rfc9748v1.txt | rfc9748.txt | |||
---|---|---|---|---|
skipping to change at line 16 ¶ | skipping to change at line 16 ¶ | |||
ISSN: 2070-1721 | ISSN: 2070-1721 | |||
Updating the NTP Registries | Updating the NTP Registries | |||
Abstract | Abstract | |||
The Network Time Protocol (NTP) and Network Time Security (NTS) | The Network Time Protocol (NTP) and Network Time Security (NTS) | |||
documents define a number of registries, collectively called the NTP | documents define a number of registries, collectively called the NTP | |||
registries. | registries. | |||
Some registries have wrong values, some registries do not follow | Some registries are correct, but some include incorrect assignments | |||
current common practice, and some are just right. For the sake of | and some don’t follow common practice. For the sake of completeness, | |||
completeness, this document reviews all NTP and NTS registries, and | this document reviews all NTP and NTS registries, and corrects the | |||
makes updates where necessary. | registries where necessary. | |||
This document updates RFCs 5905, 5906, 7821, 7822, and 8573. | This document updates RFCs 5905, 5906, 7821, 7822, and 8573. | |||
Status of This Memo | Status of This Memo | |||
This is an Internet Standards Track document. | This is an Internet Standards Track document. | |||
This document is a product of the Internet Engineering Task Force | This document is a product of the Internet Engineering Task Force | |||
(IETF). It represents the consensus of the IETF community. It has | (IETF). It represents the consensus of the IETF community. It has | |||
received public review and has been approved for publication by the | received public review and has been approved for publication by the | |||
skipping to change at line 59 ¶ | skipping to change at line 59 ¶ | |||
Trust Legal Provisions and are provided without warranty as described | Trust Legal Provisions and are provided without warranty as described | |||
in the Revised BSD License. | in the Revised BSD License. | |||
Table of Contents | Table of Contents | |||
1. Introduction | 1. Introduction | |||
2. Existing Registries | 2. Existing Registries | |||
2.1. Reference ID and Kiss-o'-Death Registries | 2.1. Reference ID and Kiss-o'-Death Registries | |||
2.2. Extension Field Types | 2.2. Extension Field Types | |||
2.3. Network Time Security Registries | 2.3. Network Time Security Registries | |||
3. Registry Updates | 3. NTP Registry Updates | |||
3.1. Guidance to Designated Experts | 3.1. Designated Experts | |||
4. IANA Considerations | 4. IANA Considerations | |||
4.1. NTP Reference Identifier Codes | 4.1. NTP Reference Identifier Codes | |||
4.2. NTP Kiss-o'-Death Codes | 4.2. NTP Kiss-o'-Death Codes | |||
4.3. NTP Extension Field Types | 4.3. NTP Extension Field Types | |||
5. Security Considerations | 5. Security Considerations | |||
6. Normative References | 6. Normative References | |||
Acknowledgements | Acknowledgements | |||
Author's Address | Author's Address | |||
1. Introduction | 1. Introduction | |||
The Network Time Protocol (NTP) and Network Time Security (NTS) | The Network Time Protocol (NTP) and Network Time Security (NTS) | |||
documents define a number of registries, collectively called the NTP | documents define a number of registries, collectively called the NTP | |||
registries. The NTP registries can all be found at | registries. The NTP registries can all be found at | |||
<https://www.iana.org/assignments/ntp-parameters> and the NTS | <https://www.iana.org/assignments/ntp-parameters> and the NTS | |||
registries can all be found at <https://www.iana.org/assignments/ | registries can all be found at <https://www.iana.org/assignments/ | |||
nts>. | nts>. | |||
Some registries have wrong values, some registries do not follow | Some registries are correct, but some include incorrect assignments | |||
current common practice, and some are just right. For the sake of | and some don’t follow common practice. For the sake of completeness, | |||
completeness, this document reviews all NTP and NTS registries, and | this document reviews all NTP and NTS registries, and corrects the | |||
makes updates where necessary. | registries where necessary. | |||
The bulk of this document can be divided into two parts: | The bulk of this document can be divided into two parts: | |||
* First, each registry, its defining document, and a summary of its | * a summary of the relevant registries, including syntax | |||
syntax is defined. | requirements, registration procedures, and the defining documents. | |||
* Second, the revised format and entries for each registry that is | * a revised format and entries for each registry being modified. | |||
being modified is specified. | ||||
2. Existing Registries | 2. Existing Registries | |||
This section describes the registries and the rules for them. It is | This section describes the registries and the rules for them. It is | |||
intended to be a short summary of the syntax and registration | intended to be a short summary of the syntax and registration | |||
requirements for each registry. The semantics and protocol | requirements for each registry. The semantics and protocol | |||
processing rules for each registry -- that is, how an implementation | processing rules for each registry -- that is, how an implementation | |||
acts when sending or receiving any of the fields -- are not described | acts when sending or receiving any of the fields -- are not described | |||
here. | here. | |||
2.1. Reference ID and Kiss-o'-Death Registries | 2.1. Reference ID and Kiss-o'-Death Registries | |||
[RFC5905] defines two registries: "NTP Reference Identifier Codes" in | [RFC5905] defines two registries: "NTP Reference Identifier Codes" in | |||
Section 7.3 and the "NTP Kiss-o'-Death Codes" in Section 7.4. Both | Section 7.3 and the "NTP Kiss-o'-Death Codes" in Section 7.4. | |||
of these are allowed to be four ASCII characters; padded on the right | Reference identifiers and kiss codes can be up to four ASCII | |||
with all-bits-zero if necessary. Entries that start with 0x58, the | characters, padded on the right with all-bits-zero if necessary. | |||
ASCII letter uppercase X, are reserved for Private or Experimental | Entries that start with 0x58, the ASCII letter uppercase X, are | |||
Use. Both registries are First Come First Served. The registries | reserved for Private or Experimental Use. Both registries are First | |||
were created per Section 16 of [RFC5905]. | Come First Served. The registries were created per Section 16 of | |||
[RFC5905]. | ||||
2.2. Extension Field Types | 2.2. Extension Field Types | |||
Section 7.5 of [RFC5905] defines the on-the-wire format of extension | Section 7.5 of [RFC5905] defines the on-the-wire format of extension | |||
fields but does not create a registry for them. | fields but does not create a registry for them. | |||
Section 13 of [RFC5906] mentions the "NTP Extension Field Types" | Section 13 of [RFC5906] mentions the "NTP Extension Field Types" | |||
registry, and defines it indirectly by defining 30 extensions (10 | registry, and defines it indirectly by defining 30 extensions (10 | |||
each for request, response, and error response). It does not provide | each for request, response, and error response). It does not provide | |||
a formal definition of the columns in the registry. Section 10 of | a formal definition of the columns in the registry. Section 10 of | |||
skipping to change at line 139 ¶ | skipping to change at line 139 ¶ | |||
one would expect the next extension field header. | one would expect the next extension field header. | |||
[RFC8573] changes the cryptography used in the MAC field. | [RFC8573] changes the cryptography used in the MAC field. | |||
[RFC8915] adds four new entries to the "NTP Extension Field Types" | [RFC8915] adds four new entries to the "NTP Extension Field Types" | |||
registry. | registry. | |||
The following problems exist with the current registry: | The following problems exist with the current registry: | |||
* Many of the entries in the "NTP Extension Field Types" registry | * Many of the entries in the "NTP Extension Field Types" registry | |||
have swapped some of the nibbles; 0x1234 is listed as 0x1432, for | have swapped some of the nibbles; for example, 0x0302 was listed | |||
example. This was due to documentation errors with the original | for Cookie Message Request instead of 0x0203. The errors are due | |||
implementation of Autokey. This document marks the erroneous | to documentation errors with the original implementation of | |||
values as reserved, in case there is an implementation using the | Autokey. This document marks the erroneous values as reserved, in | |||
registered values instead of what the original implementation | case there is an implementation using the registered values | |||
used. Applications that used those values would have realized | instead of what the original implementation used. Applications | |||
that they did not interoperate with the dominant (if not only) | that used those values would have realized that they did not | |||
implementation at the time. Marking the values as reserved | interoperate with the dominant (if not only) implementation at the | |||
ensures that any such applications continue to work as is. | time. Marking the values as reserved ensures that any such | |||
applications continue to work as is. | ||||
* Some values were mistakenly reused. | * Some values were mistakenly reused. | |||
2.3. Network Time Security Registries | 2.3. Network Time Security Registries | |||
[RFC8915] defines the NTS protocol. The related registries are | [RFC8915] defines the NTS protocol. The related registries are | |||
listed here for completeness, but there are no changes specified in | listed here for completeness, but there are no changes specified in | |||
this document. | this document. | |||
In [RFC8915]: | In [RFC8915]: | |||
skipping to change at line 174 ¶ | skipping to change at line 175 ¶ | |||
registration policies: IETF Review, Specification Required, and | registration policies: IETF Review, Specification Required, and | |||
Private or Experimental Use. | Private or Experimental Use. | |||
Section 7.7 created the "Network Time Security Next Protocols" | Section 7.7 created the "Network Time Security Next Protocols" | |||
registry that similarly partitions the range. | registry that similarly partitions the range. | |||
Section 7.8 created the "Network Time Security Error Codes" and | Section 7.8 created the "Network Time Security Error Codes" and | |||
"Network Time Security Warning Codes" registries. Both registries | "Network Time Security Warning Codes" registries. Both registries | |||
are partitioned the same way. | are partitioned the same way. | |||
3. Registry Updates | 3. NTP Registry Updates | |||
The following general guidelines apply to all registries updated | ||||
here: | ||||
* Each registry reserves a partition for Private or Experimental | The following general guidelines apply to the NTP registries: | |||
Use. | ||||
* Entries with ASCII fields are now limited to uppercase letters or | * A partition of the "NTP Extension Field Types" registry is | |||
digits; fields starting with 0x58, the uppercase letter "X", are | ||||
reserved for Private or Experimental Use. | reserved for Private or Experimental Use. | |||
* The policy for every registry is now Specification Required, as | * In the "NTP Reference Identifier Codes" and "NTP Kiss-o'-Death | |||
Codes" registries, entries with ASCII fields are now limited to | ||||
uppercase letters or digits. Fields starting with 0x58, the | ||||
uppercase letter "X", are reserved for Private or Experimental | ||||
Use. | ||||
* The policy for each registry is now Specification Required, as | ||||
defined in [RFC8126], Section 4.6. | defined in [RFC8126], Section 4.6. | |||
The IESG is requested to choose three designated experts, with | 3.1. Designated Experts | |||
The IESG is requested to choose three designated experts (DEs), with | ||||
approvals from two being required to implement a change. Guidance | approvals from two being required to implement a change. Guidance | |||
for the experts is given below. | for the experts is given below. | |||
Each entry described in the sub-sections below is intended to | The DEs should be familiar with [RFC8126], particularly Section 5. | |||
completely replace the existing entry with the same name. | As that reference suggests, the DE should ascertain the existence of | |||
a suitable specification and verify that it is publicly available. | ||||
3.1. Guidance to Designated Experts | The DE is also expected to check the clarity of purpose and use of | |||
the requested code points. | ||||
The designated experts (DE) should be familiar with [RFC8126], | ||||
particularly Section 5. As that reference suggests, the DE should | ||||
ascertain the existence of a suitable specification and verify that | ||||
it is publicly available. The DE is also expected to check the | ||||
clarity of purpose and use of the requested code points. | ||||
In addition, the DE is expected to be familiar with this document, | In addition, the DE is expected to be familiar with this document, | |||
specifically the history documented here. | specifically the history documented here. | |||
4. IANA Considerations | 4. IANA Considerations | |||
Each entry described in the subsections below is intended to | ||||
completely replace the existing entry with the same name. | ||||
4.1. NTP Reference Identifier Codes | 4.1. NTP Reference Identifier Codes | |||
The registration procedure has been changed to Specification Required | The registration procedure has been changed to Specification Required | |||
and this document has been added as a reference. | and this document has been added as a reference. | |||
The Note has been changed to read as follows: | The Note has been changed to read as follows: | |||
| Codes beginning with the character "X" are reserved for | | Codes beginning with the character "X" are reserved for | |||
| experimentation and development. IANA cannot assign them. | | experimentation and development. IANA cannot assign them. | |||
skipping to change at line 419 ¶ | skipping to change at line 421 ¶ | |||
+---------------+------------------------------------+-------------+ | +---------------+------------------------------------+-------------+ | |||
| 0xF000-0xFFFF | Reserved for Experimental Use | RFC 9748 | | | 0xF000-0xFFFF | Reserved for Experimental Use | RFC 9748 | | |||
+---------------+------------------------------------+-------------+ | +---------------+------------------------------------+-------------+ | |||
Table 1 | Table 1 | |||
5. Security Considerations | 5. Security Considerations | |||
This document adds no new security considerations, as they are | This document adds no new security considerations, as they are | |||
defined in the document that defines the extension. See the | defined in the document that defines the extension. See the | |||
References column of the appropriate table. | References column of the appropriate IANA registry. | |||
6. Normative References | 6. Normative References | |||
[RFC5905] Mills, D., Martin, J., Ed., Burbank, J., and W. Kasch, | [RFC5905] Mills, D., Martin, J., Ed., Burbank, J., and W. Kasch, | |||
"Network Time Protocol Version 4: Protocol and Algorithms | "Network Time Protocol Version 4: Protocol and Algorithms | |||
Specification", RFC 5905, DOI 10.17487/RFC5905, June 2010, | Specification", RFC 5905, DOI 10.17487/RFC5905, June 2010, | |||
<https://www.rfc-editor.org/info/rfc5905>. | <https://www.rfc-editor.org/info/rfc5905>. | |||
[RFC5906] Haberman, B., Ed. and D. Mills, "Network Time Protocol | [RFC5906] Haberman, B., Ed. and D. Mills, "Network Time Protocol | |||
Version 4: Autokey Specification", RFC 5906, | Version 4: Autokey Specification", RFC 5906, | |||
End of changes. 15 change blocks. | ||||
50 lines changed or deleted | 52 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |