<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-grant-ntp-ntpv5-algorithms-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.1 -->
  <front>
    <title>NTPv5 Algorithms</title>
    <seriesInfo name="Internet-Draft" value="draft-grant-ntp-ntpv5-algorithms-00"/>
    <author fullname="Sarah Grant">
      <organization/>
      <address>
        <email>sarah.grant.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="September" day="13"/>
    <area>Internet</area>
    <workgroup>Network Time Protocols</workgroup>
    <abstract>
      <?line 41?>

<t>This document describes considerations of synchronisation algorithms with version 5 of the Network Time Protocol (NTP), and provides guidance on the use of NTP version 4's algorithms when used with NTP version 5.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://signalsforgranted.github.io/draft-grant-ntp-ntpv5-algorithms/draft-grant-ntp-ntpv5-algorithms.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-grant-ntp-ntpv5-algorithms/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network Time Protocols Working Group mailing list (<eref target="mailto:ntp@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ntp/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ntp/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/signalsforgranted/draft-grant-ntp-ntpv5-algorithms"/>.</t>
    </note>
  </front>
  <middle>
    <?line 45?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>NTP version 4 (NTPv4) <xref target="RFC5905"/> defines various algorithms and logic which handle several different aspects of acquiring and maintaining synchronisation of NTP clients including filtering of measurements, security mechanisms, source selection, and clock control, amongst others. Over time NTPv4 has seen additional algorithms be defined to improve security and accuracy, with Khronos <xref target="RFC9523"/> defining a companion method to run alongside with NTPv4 clients that aims to detect and mitigate time-shifting based attacks, and interleaved modes <xref target="RFC9769"/> which defines additional operational modes for both clients and servers by holding additional state and performing additional checks on timestamp values.</t>
      <t>However, NTP version 5 (NTPv5) <xref target="I-D.draft-ietf-ntp-ntpv5"/> explicitly does not define these algorithms in conjunction with the wire protocol to allow for the creation and evolution of new algorithms and implementations which may be optimised for specific deployment use case or system constraints. For all implementations there are many factors that should be taken into consideration in the development of both new algorithms as well as the porting of existing algorithms to NTPv5, such as trade-offs between precision and security, costs of complexity, etc.</t>
      <t>The decoupling of algorithms to their dependent wire protocol is not new - PTP <xref target="IEEE1588"/> has the concept of "profiles", each of which define different behaviours and algorithms adapted for specific deployments (for example in automotive or power industries), and may even include additional capabilities to the protocol, for example the "daily jam" function in SMPTE ST-2059 <xref target="SMPTE2059"/> where discontinuity is deliberately transmitted to remove built up discrepancies in values.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses the terminology established in <xref target="I-D.draft-ietf-ntp-ntpv5"/>.</t>
    </section>
    <section anchor="algorithm-considerations">
      <name>Algorithm Considerations</name>
      <t><strong>TODO</strong>: General considerations, including interop (When Algorithms Collide)</t>
      <t><strong>TODO</strong>: Signalling of algorithms? If so, this would likely require an IANA registry</t>
      <section anchor="extension-fields">
        <name>Extension Fields</name>
        <t>Algorithms may choose to use additional information be sent by either client or server, however this brings the risk of these fields not being correctly handled by peers which do not support them. Algorithms must have explicit behaviours defined when any required extension fields are not present.</t>
      </section>
      <section anchor="non-utc-timescales">
        <name>Non-UTC timescales</name>
        <t>In addition to UTC, NTPv5 includes support for the transmission of TAI, UT1, and leap-smeared UTC timescales. Algorithms may choose to support a limited subset of timescales, and use different logic depending on the timescale supported. Implementations shouldn't mix timestamps from different timescales when performing calculations, and it's recommended they minimise the conversion of timescales where possible to reduce potential confusion and aide in accuracy.</t>
      </section>
      <section anchor="leap-seconds-and-leap-second-smearing">
        <name>Leap Seconds and Leap Second Smearing</name>
        <t>Existing NTP implementations commonly use one of several known approaches to applying leap seconds to system time: they may "freeze" the clock where the leap second is inserted at the beginning of the last second of the day, or the system clock is "slewed" or "smeared" either before or commencing from the leap second <xref target="RFC7164"/>, keeping system time monotonic but less accurate during the period.</t>
        <t>Server implementations which use drifting mechanisms to smooth the leap second insertion such as slewing or smearing must only apply it to only to UTC, and must set the timescale flag in packets to clients as "Leap-smeared UTC".</t>
      </section>
    </section>
    <section anchor="use-of-ntpv4-algorithms-with-ntpv5">
      <name>Use of NTPv4 Algorithms with NTPv5</name>
      <t>Support for NTPv4 algorithms is not required for NTPv5 implementations, however those supporting both versions of NTP may find it easy to include as a default or fall-back option in configurations where others are not set.</t>
      <t>NTPv5 introduces several key differences to NTPv4 that implementations should be aware of when either building new implementations of the NTPv4 algorithms or when adapting existing. Most notably, the timestamp format has been changed with NTPv5 to ensure longevity and prevent rollover in the immediate future, which should be taken into consideration when processing and producing packets.</t>
      <t><strong>TODO</strong>: Interleaved mode</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>General security considerations for time protocols are discussed in RFC 7384 <xref target="RFC7384"/>, and security considerations specific to NTPv5 <xref target="I-D.draft-ietf-ntp-ntpv5"/> should also be noted. Not all threats can be sufficiently mitigated through the use of algorithms, for example packet manipulation, spoofing, and cryptographic performance attacks may be better mitigated through the use of authenticated encryption via NTS <xref target="RFC8915"/>.</t>
      <t>Designers of new algorithms should take into consideration the expected threat model of deployments and should describe which threats could potentially be mitigated from those which are not in scope for the intended use cases, for example closed network deployments have a very different set of risks in comparison to deployments on the internet.</t>
      <t><strong>TODO</strong>: Discuss general attacks on time via algorithms, e.g. time-shifting</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet. This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family. NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs. It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required. It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC7164">
          <front>
            <title>RTP and Leap Seconds</title>
            <author fullname="K. Gross" initials="K." surname="Gross"/>
            <author fullname="R. Brandenburg" initials="R." surname="Brandenburg"/>
            <date month="March" year="2014"/>
            <abstract>
              <t>This document discusses issues that arise when RTP sessions span Coordinated Universal Time (UTC) leap seconds. It updates RFC 3550 by describing how RTP senders and receivers should behave in the presence of leap seconds.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7164"/>
          <seriesInfo name="DOI" value="10.17487/RFC7164"/>
        </reference>
        <reference anchor="RFC7384">
          <front>
            <title>Security Requirements of Time Protocols in Packet Switched Networks</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <date month="October" year="2014"/>
            <abstract>
              <t>As time and frequency distribution protocols are becoming increasingly common and widely deployed, concern about their exposure to various security threats is increasing. This document defines a set of security requirements for time protocols, focusing on the Precision Time Protocol (PTP) and the Network Time Protocol (NTP). This document also discusses the security impacts of time protocol practices, the performance implications of external security practices on time protocols, and the dependencies between other security services and time synchronization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7384"/>
          <seriesInfo name="DOI" value="10.17487/RFC7384"/>
        </reference>
        <reference anchor="RFC8915">
          <front>
            <title>Network Time Security for the Network Time Protocol</title>
            <author fullname="D. Franke" initials="D." surname="Franke"/>
            <author fullname="D. Sibold" initials="D." surname="Sibold"/>
            <author fullname="K. Teichel" initials="K." surname="Teichel"/>
            <author fullname="M. Dansarie" initials="M." surname="Dansarie"/>
            <author fullname="R. Sundblad" initials="R." surname="Sundblad"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This memo specifies Network Time Security (NTS), a mechanism for using Transport Layer Security (TLS) and Authenticated Encryption with Associated Data (AEAD) to provide cryptographic security for the client-server mode of the Network Time Protocol (NTP).</t>
              <t>NTS is structured as a suite of two loosely coupled sub-protocols. The first (NTS Key Establishment (NTS-KE)) handles initial authentication and key establishment over TLS. The second (NTS Extension Fields for NTPv4) handles encryption and authentication during NTP time synchronization via extension fields in the NTP packets, and holds all required state only on the client via opaque cookies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8915"/>
          <seriesInfo name="DOI" value="10.17487/RFC8915"/>
        </reference>
        <reference anchor="RFC9523">
          <front>
            <title>A Secure Selection and Filtering Mechanism for the Network Time Protocol with Khronos</title>
            <author fullname="N. Rozen-Schiff" initials="N." surname="Rozen-Schiff"/>
            <author fullname="D. Dolev" initials="D." surname="Dolev"/>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="M. Schapira" initials="M." surname="Schapira"/>
            <date month="February" year="2024"/>
            <abstract>
              <t>The Network Time Protocol version 4 (NTPv4), as defined in RFC 5905, is the mechanism used by NTP clients to synchronize with NTP servers across the Internet. This document describes a companion application to the NTPv4 client, named "Khronos", that is used as a "watchdog" alongside NTPv4 and that provides improved security against time-shifting attacks. Khronos involves changes to the NTP client's system process only. Since it does not affect the wire protocol, the Khronos mechanism is applicable to current and future time protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9523"/>
          <seriesInfo name="DOI" value="10.17487/RFC9523"/>
        </reference>
        <reference anchor="RFC9769">
          <front>
            <title>NTP Interleaved Modes</title>
            <author fullname="M. Lichvar" initials="M." surname="Lichvar"/>
            <author fullname="A. Malhotra" initials="A." surname="Malhotra"/>
            <date month="May" year="2025"/>
            <abstract>
              <t>This document specifies interleaved modes for the Network Time Protocol (NTP). These new modes improve the accuracy of time synchronization by enabling the use of more accurate transmit timestamps that are available only after the transmission of NTP messages. These enhancements are intended to improve timekeeping in environments where high accuracy is critical. This document updates RFC 5905 by defining these new operational modes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9769"/>
          <seriesInfo name="DOI" value="10.17487/RFC9769"/>
        </reference>
        <reference anchor="I-D.draft-ietf-ntp-ntpv5">
          <front>
            <title>Network Time Protocol Version 5</title>
            <author fullname="Miroslav Lichvar" initials="M." surname="Lichvar">
              <organization>Red Hat</organization>
            </author>
            <author fullname="Tal Mizrahi" initials="T." surname="Mizrahi">
              <organization>Huawei</organization>
            </author>
            <date day="10" month="September" year="2025"/>
            <abstract>
              <t>   The Network Time Protocol (NTP) is a widely deployed protocol that
   allows hosts to obtain the current time of day from time servers.
   This document specifies version 5 of the protocol (NTPv5), which
   adopts a client-server model as its sole mode of operation.  Legacy
   operational modes supported in earlier versions have been removed to
   improve protocol robustness and clarity.  While this specification
   defines the protocol used for time distribution, it does not define
   the algorithms or heuristics employed by clients to determine or
   adjust their local time.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-ntpv5-06"/>
        </reference>
        <reference anchor="IEEE1588">
          <front>
            <title>IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems</title>
            <author>
              <organization/>
            </author>
            <date month="June" year="2020"/>
          </front>
          <seriesInfo name="DOI" value="10.1109/ieeestd.2020.9120376"/>
          <seriesInfo name="ISBN" value="[&quot;9781504463416&quot;]"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="SMPTE2059" target="https://pub.smpte.org/pub/st2059-2/st2059-2-2021.pdf">
          <front>
            <title>SMPTE Profile for Use of IEEE-1588 Precision Time Protocol in Professional Broadcast Applications</title>
            <author>
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 119?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge that perhaps this was not the smartest idea.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
