<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ntp-roughtime-14" category="exp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.1 -->
  <front>
    <title>Roughtime</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-roughtime-14"/>
    <author fullname="Watson Ladd">
      <organization>Akamai Technologies</organization>
      <address>
        <email>watsonbladd@gmail.com</email>
      </address>
    </author>
    <author fullname="Marcus Dansarie">
      <organization>Netnod</organization>
      <address>
        <email>marcus@dansarie.se</email>
        <uri>https://orcid.org/0000-0001-9246-0263</uri>
      </address>
    </author>
    <date year="2025" month="April" day="22"/>
    <area>Internet</area>
    <workgroup>Network Time Protocols</workgroup>
    <keyword>timing</keyword>
    <keyword>authenticity</keyword>
    <keyword>roughtime</keyword>
    <abstract>
      <?line 51?>

<t>This document describes Roughtime—a protocol that aims to
achieve two things: secure rough time synchronization even for clients
without any idea of what time it is, and giving clients a format by
which to report any inconsistencies they observe between time servers.
This document specifies the on-wire protocol required for these goals,
and discusses aspects of the ecosystem needed for it to work.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ntp-roughtime/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-ntp/draft-roughtime"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Time synchronization is essential to Internet security as many
security protocols and other applications require synchronization
<xref target="RFC738"/>. Unfortunately, widely deployed protocols such as
the Network Time Protocol (NTP) <xref target="RFC5905"/> lack essential security
features, and even newer protocols like Network Time Security (NTS)
<xref target="RFC8915"/> lack mechanisms to observe that the servers behave
correctly. Furthermore, clients may lack even a basic idea of the
time, creating bootstrapping problems.</t>
      <t>The primary design goal of Roughtime is to permit devices to obtain a
rough idea of the current time from fairly static configuration and to
enable them to report any inconsistencies they observe between
servers. The configuration consists of a list of servers and their
associated long-term keys, which ideally remain unchanged throughout a
server's lifetime. This makes the long-term public keys the roots of
trust in Roughtime. With a sufficiently long list of trusted servers
and keys, a client will be able to acquire authenticated time with
high probability, even after long periods of inactivity. Proofs of
malfeasance constructed by chaining together responses from different
trusted servers can be used to prove misbehavior by a server, thereby
revoking trust in that particular key.</t>
      <t>This memo is limited to describing the Roughtime on-wire protocol.
Apart from describing the server list and malfeasance report formats,
this memo does not describe the ecosystem required for maintaining
lists of trusted servers and processing malfeasance reports.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <t>Roughtime is a protocol for authenticated rough time synchronization
that enables clients to provide cryptographic proof of server
malfeasance. It does so by having responses from servers include a
signature over a value derived from the client's request, which
includes a nonce. This provides cryptographic proof that the timestamp
was issued after the server received the client's request. The derived
value included in the server's response is the root of a Merkle tree
<xref target="Merkle"/> which includes the hash value of the client's request as
the value of one of its leaf nodes. This enables the server to
amortize the relatively costly signing operation over a number of
client requests.</t>
      <section anchor="single-server-mode">
        <name>Single Server Mode</name>
        <t>At its most basic level, Roughtime is a one round protocol in which a
completely fresh client requests the current time and the server sends
a signed response. The response includes a timestamp and a radius used
to indicate the server's certainty about the reported time.</t>
        <t>The client's request contains a nonce which the server incorporates
into its signed response. The client can verify the server's
signatures and—provided that the nonce has sufficient
entropy—this proves that the signed response could only have
been generated after the nonce.</t>
      </section>
      <section anchor="multi-server-mode">
        <name>Multi Server Mode</name>
        <t>When using multiple servers, a client can detect, cryptographically
prove, and report inconsistencies between different servers.</t>
        <t>A Roughtime server guarantees that the timestamp included in the response
to a query is generated after the reception of the query and prior to
the transmission of the associated response. If the time response from
a server is not consistent with time responses from other servers,
this indicates server error or intentional malfeasance that can be
reported and potentially used to impeach the server.</t>
        <t>Proofs of malfeasance are constructed by chaining requests to
different Roughtime servers. Details on proofs and malfeasance
reporting are provided in <xref target="roughtime-clients"/>. For the reporting to
result in impeachment, an additional mechanism is required that
provides a review and impeachment process. Defining such a mechanism
is beyond the scope of this document. A simple option could be an
online forum where a court of human observers judge cases after
reviewing input reports.</t>
      </section>
    </section>
    <section anchor="message-format">
      <name>Message Format</name>
      <t>Roughtime messages are maps consisting of one or more (tag, value)
pairs. They start with a header, which contains the number of pairs,
the tags, and value offsets. The header is followed by a message
values section which contains the values associated with the tags in
the header. Messages <bcp14>MUST</bcp14> be formatted according to <xref target="figmessage"/> as
described in the following sections.</t>
      <t>Messages <bcp14>MAY</bcp14> be recursive, i.e. the value of a tag can itself be a
Roughtime message.</t>
      <figure anchor="figmessage">
        <name>Roughtime Message</name>
        <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                   Number of pairs, N (uint32)                 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
.                                                               .
.                     N-1 offsets (uint32)                      .
.                                                               .
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
.                                                               .
.                        N tags (uint32)                        .
.                                                               .
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
.                                                               .
.                           N Values                            .
.                                                               .
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <section anchor="data-types">
        <name>Data types</name>
        <section anchor="uint32">
          <name>uint32</name>
          <t>A uint32 is a 32 bit unsigned integer. It is serialized
with the least significant byte first.</t>
        </section>
        <section anchor="uint64">
          <name>uint64</name>
          <t>A uint64 is a 64 bit unsigned integer. It is serialized with the least
significant byte first.</t>
        </section>
        <section anchor="type-tag">
          <name>Tag</name>
          <t>Tags are used to identify values in Roughtime messages. A tag is a
uint32 but can also be represented as a sequence of up to four ASCII
characters <xref target="RFC20"/> with the first character in the most significant
byte. ASCII strings shorter than four characters can be unambiguously
converted to tags by padding them with zero bytes. Tags <bcp14>MUST NOT</bcp14>
contain any other bytes than capital letters (A-Z) or padding zero
bytes. For example, the ASCII string "NONC" would correspond to the
tag 0x434e4f4e and "VER" would correspond to 0x00524556.</t>
        </section>
        <section anchor="timestamp">
          <name>Timestamp</name>
          <t>A timestamp is a representation of UTC time as a uint64 count of
seconds since 00:00:00 on 1 January 1970 (the Unix epoch), assuming
every day has 86400 seconds. This is a constant offset from the NTP
timestamp in seconds. Leap seconds do not have an unambiguous
representation in a timestamp, and this has implications for the
attainable accuracy and setting of the RADI tag.</t>
        </section>
      </section>
      <section anchor="header">
        <name>Header</name>
        <t>All Roughtime messages start with a header. The first four bytes of
the header is the uint32 number of tags N, and hence of (tag, value)
pairs.</t>
        <t>The following 4*(N-1) bytes are offsets, each a uint32. The last 4*N
bytes in the header are tags. Offsets refer to the positions of the
values in the message values section. All offsets <bcp14>MUST</bcp14> be multiples of
four and placed in increasing order. The first post-header byte is at
offset 0. The offset array is considered to have a not explicitly
encoded value of 0 as its zeroth entry.</t>
        <t>The value associated with the ith tag begins at offset[i] and ends at
offset[i+1]-1, with the exception of the last value which ends at the
end of the message. Values may have zero length. All lengths and
offsets are in bytes.</t>
        <t>Tags <bcp14>MUST</bcp14> be listed in the same order as the offsets of their values
and be sorted in ascending order by numeric value. A tag <bcp14>MUST NOT</bcp14>
appear more than once in a header.</t>
      </section>
    </section>
    <section anchor="protocol-details">
      <name>Protocol Details</name>
      <t>As described in <xref target="protocol-overview"/>, clients initiate time
synchronization by sending requests containing a nonce to servers who
send signed time responses in return. Roughtime packets can be sent
between clients and servers either as UDP datagrams or via TCP
streams. Servers <bcp14>SHOULD</bcp14> support both the UDP and TCP transport modes.</t>
      <t>A Roughtime packet <bcp14>MUST</bcp14> be formatted according to <xref target="figpack"/> and as
described here. The first field is a uint64 with the value
0x4d49544847554f52 ("ROUGHTIM" in ASCII). The second field is a uint32
and contains the length of the third field. The third and last field
contains a Roughtime message as specified in <xref target="message-format"/>.</t>
      <figure anchor="figpack">
        <name>Roughtime packet</name>
        <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  0x4d49544847554f52 (uint64)                  |
|                        ("ROUGHTIM")                           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Message length (uint32)                    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
.                                                               .
.                      Roughtime message                        .
.                                                               .
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <t>Roughtime request and response packets <bcp14>MUST</bcp14> be transmitted in a single
datagram when the UDP transport mode is used. Setting the packet's
don't fragment bit <xref target="RFC791"/> is <bcp14>OPTIONAL</bcp14> in IPv4 networks.</t>
      <t>Multiple requests and responses can be exchanged over an established
TCP connection. Clients <bcp14>MAY</bcp14> send multiple requests at once and servers
<bcp14>MAY</bcp14> send responses out of order. The connection <bcp14>SHOULD</bcp14> be closed by
the client when it has no more requests to send and has received all
expected responses. Either side <bcp14>SHOULD</bcp14> close the connection in
response to synchronization, format, implementation-defined timeouts,
or other errors.</t>
      <t>All requests and responses <bcp14>MUST</bcp14> contain the VER tag. It contains a
list of one or more uint32 version numbers. The version of Roughtime
specified by this memo has version number 1.</t>
      <t>NOTE TO RFC EDITOR: remove this paragraph before publication. For
testing this draft of the memo, a version number of 0x8000000c is
used.</t>
      <section anchor="requests">
        <name>Requests</name>
        <t>A request <bcp14>MUST</bcp14> contain the tags VER, NONC, and TYPE. It <bcp14>SHOULD</bcp14> include
the tag SRV. Other tags <bcp14>SHOULD</bcp14> be ignored by the server. Requests not
containing the three mandatory tags <bcp14>MUST</bcp14> be ignored by servers. A
future version of this protocol may mandate additional tags in the
message and assign them semantic meaning.</t>
        <t>The size of the request message <bcp14>SHOULD</bcp14> be at least 1024 bytes when the
UDP transport mode is used. To attain this size the ZZZZ tag <bcp14>SHOULD</bcp14> be
added to the message. Responding to requests shorter than 1024 bytes
is <bcp14>OPTIONAL</bcp14> and servers <bcp14>MUST NOT</bcp14> send responses larger than the
requests they are replying to, see <xref target="amplification-attacks"/>.</t>
        <section anchor="ver">
          <name>VER</name>
          <t>In a request, the VER tag contains a list of uint32 version numbers.
The VER tag <bcp14>MUST</bcp14> include at least one Roughtime version supported by
the client and <bcp14>MUST NOT</bcp14> contain more than 32 version numbers. The
client <bcp14>MUST</bcp14> ensure that the version numbers and tags included in the
request are not incompatible with each other or the packet contents.</t>
          <t>The version numbers <bcp14>MUST NOT</bcp14> repeat and <bcp14>MUST</bcp14> be sorted in ascending
numerical order.</t>
          <t>Servers <bcp14>SHOULD</bcp14> ignore any unknown version numbers in the list supplied
by the client. If the list contains no version numbers supported by
the server, it <bcp14>MAY</bcp14> respond with another version or ignore the request
entirely, see <xref target="response-srep"/>.</t>
        </section>
        <section anchor="nonc">
          <name>NONC</name>
          <t>The value of the NONC tag is a 32-byte nonce. It <bcp14>SHOULD</bcp14> be generated
in a manner indistinguishable from random. BCP 106 <xref target="RFC4086"/>
contains specific guidelines regarding this.</t>
        </section>
        <section anchor="type">
          <name>TYPE</name>
          <t>The TYPE tag is used to unambiguously distinguish between request and
response messages. In a request, it <bcp14>MUST</bcp14> contain a uint32 with value
0. Requests containing a TYPE tag with any other value <bcp14>MUST</bcp14> be ignored
by servers.</t>
        </section>
        <section anchor="srv">
          <name>SRV</name>
          <t>The SRV tag is used by the client to indicate which long-term public
key it expects to verify the response with. The value of the SRV tag
is <tt>H(0xff || public_key)</tt> where <tt>public_key</tt> is the server's
long-term, 32-byte Ed25519 public key and H is SHA-512 truncated to
the first 32 bytes.</t>
        </section>
        <section anchor="zzzz">
          <name>ZZZZ</name>
          <t>The ZZZZ tag is used to expand the response to the minimum required
length. Its value <bcp14>MUST</bcp14> be all zero bytes.</t>
        </section>
      </section>
      <section anchor="responses">
        <name>Responses</name>
        <t>The server begins the request handling process with a set of long-term
keys. It resolves which long-term key to use with the following
procedure:</t>
        <ol spacing="normal" type="1"><li>
            <t>If the request contains a SRV tag, then the server looks up the
long-term key indicated by the SRV value. If no such key exists,
then the server <bcp14>MUST</bcp14> ignore the request.</t>
          </li>
          <li>
            <t>If the request contains no SRV tag, but the server has just one
long-term key, it <bcp14>SHOULD</bcp14> select that key. Otherwise, if the server
has multiple long-term keys, then it <bcp14>MUST</bcp14> ignore the request.</t>
          </li>
        </ol>
        <t>A response <bcp14>MUST</bcp14> contain the tags SIG, NONC, TYPE, PATH, SREP, CERT,
and INDX. The structure of a response message is illustrated in
<xref target="figresponse"/>.</t>
        <figure anchor="figresponse">
          <name>Roughtime response message structure.</name>
          <artwork><![CDATA[
|--SIG
|--NONC
|--TYPE
|--PATH
|--SREP
|  |--VER
|  |--RADI
|  |--MIDP
|  |--VERS
|  |--ROOT
|--CERT
|  |--DELE
|  |  |--MINT
|  |  |--MAXT
|  |  |--PUBK
|  |--SIG
|--INDX
]]></artwork>
        </figure>
        <section anchor="sig">
          <name>SIG</name>
          <t>In general, a SIG tag value is a 64-byte Ed25519 signature
<xref target="RFC8032"/> over a concatenation of a signature context ASCII string
and the entire value of a tag. All context strings <bcp14>MUST</bcp14> include a
terminating zero byte.</t>
          <t>The SIG tag in the root of a response <bcp14>MUST</bcp14> be a signature over the
SREP value using the public key contained in CERT. The context string
<bcp14>MUST</bcp14> be "RoughTime v1 response signature".</t>
        </section>
        <section anchor="nonc-1">
          <name>NONC</name>
          <t>The NONC tag <bcp14>MUST</bcp14> contain the nonce of the message being responded to.</t>
        </section>
        <section anchor="type-1">
          <name>TYPE</name>
          <t>In a response, the TYPE tag <bcp14>MUST</bcp14> contain a uint32 with value 1.
Responses containing a TYPE tag with any other value <bcp14>MUST</bcp14> be ignored
by clients.</t>
        </section>
        <section anchor="path">
          <name>PATH</name>
          <t>The PATH tag value <bcp14>MUST</bcp14> be a multiple of 32 bytes long and represent a
path of 32-byte hash values in the Merkle tree used to generate the
ROOT value as described in a <xref target="merkle-tree"/>. In the case where a
response is prepared for a single request and the Merkle tree contains
only the root node, the size of PATH <bcp14>MUST</bcp14> be zero.</t>
          <t>The PATH <bcp14>MUST NOT</bcp14> contain more than 32 hash values. The maximum length
of PATH is normally limited by the maximum size of the response
message, see <xref target="requests"/> and <xref target="amplification-attacks"/>. Server
implementations <bcp14>SHOULD</bcp14> select a maximum Merkle tree height (see
<xref target="merkle-tree"/>) that ensures this.</t>
        </section>
        <section anchor="response-srep">
          <name>SREP</name>
          <t>The SREP tag contains a signed response. Its value <bcp14>MUST</bcp14> be a Roughtime
message with the tags VER, RADI, MIDP, VERS, and ROOT.</t>
          <t>The VER tag, when used in a response, <bcp14>MUST</bcp14> contain a single uint32
version number. It <bcp14>SHOULD</bcp14> be one of the version numbers supplied by
the client in its request. The server <bcp14>MUST</bcp14> ensure that the version
number corresponds with the rest of the packet contents.</t>
          <t>The RADI tag value <bcp14>MUST</bcp14> be a uint32 representing the server's estimate
of the accuracy of MIDP in seconds. Servers <bcp14>MUST</bcp14> ensure that the true
time is within <tt>(MIDP-RADI, MIDP+RADI)</tt> at the moment of processing.
The value of RADI <bcp14>MUST NOT</bcp14> be zero. Since leap seconds can not be
unambiguously represented by Roughtime timestamps, servers <bcp14>MUST</bcp14> take
this into account when setting the RADI value during leap second
events. Servers that do not have any leap second information <bcp14>SHOULD</bcp14>
set the value of RADI to at least 3. Failure to do so will impact the
observed correctness of Roughtime servers and can lead to malfeasance
reports.</t>
          <t>The MIDP tag value <bcp14>MUST</bcp14> be the timestamp of the moment of processing.</t>
          <t>The VERS tag value <bcp14>MUST</bcp14> contain a list of uint32 version numbers
supported by the server, sorted in ascending numerical order. It <bcp14>MUST</bcp14>
contain the version number specified in the VER tag. It <bcp14>MUST NOT</bcp14>
contain more than 32 version numbers.</t>
          <t>The ROOT tag <bcp14>MUST</bcp14> contain a 32-byte value of a Merkle tree root as
described in <xref target="merkle-tree"/>.</t>
        </section>
        <section anchor="cert">
          <name>CERT</name>
          <t>The CERT tag contains a public-key certificate signed with the
server's private long-term key. Its value <bcp14>MUST</bcp14> be a Roughtime message
with the tags DELE and SIG, where SIG is a signature over the DELE
value. The context string used to generate SIG <bcp14>MUST</bcp14> be "RoughTime v1
delegation signature".</t>
          <t>The DELE tag contains a delegated public-key certificate used by the
server to sign the SREP tag. Its value <bcp14>MUST</bcp14> be a Roughtime message
with the tags MINT, MAXT, and PUBK. The purpose of the DELE tag is to
enable separation of a long-term public key from keys on devices
exposed to the public Internet.</t>
          <t>The MINT tag is the minimum timestamp for which the key in PUBK is
trusted to sign responses. MIDP <bcp14>MUST</bcp14> be more than or equal to MINT for
a response to be considered valid.</t>
          <t>The MAXT tag is the maximum timestamp for which the key in PUBK is
trusted to sign responses. MIDP <bcp14>MUST</bcp14> be less than or equal to MAXT for
a response to be considered valid.</t>
          <t>The PUBK tag <bcp14>MUST</bcp14> contain a temporary 32-byte Ed25519 public key which
is used to sign the SREP tag.</t>
        </section>
        <section anchor="indx">
          <name>INDX</name>
          <t>The INDX tag value <bcp14>MUST</bcp14> be a uint32 determining the position of NONC
in the Merkle tree used to generate the ROOT value as described in
<xref target="merkle-tree"/>.</t>
        </section>
      </section>
      <section anchor="merkle-tree">
        <name>The Merkle Tree</name>
        <t>A Merkle tree <xref target="Merkle"/> is a binary tree where the value of each
non-leaf node is a hash value derived from its two children. The root
of the tree is thus dependent on all leaf nodes.</t>
        <t>In Roughtime, each leaf node in the Merkle tree represents one
request. Leaf nodes are indexed left to right, beginning with zero.</t>
        <t>The values of all nodes are calculated from the leaf nodes and up
towards the root node using the first 32 bytes of the output of the
SHA-512 hash algorithm <xref target="RFC6234"/>. For leaf nodes, the byte 0x00 is
prepended to the full value of the client's request packet, including
the "ROUGHTIM" header, before applying the hash function. For all
other nodes, the byte 0x01 is concatenated with first the left and
then the right child node value before applying the hash function.</t>
        <t>The value of the Merkle tree's root node is included in the ROOT tag
of the response.</t>
        <t>The index of a request leaf node is included in the INDX tag of the
response.</t>
        <t>The values of all sibling nodes in the path between a request leaf
node and the root node are stored in the PATH tag so that the client
can reconstruct and validate the value in the ROOT tag using its
request packet. These values are each 32 bytes and are stored one
after the other with no additional padding or structure. The order in
which they are stored is described in the next section.</t>
        <section anchor="check-algorithm">
          <name>Root Value Validity Check Algorithm</name>
          <t>This section describes how to compute the value of the root of the
Merkle tree from the values in the tags PATH, INDX, and NONC. The bits
of INDX are ordered from least to most significant. <tt>H(x)</tt> denotes the
first 32 bytes of the SHA-512 hash digest of x and <tt>||</tt> denotes
concatenation.</t>
          <t>The algorithm maintains a current value <tt>h</tt>. At initialization, <tt>h</tt> is
set to <tt>H(0x00 || request_packet)</tt>. When no more entries remain in
PATH, <tt>h</tt> is the value of the root of the Merkle tree. All remaining
bits of INDX <bcp14>MUST</bcp14> be zero at that time. Otherwise, let node be the
next 32 bytes in PATH. If the current bit in INDX is 0 then <tt>h =
H(0x01 || node || hash)</tt>, else <tt>h = H(0x01 || hash || node)</tt>.</t>
          <t>PATH is thus the siblings from the leaf to the root.</t>
        </section>
      </section>
      <section anchor="validity-of-response">
        <name>Validity of Response</name>
        <t>A client <bcp14>MUST</bcp14> check the following properties when it receives a
response. We assume the long-term server public key is known to the
client through other means.</t>
        <t>The signature in CERT was made with the long-term key of the server.</t>
        <t>The MIDP timestamp lies in the interval specified by the MINT and MAXT
timestamps.</t>
        <t>The INDX and PATH values prove a hash value derived from the request
packet was included in the Merkle tree with value ROOT using the
algorithm in <xref target="check-algorithm"/>.</t>
        <t>The signature of SREP in SIG validates with the public key in DELE.</t>
        <t>A response that passes these checks is said to be valid. Validity of a
response does not prove that the timestamp's value in the response is
correct, but merely that the server guarantees that it signed the
timestamp and computed its signature during the time interval
(MIDP-RADI, MIDP+RADI).</t>
      </section>
    </section>
    <section anchor="integration-into-ntp">
      <name>Integration into NTP</name>
      <t>We assume that there is a bound PHI on the frequency error in the
clock on the machine. Let delta be the time difference between the
clock on the client and the clock on the server, and let sigma
represent the error in the measured value of delta introduced by the
measurement process.</t>
      <t>Given a measurement taken at a local time t, we
know the true time is in (t-delta-sigma, t-delta+sigma). After d
seconds have elapsed we know the true time is within
(t-delta-sigma-d<em>PHI, t-delta+sigma+d</em>PHI). A simple and effective way
to mix with NTP or Precision Time Protocol (PTP) discipline of the
clock is to trim the observed intervals in NTP to fit entirely within
this window or reject measurements that fall too far outside. This
assumes time has not been stepped. If the NTP process decides to step
the time, it <bcp14>MUST</bcp14> use Roughtime to ensure the new true time estimate
that will be stepped to is consistent with the true time. Should this
window become too large, another Roughtime measurement is called for.
The definition of "too large" is implementation defined.
Implementations <bcp14>MAY</bcp14> use other, more sophisticated means of adjusting
the clock respecting Roughtime information. Other applications such as
X.509 verification may wish to apply different rules.</t>
      <t>If an NTP server uses a Roughtime server as a time source for
synchronisation (and not only for filtering its NTP measurements), the
root dispersion <bcp14>SHOULD</bcp14> include the server's RADI value and root delay
<bcp14>SHOULD</bcp14> include the interval between sending the Roughtime request and
receiving the response.</t>
    </section>
    <section anchor="grease">
      <name>Grease</name>
      <t>The primary purpose of grease is to prevent protocol ossification,
which could prohibit future protocol extensions and development
<xref target="RFC9170"/>. In Roughtime, grease is also intended to ensure that
clients validate signatures. To grease the Roughtime protocol, servers
<bcp14>SHOULD</bcp14> send back a fraction of responses with any of the following:
lack of mandatory tags, version numbers not in the request, undefined
tags, or invalid signatures together with incorrect times. Clients
<bcp14>MUST</bcp14> properly ignore undefined tags and reject invalid responses.
Servers <bcp14>MUST NOT</bcp14> send back responses with incorrect times and valid
signatures. Either signature <bcp14>MAY</bcp14> be invalid for this application.</t>
    </section>
    <section anchor="roughtime-clients">
      <name>Roughtime Clients</name>
      <section anchor="necessary-configuration">
        <name>Necessary configuration</name>
        <t>To carry out a Roughtime measurement, a client <bcp14>SHOULD</bcp14> be equipped with
a list of servers, a minimum of three of which are operational and not
run by the same parties. Roughtime clients <bcp14>SHOULD</bcp14> regularly update
their view of which servers are trustworthy in order to benefit from
the detection of misbehavior. Clients <bcp14>SHOULD</bcp14> also have a means of
reporting to the provider of such a list, such as an operating system
or software vendor, a malfeasence report as described below.</t>
      </section>
      <section anchor="measurement-sequence">
        <name>Measurement Sequence</name>
        <t>The client randomly selects at least three servers from the list, and
sequentially queries them. The query sequence <bcp14>SHOULD</bcp14> be repeated twice
with the servers in the same order, to ensure that all possible
inconsistences can be detected.</t>
        <t>The first probe uses a nonce that is randomly generated. The second
query uses <tt>H(resp || rand)</tt> where <tt>rand</tt> is a random 32-byte value
and <tt>resp</tt> is the entire response to the first probe, including the
"ROUGHTIM" header. Each subsequent query uses <tt>H(resp || rand)</tt> for
the previous response and a different 32-byte <tt>rand</tt> value. <tt>H(x)</tt> and
<tt>||</tt> are defined as in <xref target="check-algorithm"/>.</t>
        <t>For each pair of responses <tt>(i, j)</tt>, where <tt>i</tt> was received before
<tt>j</tt>, the client <bcp14>MUST</bcp14> check that <tt>MIDP_i-RADI_i</tt> is less than or equal
to <tt>MIDP_j+RADI_j</tt>. If all checks pass, the times are consistent with
causal ordering. If at least one check fails, there has been a
malfeasance and the client <bcp14>SHOULD</bcp14> store a report for evaluation, alert
the user, and make another measurement. If the times reported are
consistent with the causal ordering, and the delay between request and
response is within an implementation-dependent maximum value, the
measurement succeeds.</t>
      </section>
      <section anchor="server-lists">
        <name>Server Lists</name>
        <t>To facilitate regular updates of lists of trusted servers, clients
<bcp14>SHOULD</bcp14> implement the server list format specified here. Server lists
<bcp14>MUST</bcp14> be formatted as JSON <xref target="RFC8259"/> objects and contain the key
"servers". Client lists <bcp14>MAY</bcp14> also contain the keys "sources" and
"reports".</t>
        <t>The value of the "servers" key <bcp14>MUST</bcp14> be a list of server objects, each
containing the keys "name", "version", "publicKeyType", "publicKey",
and "addresses".</t>
        <t>The value of "name" <bcp14>MUST</bcp14> be a string and <bcp14>SHOULD</bcp14> contain a server name
suitable for display to a user.</t>
        <t>The value of "version" <bcp14>MUST</bcp14> be an integer that indicates the highest
Roughtime version number supported by the server.</t>
        <t>NOTE TO RFC EDITOR: remove this paragraph before publication. To
indicate compatibility with drafts of this memo, a decimal
representation of the version number indicated in <xref target="protocol-details"/>
          <bcp14>SHOULD</bcp14> be used. For indicating compatibility with pre-IETF
specifications of Roughtime, the version number 3000600613 <bcp14>SHOULD</bcp14> be
used.</t>
        <t>The value of "publicKeyType" <bcp14>MUST</bcp14> be a string indicating the signature
scheme used by the server. The value for servers supporting version 1
of Roughtime <bcp14>MUST</bcp14> be "ed25519".</t>
        <t>The value of "publicKey" <bcp14>MUST</bcp14> be a base64-encoded <xref target="RFC4648"/> string
representing the long-term public key of the server in a format
consistent with the value of "publicKeyType".</t>
        <t>The value of "addresses" <bcp14>MUST</bcp14> be a list of address objects. An address
object <bcp14>MUST</bcp14> contain the keys "protocol" and "address". The value of
"protocol" <bcp14>MUST</bcp14> be either "tcp" or "udp", indicating the transport
mode to use. The value of "address" <bcp14>MUST</bcp14> be string indicating a host
and a port number, separated by a colon character, for example
"roughtime.example.com:2002". The host part <bcp14>SHALL</bcp14> be either an IPv4
address, an IPv6 address, or a fully qualified domain name (FQDN).
IPv4 addresses <bcp14>MUST</bcp14> be in dotted decimal notation. IPv6 addresses <bcp14>MUST</bcp14>
conform to the "Text Representation of Addresses" <xref target="RFC4291"/> and
<bcp14>MUST NOT</bcp14> include zone identifiers <xref target="RFC6874"/>. The port part <bcp14>SHALL</bcp14> be
a decimal integer representing a valid port number, i.e. in the range
0-65535.</t>
        <t>The value of "sources", if present, <bcp14>MUST</bcp14> be a list of strings
indicating where updated versions of the list may be aquired. Each
string <bcp14>MUST</bcp14> be a URL <xref target="RFC1738"/> pointing to a list in the format
specified here. The URI scheme <bcp14>MUST</bcp14> be HTTPS <xref target="RFC9110"/>.</t>
        <t>The value of "reports", if present, <bcp14>MUST</bcp14> be a string indicating a URL
<xref target="RFC1738"/> where malfeasance reports can be sent by clients using
the HTTP POST method <xref target="RFC9110"/>. The URI scheme <bcp14>MUST</bcp14> be HTTPS
<xref target="RFC9110"/>.</t>
      </section>
      <section anchor="malfeasance-reporting">
        <name>Malfeasance Reporting</name>
        <t>A malfeasance report is cryptographic proof that a sequence of
responses arrived in that order. It can be used to demonstrate that at
least one server sent the wrong time.</t>
        <t>A malfeasance report <bcp14>MUST</bcp14> be formatted as a JSON <xref target="RFC8259"/> object
and contain the key "responses". Its value <bcp14>MUST</bcp14> be an ordered list of
response objects. Each response object <bcp14>MUST</bcp14> contain the keys "rand",
"request", "response", and "publicKey". The values of all four keys
<bcp14>MUST</bcp14> be represented as base64-encoded <xref target="RFC4648"/> strings.</t>
        <t>The "rand" key <bcp14>MAY</bcp14> be omitted from the first response object in the
list. In all other cases, its value <bcp14>MUST</bcp14> be the 32-byte value used
to generate the request nonce value from the previous response packet.</t>
        <t>The value of "request" <bcp14>MUST</bcp14> be the transmitted request packet,
including the "ROUGHTIM" header.</t>
        <t>The value of "response" <bcp14>MUST</bcp14> be the received response packet,
including the "ROUGHTIM" header.</t>
        <t>The value of "publicKey" <bcp14>MUST</bcp14> be the long-term key that the server was
expected to use for deriving the response signature.</t>
        <t>When the client's list of servers has an associated URL for
malfeasance reports, it <bcp14>SHOULD</bcp14> send a report whenever it has performed
a measurement sequence in accordance with <xref target="measurement-sequence"/> and
detected that at least one of the responses is inconsistent with
causal ordering. Since the failure of a popular Roughtime server can
cause numerous clients to send malfeasance reports at the same time,
clients <bcp14>MUST</bcp14> use a reporting mechanism that avoids overloading the
server receiving the reports. Clients <bcp14>SHOULD</bcp14> use exponential backoff
for this purpose, with an initial and minimum retry interval of at
least 10 seconds.</t>
        <t>Clients <bcp14>MUST NOT</bcp14> send malfeasance reports in response to signature
verification failures or any other protocol errors.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="confidentiality">
        <name>Confidentiality</name>
        <t>This protocol does not provide any confidentiality. Given the nature
of timestamps, such impact is minor.</t>
      </section>
      <section anchor="integrity-and-authenticity">
        <name>Integrity and Authenticity</name>
        <t>The Roughtime protocol only provides integrity and authenticity
protection for data contained in the SREP tag. Accordingly, new tags
<bcp14>SHOULD</bcp14> be added to the SREP tag whenever possible.</t>
      </section>
      <section anchor="generating-private-keys">
        <name>Generating Private Keys</name>
        <t>Although any random 256-bit string can be used as a private Ed25519
key, it has a high risk of being vulnerable to small-subgroup attacks
and timing side-channel leaks. For this reason, all private keys used
in Roughtime <bcp14>MUST</bcp14> be generated following the procedure described in
Section 5.1.5 of RFC 8032 <xref target="RFC8032"/>.</t>
      </section>
      <section anchor="private-key-compromise">
        <name>Private Key Compromise</name>
        <t>The compromise of a PUBK's private key, even past MAXT, is a problem
as the private key can be used to sign invalid times that are in the
range MINT to MAXT, and thus violate the good-behavior guarantee of
the server. To protect against this, it is necessary for clients to
query multiple servers in accordance with the procedure described in
<xref target="measurement-sequence"/>.</t>
      </section>
      <section anchor="quantum-resistance">
        <name>Quantum Resistance</name>
        <t>Since the only supported signature scheme, Ed25519, is not quantum
resistant, the Roughtime version described in this memo will not
survive the advent of quantum computers.</t>
      </section>
      <section anchor="maintaining-lists-of-servers">
        <name>Maintaining Lists of Servers</name>
        <t>The infrastructure and procedures for maintaining a list of trusted
servers and adjudicating violations of the rules by servers is not
discussed in this document and is essential for security.</t>
      </section>
      <section anchor="amplification-attacks">
        <name>Amplification Attacks</name>
        <t>UDP protocols that send responses significantly larger than requests,
such as NTP, have previously been leveraged for amplification attacks.
To prevent Roughtime from being used for such attacks, servers <bcp14>MUST
NOT</bcp14> send response packets larger than the request packets sent by
clients.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>This protocol is designed to obscure all client identifiers. Servers
necessarily have persistent long-term identities essential to
enforcing correct behavior. Generating nonces in a nonrandom manner
can cause leaks of private data or enable tracking of clients as they
move between networks.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>It is expected that clients identify a server by its long-term public
key. In multi-tenancy environments, where multiple servers may be
listening on the same IP or port space, the protocol is designed so
that the client indicates which server it expects to respond. This is
done with the SRV tag.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="service-name-and-transport-protocol-port-number-registry">
        <name>Service Name and Transport Protocol Port Number Registry</name>
        <t>IANA is requested to allocate the following entry in the Service
Name and Transport Protocol Port Number Registry:</t>
        <artwork><![CDATA[
  Service Name: Roughtime

  Transport Protocol: tcp,udp

  Assignee: IESG <iesg@ietf.org>

  Contact: IETF Chair <chair@ietf.org>

  Description: Roughtime time synchronization

  Reference: [[this memo]]

  Port Number: [[TBD1]], selected by IANA from the User Port range
]]></artwork>
      </section>
      <section anchor="roughtime-version-registry">
        <name>Roughtime Version Registry</name>
        <t>IANA is requested to create a new registry entitled "Roughtime
 Version Registry".  Entries shall have the following fields:</t>
        <t>Version ID (<bcp14>REQUIRED</bcp14>): a 32-bit unsigned integer</t>
        <t>Version name (<bcp14>REQUIRED</bcp14>): A short text string naming the version being
identified.</t>
        <t>Reference (<bcp14>REQUIRED</bcp14>): A reference to a relevant specification
document.</t>
        <t>The policy for allocation of new entries <bcp14>SHOULD</bcp14> be: IETF Review.</t>
        <t>The initial contents of this registry shall be as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Version ID</th>
              <th align="left">Version name</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0x0</td>
              <td align="left">Reserved</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="left">0x1</td>
              <td align="left">Roughtime version 1</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="left">0x2-0x7fffffff</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">0x80000000-0xffffffff</td>
              <td align="left">Reserved for Private</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">or Experimental use</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="roughtime-tag-registry">
        <name>Roughtime Tag Registry</name>
        <t>IANA is requested to create a new registry entitled "Roughtime Tag
Registry".  Entries <bcp14>SHALL</bcp14> have the following fields:</t>
        <t>Tag (<bcp14>REQUIRED</bcp14>): A 32-bit unsigned integer in hexadecimal format.</t>
        <t>ASCII Representation (<bcp14>REQUIRED</bcp14>): The ASCII representation of the tag
in accordance with <xref target="type-tag"/> of this memo.</t>
        <t>Reference (<bcp14>REQUIRED</bcp14>): A reference to a relevant specification
document.</t>
        <t>The policy for allocation of new entries in this registry <bcp14>SHOULD</bcp14> be:
Specification Required.</t>
        <t>The initial contents of this registry <bcp14>SHALL</bcp14> be as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="right">Tag</th>
              <th align="left">ASCII Representation</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">0x00474953</td>
              <td align="left">SIG</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x00524556</td>
              <td align="left">VER</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x00565253</td>
              <td align="left">SRV</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x434e4f4e</td>
              <td align="left">NONC</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x454c4544</td>
              <td align="left">DELE</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x45505954</td>
              <td align="left">TYPE</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x48544150</td>
              <td align="left">PATH</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x49444152</td>
              <td align="left">RADI</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x4b425550</td>
              <td align="left">PUBK</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x5044494d</td>
              <td align="left">MIDP</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x50455253</td>
              <td align="left">SREP</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x53524556</td>
              <td align="left">VERS</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x544e494d</td>
              <td align="left">MINT</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x544f4f52</td>
              <td align="left">ROOT</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x54524543</td>
              <td align="left">CERT</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x5458414d</td>
              <td align="left">MAXT</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x58444e49</td>
              <td align="left">INDX</td>
              <td align="left">[[this memo]]</td>
            </tr>
            <tr>
              <td align="right">0x5a5a5a5a</td>
              <td align="left">ZZZZ</td>
              <td align="left">[[this memo]]</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC20">
          <front>
            <title>ASCII format for network interchange</title>
            <author fullname="V.G. Cerf" initials="V.G." surname="Cerf"/>
            <date month="October" year="1969"/>
          </front>
          <seriesInfo name="STD" value="80"/>
          <seriesInfo name="RFC" value="20"/>
          <seriesInfo name="DOI" value="10.17487/RFC0020"/>
        </reference>
        <reference anchor="RFC791">
          <front>
            <title>Internet Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="791"/>
          <seriesInfo name="DOI" value="10.17487/RFC0791"/>
        </reference>
        <reference anchor="RFC4086">
          <front>
            <title>Randomness Requirements for Security</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="J. Schiller" initials="J." surname="Schiller"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <date month="June" year="2005"/>
            <abstract>
              <t>Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.</t>
              <t>Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="106"/>
          <seriesInfo name="RFC" value="4086"/>
          <seriesInfo name="DOI" value="10.17487/RFC4086"/>
        </reference>
        <reference anchor="RFC8032">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="RFC6234">
          <front>
            <title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="May" year="2011"/>
            <abstract>
              <t>Federal Information Processing Standard, FIPS</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6234"/>
          <seriesInfo name="DOI" value="10.17487/RFC6234"/>
        </reference>
        <reference anchor="RFC9170">
          <front>
            <title>Long-Term Viability of Protocol Extension Mechanisms</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The ability to change protocols depends on exercising the extension and version-negotiation mechanisms that support change. This document explores how regular use of new protocol features can ensure that it remains possible to deploy changes to a protocol. Examples are given where lack of use caused changes to be more difficult or costly.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9170"/>
          <seriesInfo name="DOI" value="10.17487/RFC9170"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC4291">
          <front>
            <title>IP Version 6 Addressing Architecture</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
              <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4291"/>
          <seriesInfo name="DOI" value="10.17487/RFC4291"/>
        </reference>
        <reference anchor="RFC6874">
          <front>
            <title>Representing IPv6 Zone Identifiers in Address Literals and Uniform Resource Identifiers</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>This document describes how the zone identifier of an IPv6 scoped address, defined as in the IPv6 Scoped Address Architecture (RFC 4007), can be represented in a literal IPv6 address and in a Uniform Resource Identifier that includes such a literal address. It updates the URI Generic Syntax specification (RFC 3986) accordingly.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6874"/>
          <seriesInfo name="DOI" value="10.17487/RFC6874"/>
        </reference>
        <reference anchor="RFC1738">
          <front>
            <title>Uniform Resource Locators (URL)</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <author fullname="M. McCahill" initials="M." surname="McCahill"/>
            <date month="December" year="1994"/>
            <abstract>
              <t>This document specifies a Uniform Resource Locator (URL), the syntax and semantics of formalized information for location and access of resources via the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1738"/>
          <seriesInfo name="DOI" value="10.17487/RFC1738"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="Merkle" target="https://doi.org/10.1007/3-540-48184-2_32">
          <front>
            <title>A Digital Signature Based on a Conventional Encryption Function</title>
            <author initials="R. C." surname="Merkle" fullname="Ralph C. Merkle">
              <organization>Elxsi</organization>
            </author>
            <date year="1988"/>
          </front>
          <seriesInfo name="in" value="Pomerance, C. (eds) Advances in Cryptology"/>
          <seriesInfo name="Lecture Notes in Computer Science" value="vol 293"/>
          <seriesInfo name="DOI" value="10.1007/3-540-47184-2_32"/>
        </reference>
        <reference anchor="RFC738">
          <front>
            <title>Time server</title>
            <author fullname="K. Harrenstien" initials="K." surname="Harrenstien"/>
            <date month="October" year="1977"/>
          </front>
          <seriesInfo name="RFC" value="738"/>
          <seriesInfo name="DOI" value="10.17487/RFC0738"/>
        </reference>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC8915">
          <front>
            <title>Network Time Security for the Network Time Protocol</title>
            <author fullname="D. Franke" initials="D." surname="Franke"/>
            <author fullname="D. Sibold" initials="D." surname="Sibold"/>
            <author fullname="K. Teichel" initials="K." surname="Teichel"/>
            <author fullname="M. Dansarie" initials="M." surname="Dansarie"/>
            <author fullname="R. Sundblad" initials="R." surname="Sundblad"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This memo specifies Network Time Security (NTS), a mechanism for using Transport Layer Security (TLS) and Authenticated Encryption with Associated Data (AEAD) to provide cryptographic security for the client-server mode of the Network Time Protocol (NTP).</t>
              <t>NTS is structured as a suite of two loosely coupled sub-protocols. The first (NTS Key Establishment (NTS-KE)) handles initial authentication and key establishment over TLS. The second (NTS Extension Fields for NTPv4) handles encryption and authentication during NTP time synchronization via extension fields in the NTP packets, and holds all required state only on the client via opaque cookies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8915"/>
          <seriesInfo name="DOI" value="10.17487/RFC8915"/>
        </reference>
      </references>
    </references>
    <?line 892?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Aanchal Malhotra and Adam Langley authored early drafts of this memo.
Daniel Franke, Sarah Grant, Martin Langer, Ben Laurie, Peter Löthberg,
Hal Murray, Tal Mizrahi, Ruben Nijveld, Christopher Patton, Thomas
Peterson, Rich Salz, Dieter Sibold, Ragnar Sundblad, Kristof Teichel,
Luke Valenta, David Venhoek, Ulrich Windl, and the other members of
the NTP working group contributed comments and suggestions as well as
pointed out errors.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
