Skip to main content

Network Time Protocol REFID Updates
draft-ietf-ntp-refid-updates-00

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Expired".
Expired & archived
Authors Harlan Stenn , Sharon Goldberg
Last updated 2017-05-17 (Latest revision 2016-11-13)
Replaces draft-stenn-ntp-ipv6-refid-hash, draft-stenn-ntp-leap-smear-refid, draft-stenn-ntp-not-you-refid
RFC stream Internet Engineering Task Force (IETF)
Formats
Additional resources Mailing list discussion
Stream WG state WG Document
Document shepherd (None)
IESG IESG state Expired
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

RFC 5905 [RFC5905], section 7.3, "Packet Header Variables", defines the value of the REFID, the system peer for the responding host. In the past, for IPv4 associations the IPv4 address is used, and for IPv6 associations the first four octets of the MD5 hash of the IPv6 are used. There are at least three shortcomings to this approach, and this proposal will address the three so noted. One is that knowledge of the system peer is "abusable" information and should not be generally available. The second is that the four octet hash of the IPv6 address looks very much like an IPv4 address, and this is confusing. The third is that a growing number of low-stratum servers want to offer leap-smeared time to their clients, and there is no obvious way to know if a server is offering accurate time or leap- smeared time.

Authors

Harlan Stenn
Sharon Goldberg

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)