodes.</t>
        <t>In Roughtime, each leaf node in the Merkle tree represents one
request. Leaf nodes are indexed left to right, beginning with zero.</t>
        <t>The values of all nodes are calculated from the leaf nodes and up
towards the root node using the first 32 bytes of the output of the
SHA-512 hash algorithm <xref target="RFC6234"/>. For leaf nodes, the byte 0x00 is
prepended to the full value of the client's request packet, including
the "ROUGHTIM" header, before applying the hash function. For all
other nodes, the byte 0x01 is concatenated with first the left and
then the right child node value before applying the hash function.</t>
        <t>The value of the Merkle tree's root node is included in the ROOT tag
of the response.</t>
        <t>The index of a request leaf node is included in the INDX tag of the
response.</t>
        <t>The values of all sibling nodes in the path between a request leaf
node and the root node are stored in the PATH tag so that the client
can reconstruct and validate the value in the ROOT tag using its
request packet. These values are each 32 bytes and are stored one
after the other with no additional padding or structure. The order in
which they are stored is described in the next section.</t>
        <section anchor="check-algorithm">
          <name>Root Value Validity Check Algorithm</name>
          <t>This section describes how to compute the value of the root of the
Merkle tree from the values in the tags PATH, INDX, and NONC. The bits
of INDX are ordered from least to most significant. <tt>H(x)</tt> denotes the
first 32 bytes of the SHA-512 hash digest of <tt>x</tt> and <tt>||</tt> denotes
concatenation.</t>
          <t>The algorithm maintains a current value <tt>h</tt>. At initialization, <tt>h</tt> is
set to <tt>H(0x00 || request_packet)</tt>. For each step of the algorithm,
let node be the next 32 bytes in PATH. If the current bit in INDX is 0
then <tt>h = H(0x01 || h || node)</tt>, else <tt>h = H(0x01 || node || h)</tt>.
When no more entries remain in PATH, <tt>h</tt> is compared to the value of
the root of the Merkle tree contained in ROOT. If they are equal, the
algorithm succeeds. If they are not, or if any of the remaining bits
of INDX is non-zero, the algorithm fails.</t>
        </section>
      </section>
      <section anchor="validity-of-response">
        <name>Validity of Response</name>
        <t>A client <bcp14>MUST</bcp14> check the following properties when it receives a
response. We assume the long-term server public key is known to the
client through other means.</t>
        <t>The signature in CERT was made with the long-term key of the server.</t>
        <t>The MIDP timestamp lies in the interval specified by the MINT and MAXT
timestamps.</t>
        <t>The INDX and PATH values prove a hash value derived from the request
packet was included in the Merkle tree with value ROOT using the
algorithm in <xref target="check-algorithm"/>.</t>
        <t>The signature of SREP in SIG validates with the public key in DELE.</t>
        <t>A response that passes these checks is said to be valid. Validity of a
response does not prove that the timestamp's value in the response is
correct, but merely that the server guarantees that it signed the
timestamp and computed its signature during the time interval
<tt>(MIDP-RADI, MIDP+RADI)</tt>.</t>
      </section>
    </section>
    <section anchor="integration-into-ntp">
      <name>Integration into NTP</name>
      <t>We assume that there is a bound <tt>phi</tt> on the frequency error in the
clock on the machine. Let <tt>delta</tt> be the time difference between the
clock on the client and the clock on the server and let <tt>sigma</tt>
represent the error in the measured value of delta introduced by the
measurement process. Given a measurement taken at a local time <tt>t</tt>, we
know the true time is in <tt>(t-delta-sigma, t-delta+sigma)</tt>. After <tt>d</tt>
seconds have elapsed we know the true time is within
<tt>(t-delta-sigma-d*phi, t-delta+sigma+d*phi)</tt>.</t>
      <t>This bound can be used as a simple and effective means to limit the
error an attacker can introduce into NTP or Precision Time Protocol
(PTP) measurements. For example, an NTP client can ensure that its
observation intervals fall entirely within this range or reject
measurements that fall outside.</t>
      <t>An application that needs to verify X.509 certificates (which requires
knowledge of the current time), but lacks an accurate and trusted time
source can use Roughtime to obtain a time estimate. In particular,
securely establishing NTS-protected NTP time synchronization requires
verification of the NTS-KE server's certificate, which is not possible
if the client has no idea of the current time (see Section 8.5 of
<xref target="RFC8915"/>). In that case, a Roughtime time estimate can be used for
certificate validation.</t>
      <t>If an NTP server uses a Roughtime server as a time source for
synchronization (and not only for filtering its NTP measurements), the
root dispersion <bcp14>SHOULD</bcp14> include the server's RADI value and root delay
<bcp14>SHOULD</bcp14> include the interval between sending the Roughtime request and
receiving the response.</t>
    </section>
    <section anchor="grease">
      <name>Grease</name>
      <t>The primary purpose of grease is to prevent protocol ossification,
which could prohibit future protocol extensions and development
<xref target="RFC9170"/>. In Roughtime, grease is also intended to ensure that
clients validate signatures. To grease the Roughtime protocol, servers
<bcp14>SHOULD</bcp14> send back a fraction of responses with any of the following:
lack of mandatory tags, version numbers not in the request, undefined
tags, or invalid signatures together with incorrect times. Clients
<bcp14>MUST</bcp14> properly ignore undefined tags and reject invalid responses.
Servers <bcp14>MUST NOT</bcp14> send back responses with incorrect times and valid
signatures. Either signature <bcp14>MAY</bcp14> be invalid for this application.</t>
    </section>
    <section anchor="roughtime-clients">
      <name>Roughtime Clients</name>
      <section anchor="necessary-configuration">
        <name>Necessary configuration</name>
        <t>To carry out a Roughtime measurement, a client needs a list of
servers, a minimum of three of which are operational and not run by
the same parties. Roughtime clients <bcp14>SHOULD</bcp14> regularly update their view
of which servers are trustworthy in order to benefit from the
detection of misbehavior (see <xref target="server-lists"/>). Clients <bcp14>SHOULD</bcp14> also
have a means of reporting to the provider of such a list, such as an
operating system or software vendor, a malfeasance report as described
in <xref target="malfeasance-reporting"/>.</t>
      </section>
      <section anchor="measurement-sequence">
        <name>Measurement Sequence</name>
        <t>The client randomly selects at least three servers from the list, and
sequentially queries them. To ensure that all possible inconsistencies
can be detected, it is necessary for clients to repeat the query
sequence twice with the servers in the same order.</t>
        <t>The first probe uses a nonce that is randomly generated. The second
query uses <tt>H(resp || rand)</tt> where <tt>rand</tt> is a random 32-byte value
and <tt>resp</tt> is the entire response to the first probe, including the
"ROUGHTIM" header. Each subsequent query uses <tt>H(resp || rand)</tt> for
the previous response and a different 32-byte <tt>rand</tt> value. <tt>H(x)</tt> and
<tt>||</tt> are defined as in <xref target="check-algorithm"/>.</t>
        <t>For each pair of responses <tt>(i, j)</tt>, where <tt>i</tt> was received before
<tt>j</tt>, the client <bcp14>MUST</bcp14> check that <tt>MIDP_i-RADI_i</tt> is less than or equal
to <tt>MIDP_j+RADI_j</tt>. If these checks pass, the times are consistent
with causal ordering. The measurement succeeds if the validity checks
described in <xref target="validity-of-response"/> are successful, the times
reported are consistent with causal ordering, and the delay between
request and response is within an implementation-dependent maximum
value.</t>
        <t>If the validity checks are successful, but at least one of the
responses is not consistent with causal ordering, there has been a
malfeasance. In case of detected malfeasance, clients <bcp14>SHOULD</bcp14>, if it is
technically possible, generate a malfeasance report (see
<xref target="malfeasance-reporting"/>), alert the user, and make another
measurement. See <xref target="protocol-details"/> for guidance on backoff when
making repeated measurements.</t>
      </section>
      <section anchor="server-lists">
        <name>Server Lists</name>
        <t>To facilitate regular updates of lists of trusted servers, a common
server list format is specified here. Support for the common server
list format is <bcp14>OPTIONAL</bcp14> and clients <bcp14>MAY</bcp14> instead implement their own
mechanisms for configuring server lists.</t>
        <t>A server list is a JSON <xref target="RFC8259"/> object that contains the key
"servers". Server list objects <bcp14>MAY</bcp14> also contain the keys "sources" and
"reports". <xref target="appendix-server-list"/> contains an example server list in
the format described here.</t>
        <t>Server lists have the "application/roughtime-server+json" media
type.</t>
        <t>The value of the "servers" key is a list of server objects, each
containing the keys "name", "version", "publicKeyType", "publicKey",
and "addresses".</t>
        <t>The value of "name" is a string that contains a server name suitable
for display to a user.</t>
        <t>The value of "version" is an integer that indicates the highest
Roughtime version number supported by the server.</t>
        <t>NOTE TO RFC EDITOR: remove this paragraph before publication. To
indicate compatibility with drafts of this document, a decimal
representation of the version number indicated in <xref target="protocol-details"/>
          <bcp14>SHOULD</bcp14> be used. For indicating compatibility with pre-IETF
specifications of Roughtime, the version number 3000600613 <bcp14>SHOULD</bcp14> be
used.</t>
        <t>The value of "publicKeyType" is a string indicating the signature
scheme used by the server. The value for servers supporting version 1
of Roughtime is "ed25519".</t>
        <t>The value of "publicKey" is a base64-encoded <xref target="RFC4648"/> string
representing the long-term public key of the server in a format
consistent with the value of "publicKeyType".</t>
        <t>The value of "addresses" is a list of address objects. An address
object contains the keys "protocol" and "address". The value of
"protocol" is either "tcp" or "udp", indicating the transport mode to
use. The value of "address" is a string indicating a host and a port
number, separated by a colon character, for example
"roughtime.example.com:2002". The host part is either an IPv4 address,
an IPv6 address, or a fully qualified domain name (FQDN). IPv4
addresses are specified in dotted decimal notation. IPv6 addresses
<bcp14>MUST</bcp14> conform to the "Text Representation of Addresses" <xref target="RFC4291"/>
and <bcp14>MUST NOT</bcp14> include zone identifiers <xref target="RFC9844"/>. To disambiguate
IPv6 addresses from ports when zero compression happens, IPv6
addresses are encapsulated within []. The port part is a decimal
integer representing a valid port number, i.e. in the range 0-65535.</t>
        <t>The value of "sources", if present, is a list of strings indicating
where updated versions of the list may be acquired using the HTTP GET
method <xref target="RFC9110"/>. Each string is a URL <xref target="RFC3986"/> pointing to a
list in the format specified here. The URI scheme <bcp14>MUST</bcp14> be HTTPS
<xref target="RFC9110"/>.</t>
        <t>The value of "reports", if present, is a string indicating a URL
<xref target="RFC3986"/> where malfeasance reports can be sent by clients using
the HTTP POST method. The URI scheme <bcp14>MUST</bcp14> be HTTPS <xref target="RFC9110"/>.</t>
      </section>
      <section anchor="malfeasance-reporting">
        <name>Malfeasance Reporting</name>
        <t>A malfeasance report is cryptographic proof that a sequence of
responses arrived in that order. It can be used to demonstrate that at
least one server sent the wrong time.</t>
        <section anchor="malfeasance-report-structure">
          <name>Malfeasance Report Format</name>
          <t>A malfeasance report is a JSON <xref target="RFC8259"/> object that contains the
key "responses". Its value is a list of response objects, sorted in
the order received. Each response object contains the keys "rand",
"publicKey", "request", and "response". The values of all four keys
are represented as base64-encoded <xref target="RFC4648"/> strings.
<xref target="appendix-malfeasance-report"/> contains an example malfeasance report
in the format described here.</t>
          <t>Malfeasance reports have the "application/roughtime-malfeasance+json"
media type.</t>
          <t>The "rand" key <bcp14>MAY</bcp14> be omitted from the first response object in the
list. In all other cases, its value is the 32-byte value used to
generate the request nonce value from the previous response packet.</t>
          <t>The value of "publicKey" is the long-term key that the server was
expected to use for deriving the response signature.</t>
          <t>The value of "request" is the transmitted request packet, including
the "ROUGHTIM" header.</t>
          <t>The value of "response" is the received response packet, including the
"ROUGHTIM" header.</t>
        </section>
        <section anchor="reporting">
          <name>Reporting</name>
          <t>When the client's list of servers has an associated URL for
malfeasance reports, it <bcp14>SHOULD</bcp14> send a malfeasance report to that URL
when malfeasance is detected (see <xref target="measurement-sequence"/>) and it is
technically feasible to do so. Malfeasance reports are sent using the
HTTP POST method <xref target="RFC9110"/>.</t>
          <t>Since the failure of a popular Roughtime server can cause numerous
clients to send malfeasance reports at the same time, clients <bcp14>MUST</bcp14> use
exponential backoff to prevent overloading the server receiving the
reports. It is <bcp14>RECOMMENDED</bcp14> that clients use an initial retry interval
of 10 seconds, a maximum interval of 24 hours, and a base of 1.5.
Therefore, the minimum interval, in seconds, before retrying after <tt>n</tt>
failures is <tt>min(10 * 1.5^(n-1), 86400)</tt>.</t>
          <t>Clients <bcp14>MUST NOT</bcp14> send malfeasance reports in response to signature
verification failures or any other protocol errors.</t>
          <t>As described in <xref target="introduction"/>, the operational rules for acceptance
or rejection of a particular malfeasance report are beyond the scope
of this document.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="confidentiality">
        <name>Confidentiality</name>
        <t>This protocol does not provide any confidentiality. Given the nature
of timestamps, such impact is minor.</t>
      </section>
      <section anchor="integrity-and-authenticity">
        <name>Integrity and Authenticity</name>
        <t>The Roughtime protocol only provides integrity and authenticity
protection for data contained in the SREP tag. Accordingly, new tags
<bcp14>SHOULD</bcp14> be added to the SREP tag whenever possible.</t>
      </section>
      <section anchor="generating-private-keys">
        <name>Generating Private Keys</name>
        <t>Although any random 256-bit string can be used as a private Ed25519
key, it has a high risk of being vulnerable to small-subgroup attacks
and timing side-channel leaks. For this reason, all private keys used
in Roughtime <bcp14>MUST</bcp14> be generated following the procedure described in
Section 5.1.5 of <xref target="RFC8032"/>.</t>
      </section>
      <section anchor="private-key-compromise">
        <name>Private Key Compromise</name>
        <t>The compromise of a PUBK's private key, even past MAXT, is a problem
as the private key can be used to sign invalid times that are in the
range MINT to MAXT, and thus violate the good-behavior guarantee of
the server. To protect against this, it is necessary for clients to
query multiple servers in accordance with the procedure described in
<xref target="measurement-sequence"/>.</t>
      </section>
      <section anchor="quantum-resistance">
        <name>Quantum Resistance</name>
        <t>Since the only supported signature scheme, Ed25519, is not quantum
resistant, the Roughtime version described in this document will not
survive the advent of quantum computers. A later version will have to
be devised and implemented before then. The use of a single version
number as negotiation point rather than defining a suite of acceptable
signatures is intended to prevent fragmentation and misconfiguration.</t>
      </section>
      <section anchor="maintaining-lists-of-servers">
        <name>Maintaining Lists of Servers</name>
        <t>The infrastructure and procedures for maintaining a list of trusted
servers and adjudicating violations of the rules by servers is not
discussed in this document and is essential for security.</t>
      </section>
      <section anchor="amplification-attacks">
        <name>Amplification Attacks</name>
        <t>UDP protocols that send responses significantly larger than requests,
such as NTP, have previously been leveraged for amplification attacks.
To prevent Roughtime from being used for such attacks, servers <bcp14>MUST
NOT</bcp14> send response packets larger than the request packets sent by
clients.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>This protocol is designed to obscure all client identifiers. Servers
necessarily have persistent long-term identities essential to
enforcing correct behavior. Generating nonces in a nonrandom manner
can cause leaks of private data or enable tracking of clients as they
move between networks.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>It is expected that clients identify a server by its long-term public
key. In multi-tenancy environments, where multiple servers may be
listening on the same IP or port space, the protocol is designed so
that the client indicates which server it expects to respond. This is
done with the SRV tag. Additional recommendations for clients are
listed in <xref target="roughtime-clients"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="service-name-and-transport-protocol-port-number-registry">
        <name>Service Name and Transport Protocol Port Number Registry</name>
        <t>IANA is requested to allocate the following entry in the Service
Name and Transport Protocol Port Number Registry:</t>
        <t>Service Name: roughtime</t>
        <t>Transport Protocol: tcp,udp</t>
        <t>Assignee: IESG <eref target="mailto:iesg@ietf.org">iesg@ietf.org</eref></t>
        <t>Contact: IETF Chair <eref target="mailto:chair@ietf.org">chair@ietf.org</eref></t>
        <t>Description: Roughtime time synchronization</t>
        <t>Reference: [[this document]]</t>
        <t>Port Number: [[TBD1]], selected by IANA from the User Port range</t>
      </section>
      <section anchor="roughtime-versions-registry">
        <name>Roughtime Versions Registry</name>
        <t>IANA is requested to create a new registry titled "Roughtime
Versions" in a new "Roughtime" registry group. Entries will have the
following fields:</t>
        <t>Version ID (<bcp14>REQUIRED</bcp14>): a 32-bit unsigned integer</t>
        <t>Version name (<bcp14>REQUIRED</bcp14>): A short text string naming the version being
identified.</t>
        <t>Reference (<bcp14>REQUIRED</bcp14>): A reference to a relevant specification
document.</t>
        <t>The policy for allocation of new entries is IETF Review <xref target="RFC8126"/>.</t>
        <t>The initial contents of this registry are specified in
<xref target="tab-versions"/>.</t>
        <table anchor="tab-versions">
          <name>Initial contents of the Roughtime Versions registry.</name>
          <thead>
            <tr>
              <th align="left">Version ID</th>
              <th align="left">Version name</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x0</td>
              <td align="left">Reserved</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="left">0x1</td>
              <td align="left">Roughtime version 1</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="left">0x2-0x7fffffff</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">0x80000000-0xbfffffff</td>
              <td align="left">Reserved for experimental use</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="left">0xc0000000-0xffffffff</td>
              <td align="left">Reserved for private use</td>
              <td align="left">[[this document]]</td>
            </tr>
          </tbody>
        </table>
        <t>Private and experimental use are defined in <xref target="RFC8126"/>. The
experimental range is intended for testing and evaluating new versions
of the Roughtime protocol. Such tests may be conducted over the open
Internet.</t>
      </section>
      <section anchor="roughtime-tags-registry">
        <name>Roughtime Tags Registry</name>
        <t>IANA is requested to create a new registry titled "Roughtime Tags" in
a new "Roughtime" registry group. Entries will have the following
fields:</t>
        <t>Tag (<bcp14>REQUIRED</bcp14>): A 32-bit unsigned integer in hexadecimal format.</t>
        <t>ASCII Representation (<bcp14>REQUIRED</bcp14>): The ASCII representation of the tag
in accordance with <xref target="type-tag"/> of this document.</t>
        <t>Reference (<bcp14>REQUIRED</bcp14>): A reference to a relevant specification
document.</t>
        <t>The policy for allocation of new entries in this registry is
Specification Required <xref target="RFC8126"/>.</t>
        <t>The initial contents of this registry are specified in <xref target="tab-tags"/>.</t>
        <table anchor="tab-tags">
          <name>Initial contents of the Roughtime Tags registry.</name>
          <thead>
            <tr>
              <th align="right">Tag</th>
              <th align="left">ASCII Representation</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">0x00474953</td>
              <td align="left">SIG</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x00524556</td>
              <td align="left">VER</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x00565253</td>
              <td align="left">SRV</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x434e4f4e</td>
              <td align="left">NONC</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x454c4544</td>
              <td align="left">DELE</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x45505954</td>
              <td align="left">TYPE</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x48544150</td>
              <td align="left">PATH</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x49444152</td>
              <td align="left">RADI</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x4b425550</td>
              <td align="left">PUBK</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x5044494d</td>
              <td align="left">MIDP</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x50455253</td>
              <td align="left">SREP</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x53524556</td>
              <td align="left">VERS</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x544e494d</td>
              <td align="left">MINT</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x544f4f52</td>
              <td align="left">ROOT</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x54524543</td>
              <td align="left">CERT</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x5458414d</td>
              <td align="left">MAXT</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x58444e49</td>
              <td align="left">INDX</td>
              <td align="left">[[this document]]</td>
            </tr>
            <tr>
              <td align="right">0x5a5a5a5a</td>
              <td align="left">ZZZZ</td>
              <td align="left">[[this document]]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="media-type-registry">
        <name>Media Type Registry</name>
        <section anchor="roughtime-server-list-mime-type">
          <name>Roughtime Server List MIME type</name>
          <t>IANA is requested to allocate the following entry in the Media Type
registry.</t>
          <t>Type name: application</t>
          <t>Subtype name: roughtime-server+json</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: N/A</t>
          <t>Encoding considerations: Encoding considerations are identical to
those specified for the "application/json" media type, see
<xref target="RFC8259"/>.</t>
          <t>Security considerations: <xref target="security-considerations"/> of
[[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: <xref target="server-lists"/> of [[this document]].</t>
          <t>Applications that use this media type: Roughtime clients
[[this document]] that update their lists of Roughtime servers.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:<br/>
  Deprecated alias names for this type: N/A<br/>
  Magic number(s): N/A<br/>
  File extension(s): N/A<br/>
  Macintosh file type code(s): N/A</t>
          <t>Person &amp; email address to contact for further information: See
Authors' Addresses section of [[this document]].</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: See Authors' Addresses section of [[this document]].</t>
          <t>Change controller: Internet Engineering Task Force</t>
        </section>
        <section anchor="roughtime-malfeasance-mime-type">
          <name>Roughtime Malfeasance MIME type</name>
          <t>IANA is requested to allocate the following entry in the Media Type
registry.</t>
          <t>Type name: application</t>
          <t>Subtype name: roughtime-malfeasance+json</t>
          <t>Required parameters: N/A</t>
          <t>Optional parameters: N/A</t>
          <t>Encoding considerations: Encoding considerations are identical to
those specified for the "application/json" media type, see
<xref target="RFC8259"/>.</t>
          <t>Security considerations: <xref target="security-considerations"/> of
[[this document]].</t>
          <t>Interoperability considerations: N/A</t>
          <t>Published specification: <xref target="malfeasance-report-structure"/> of
[[this document]].</t>
          <t>Applications that use this media type: Roughtime clients
[[this document]] use this media type to report cryptographic proof
that a Roughtime server has sent the wrong time.</t>
          <t>Fragment identifier considerations: N/A</t>
          <t>Additional information:<br/>
  Deprecated alias names for this type: N/A<br/>
  Magic number(s): N/A<br/>
  File extension(s): N/A<br/>
  Macintosh file type code(s): N/A</t>
          <t>Person &amp; email address to contact for further information: See
Authors' Addresses section of [[this document]].</t>
          <t>Intended usage: COMMON</t>
          <t>Restrictions on usage: N/A</t>
          <t>Author: See Authors' Addresses section of [[this document]].</t>
          <t>Change controller: Internet Engineering Task Force</t>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC8915">
          <front>
            <title>Network Time Security for the Network Time Protocol</title>
            <author fullname="D. Franke" initials="D." surname="Franke"/>
            <author fullname="D. Sibold" initials="D." surname="Sibold"/>
            <author fullname="K. Teichel" initials="K." surname="Teichel"/>
            <author fullname="M. Dansarie" initials="M." surname="Dansarie"/>
            <author fullname="R. Sundblad" initials="R." surname="Sundblad"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This memo specifies Network Time Security (NTS), a mechanism for using Transport Layer Security (TLS) and Authenticated Encryption with Associated Data (AEAD) to provide cryptographic security for the client-server mode of the Network Time Protocol (NTP).</t>
              <t>NTS is structured as a suite of two loosely coupled sub-protocols. The first (NTS Key Establishment (NTS-KE)) handles initial authentication and key establishment over TLS. The second (NTS Extension Fields for NTPv4) handles encryption and authentication during NTP time synchronization via extension fields in the NTP packets, and holds all required state only on the client via opaque cookies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8915"/>
          <seriesInfo name="DOI" value="10.17487/RFC8915"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC20">
          <front>
            <title>ASCII format for network interchange</title>
            <author fullname="V.G. Cerf" initials="V.G." surname="Cerf"/>
            <date month="October" year="1969"/>
          </front>
          <seriesInfo name="STD" value="80"/>
          <seriesInfo name="RFC" value="20"/>
          <seriesInfo name="DOI" value="10.17487/RFC0020"/>
        </reference>
        <reference anchor="RFC791">
          <front>
            <title>Internet Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="791"/>
          <seriesInfo name="DOI" value="10.17487/RFC0791"/>
        </reference>
        <reference anchor="RFC8085">
          <front>
            <title>UDP Usage Guidelines</title>
            <author fullname="L. Eggert" initials="L." surname="Eggert"/>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="G. Shepherd" initials="G." surname="Shepherd"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>The User Datagram Protocol (UDP) provides a minimal message-passing transport that has no inherent congestion control mechanisms. This document provides guidelines on the use of UDP for the designers of applications, tunnels, and other protocols that use UDP. Congestion control guidelines are a primary focus, but the document also provides guidance on other topics, including message sizes, reliability, checksums, middlebox traversal, the use of Explicit Congestion Notification (ECN), Differentiated Services Code Points (DSCPs), and ports.</t>
              <t>Because congestion control is critical to the stable operation of the Internet, applications and other protocols that choose to use UDP as an Internet transport must employ mechanisms to prevent congestion collapse and to establish some degree of fairness with concurrent traffic. They may also need to implement additional mechanisms, depending on how they use UDP.</t>
              <t>Some guidance is also applicable to the design of other protocols (e.g., protocols layered directly on IP or via IP-based tunnels), especially when these protocols do not themselves provide congestion control.</t>
              <t>This document obsoletes RFC 5405 and adds guidelines for multicast UDP usage.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="145"/>
          <seriesInfo name="RFC" value="8085"/>
          <seriesInfo name="DOI" value="10.17487/RFC8085"/>
        </reference>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
        <reference anchor="RFC8633">
          <front>
            <title>Network Time Protocol Best Current Practices</title>
            <author fullname="D. Reilly" initials="D." surname="Reilly"/>
            <author fullname="H. Stenn" initials="H." surname="Stenn"/>
            <author fullname="D. Sibold" initials="D." surname="Sibold"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is one of the oldest protocols on the Internet and has been widely used since its initial publication. This document is a collection of best practices for the general operation of NTP servers and clients on the Internet. It includes recommendations for the stable, accurate, and secure operation of NTP infrastructure. This document is targeted at NTP version 4 as described in RFC 5905.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="223"/>
          <seriesInfo name="RFC" value="8633"/>
          <seriesInfo name="DOI" value="10.17487/RFC8633"/>
        </reference>
        <reference anchor="RFC8032">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="RFC6234">
          <front>
            <title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="May" year="2011"/>
            <abstract>
              <t>Federal Information Processing Standard, FIPS</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6234"/>
          <seriesInfo name="DOI" value="10.17487/RFC6234"/>
        </reference>
        <reference anchor="RFC9170">
          <front>
            <title>Long-Term Viability of Protocol Extension Mechanisms</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The ability to change protocols depends on exercising the extension and version-negotiation mechanisms that support change. This document explores how regular use of new protocol features can ensure that it remains possible to deploy changes to a protocol. Examples are given where lack of use caused changes to be more difficult or costly.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9170"/>
          <seriesInfo name="DOI" value="10.17487/RFC9170"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC4291">
          <front>
            <title>IP Version 6 Addressing Architecture</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
              <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4291"/>
          <seriesInfo name="DOI" value="10.17487/RFC4291"/>
        </reference>
        <reference anchor="RFC9844">
          <front>
            <title>Entering IPv6 Zone Identifiers in User Interfaces</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="August" year="2025"/>
            <abstract>
              <t>This document describes how the zone identifier of an IPv6 scoped address, defined in the IPv6 Scoped Address Architecture specification (RFC 4007), should be entered into a user interface. This document obsoletes RFC 6874 and updates RFCs 4007, 7622, and 8089.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9844"/>
          <seriesInfo name="DOI" value="10.17487/RFC9844"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="Merkle" target="https://doi.org/10.1007/3-540-48184-2_32">
          <front>
            <title>A Digital Signature Based on a Conventional Encryption Function</title>
            <author initials="R. C." surname="Merkle" fullname="Ralph C. Merkle">
              <organization>Elxsi</organization>
            </author>
            <date year="1988"/>
          </front>
          <seriesInfo name="in" value="Pomerance, C. (eds) Advances in Cryptology"/>
          <seriesInfo name="Lecture Notes in Computer Science" value="vol 293"/>
          <seriesInfo name="DOI" value="10.1007/3-540-48184-2_32"/>
        </reference>
        <reference anchor="RFC738">
          <front>
            <title>Time server</title>
            <author fullname="K. Harrenstien" initials="K." surname="Harrenstien"/>
            <date month="October" year="1977"/>
          </front>
          <seriesInfo name="RFC" value="738"/>
          <seriesInfo name="DOI" value="10.17487/RFC0738"/>
        </reference>
        <reference anchor="RFC9523">
          <front>
            <title>A Secure Selection and Filtering Mechanism for the Network Time Protocol with Khronos</title>
            <author fullname="N. Rozen-Schiff" initials="N." surname="Rozen-Schiff"/>
            <author fullname="D. Dolev" initials="D." surname="Dolev"/>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="M. Schapira" initials="M." surname="Schapira"/>
            <date month="February" year="2024"/>
            <abstract>
              <t>The Network Time Protocol version 4 (NTPv4), as defined in RFC 5905, is the mechanism used by NTP clients to synchronize with NTP servers across the Internet. This document describes a companion application to the NTPv4 client, named "Khronos", that is used as a "watchdog" alongside NTPv4 and that provides improved security against time-shifting attacks. Khronos involves changes to the NTP client's system process only. Since it does not affect the wire protocol, the Khronos mechanism is applicable to current and future time protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9523"/>
          <seriesInfo name="DOI" value="10.17487/RFC9523"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
    </references>
    <?line 1089?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Aanchal Malhotra and Adam Langley authored early drafts of this
document. Daniel Franke, Sarah Grant, Erik Kline, Martin Langer, Ben
Laurie, Peter Löthberg, Michael McCourt, Hal Murray, Tal Mizrahi,
Ruben Nijveld, Christopher Patton, Thomas Peterson, Rich Salz, Dieter
Sibold, Ragnar Sundblad, Kristof Teichel, Luke Valenta, David Venhoek,
Ulrich Windl, and the other members of the NTP working group
contributed comments and suggestions as well as pointed out errors. We
also acknowledge the helpful comments and suggestions provided by the
last call reviewers and members of the IESG.</t>
    </section>
    <section numbered="false" anchor="appendix-server-list">
      <name>Appendix A. Example Server List</name>
      <t>This appendix presents an example Roughtime server list in the format
described by <xref target="server-lists"/>.</t>
      <t>NOTE TO RFC EDITOR: replace all occurrences of the port number 2002
below with the port number assigned for Roughtime by IANA.</t>
      <artwork><![CDATA[
{
  "servers": [
    {
      "name": "example.com Roughtime server",
      "version": 1,
      "publicKeyType": "ed25519",
      "publicKey": "2O3mkkheDExCuhG+ZNIoWmO/IdCdLzADgUn8SnC4hME=",
      "addresses": [
        {
          "protocol": "udp",
          "address": "roughtime.example.com:2002"
        },
        {
          "protocol": "tcp",
          "address": "roughtime.example.com:2002"
        }
      ]
    },
    {
      "name": "A UDP-only server specified with IP addresses",
      "version": 1,
      "publicKeyType": "ed25519",
      "publicKey": "ZYfeGa94YuG1IZrV3kR9+8/nmZ2lX2XyHmiSb+wI0OY=",
      "addresses": [
        {
          "protocol": "udp",
          "address": "192.0.2.33:2002"
        },
        {
          "protocol": "udp",
          "address": "[2001:db8::2:33]:2002"
        }
      ]
    }
  ],
  "sources": [
    "https://www.example.net/roughtime/ecosystem.json",
    "https://www.example.org/roughtime/ecosystem.json"
  ],
  "reports":  "https://www.example.net/roughtime/malfeasance"
}
]]></artwork>
    </section>
    <section numbered="false" anchor="appendix-malfeasance-report">
      <name>Appendix B. Example Malfeasance Report</name>
      <t>This appendix presents an example Roughtime malfeasance report in the
format described by <xref target="malfeasance-report-structure"/>. The report
provides sufficient information to prove that the server with the
public key <tt>lRhHag6fn2wZQ6idy10ChgpRgks3gvdMM2hWNeJNgXg=</tt> responded
with a time that is inconsistent with the times reported by the two
other servers.</t>
      <artwork><![CDATA[
{
  "responses": [
    {
      "publicKey": "FnDyLV/68ephhLdFJbdEGCdkVvpXDaVe5PYvRDdlOOY=",
      "request": "Uk9VR0hUSU0ABAAABQAAAAQAAAAkAAAARAAAAEgAAABWRVIAU1JW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==",
      "response": "Uk9VR0hUSU2UAQAABwAAAEAAAABgAAAAZAAAAGQAAADAAAAAWAE
AAFNJRwBOT05DVFlQRVBBVEhTUkVQQ0VSVElORFhBWL64CToGs4v/4UtfN/80HLFiA09vG
IDRP/zTjcTj8/1DlZWCsVja6RlfwaYnc1wfJqThfhcuSDonrTGyKngBMGH2UGU3otTJ7rO
CGKpJYzDI2bQi5zFDFbfNMyvCPh0BAAAABQAAAAQAAAAIAAAAEAAAABQAAABWRVIAUkFES
U1JRFBWRVJTUk9PVAEAAAADAAAAQ0u4aQAAAAABAAAAc86AWYB/O3Kxzsx4d5P5cbSOftJ
UA8bWVtVrQ3tc+b0CAAAAQAAAAFNJRwBERUxFI2B5tbj5ePjVKYE0PAL1NmgZOAsqh/E2f
rom9Ol5BAnVcLje0C6exbXY8hE3dRvYV01Alru8Ocle+jOZT5r8AwMAAAAgAAAAKAAAAFB
VQktNSU5UTUFYVKqljhhqi4A54vW20e+slwViPyxybNnqKXzimIiIUHQMaBCvaQAAAADYy
d9pAAAAAAAAAAA="
    },
    {
      "publicKey": "l9cdSuR8dFxtG9aJo9pWzUXaX8pftNG4UDC45Qk3znc=",
      "rand": "v/DirVBRQLGtictYD7mN3px02UlMT4J3haTRomt1NNM=",
      "request": "Uk9VR0hUSU0ABAAABQAAAAQAAAAkAAAARAAAAEgAAABWRVIAU1JW
AE5PTkNUWVBFWlpaWgEAAABFCvadUKPN/U9OXqFalVFnv/EhsAuPPpBYfo5MDULZKv335k
bNTZcsYLM96o77yLbvvRk1fm2TQB4yKxbP1jzeAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
==",
      "response": "Uk9VR0hUSU2UAQAABwAAAEAAAABgAAAAZAAAAGQAAADAAAAAWAE
AAFNJRwBOT05DVFlQRVBBVEhTUkVQQ0VSVElORFj+2I02cCBAfDYzP+8znW6bICqVrAF23
xNLfM+Qycmkpfp1+BQSb4l/6mRll66l2VIfPSQzigl2V5OJgQzGEBcG/ffmRs1Nlyxgsz3
qjvvItu+9GTV+bZNAHjIrFs/WPN4BAAAABQAAAAQAAAAIAAAAEAAAABQAAABWRVIAUkFES
U1JRFBWRVJTUk9PVAEAAAADAAAAw/m2aQAAAAABAAAAS8ROJoXIPSlO9yN+uREb+/UiOJJ
qCjx3VWZ/vD2FqBMCAAAAQAAAAFNJRwBERUxFw0MFQMiDoHySot8rlnV83Vqaa3qTrAY15
W1TzqNuAurOvreNw08BfUwxF7BQ/b/JCwCQcqtD5uRYsvikvuyLCwMAAAAgAAAAKAAAAFB
VQktNSU5UTUFYVCQs/eCxtWjVrXyse0SeojyZdNFkOwe3B3nLHtHJZK/9gRCvaQAAAADxy
d9pAAAAAAAAAAA="
    },
    {
      "publicKey": "lRhHag6fn2wZQ6idy10ChgpRgks3gvdMM2hWNeJNgXg=",
      "rand": "lMvMVoLsakxc5ZmMzEFQ8hh1FaDo2gCXXIX/L4QPSxQ=",
      "request": "Uk9VR0hUSU0ABAAABQAAAAQAAAAkAAAARAAAAEgAAABWRVIAU1JW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==",
      "response": "Uk9VR0hUSU2UAQAABwAAAEAAAABgAAAAZAAAAGQAAADAAAAAWAE
AAFNJRwBOT05DVFlQRVBBVEhTUkVQQ0VSVElORFg8MlhdCJeQ2qzN6b9q646W9kB+XmAdS
g7ToU1gj3AD8AP8eCHfduMBE0E8j4/LqWIr72zWQx8Y1U/1uxs97yMAvgO4ggK+gJZPAJq
6kF9w4TBX5GoFYHovUlQaf6i3z70BAAAABQAAAAQAAAAIAAAAEAAAABQAAABWRVIAUkFES
U1JRFBWRVJTUk9PVAEAAAADAAAAw/m2aQAAAAABAAAA6ho4+0Cml+VJbqU7hsF717uusV2
HYvRbU9CdjJE/Zn0CAAAAQAAAAFNJRwBERUxFM9Fvq8T9kOrxcS7jviCPHe44HX/75Je1h
afPJ0f8NoASy29EgD7C0c/LMxXiXxEwyuxYTPN9oseAr9XIt68uDwMAAAAgAAAAKAAAAFB
VQktNSU5UTUFYVMxBDiNG247IO4onsGcjFHsA3vP+arl+s0lBLhXw0c1RlBCvaQAAAAAEy
t9pAAAAAAAAAAA="
    }
  ]
}
]]></artwork>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
