<?xml version="1.0" encoding="US-ASCII"?>
<!-- This template is for creating an Internet Draft using xml2rfc,
     which is available here: http://xml.resource.org. -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!-- One method to get references from the online citation libraries.
     There has to be one entity for each item to be referenced.
     An alternate method (rfc include) is described in the references. -->
<!ENTITY RFC1321 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.1321.xml">
<!ENTITY RFC5905 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5905.xml">
<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC6151 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6151.xml">
<!ENTITY RFC3552 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3552.xml">
<!ENTITY RFC2104 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2104.xml">
<!ENTITY RFC7630 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7630.xml">
<!ENTITY RFC4493 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4493.xml">
<!ENTITY RFC4543 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4543.xml">
<!ENTITY RFC4106 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4106.xml">
<!ENTITY RFC7696 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7696.xml">
<!ENTITY I-D.narten-iana-considerations-rfc2434bis SYSTEM
"http://xml.resource.org/public/rfc/bibxml3/reference.I-D.narten-iana-considerations-rfc2434bis.xml">
]>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs),
     please see http://xml.resource.org/authoring/README.html. -->
<!-- Below are generally applicable Processing Instructions (PIs) that most I-Ds might want to use.
     (Here they are set differently than their defaults in xml2rfc v1.32) -->
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation -->
<!-- control the table of contents (ToC) -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="4"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space
     (using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of list of popular I-D processing instructions -->
<rfc category="std" docName="draft-ietf-ntp-mac-02" ipr="trust200902">
  <!-- category values: std, bcp, info, exp, and historic
     ipr values: full3667, noModification3667, noDerivatives3667
     you can add the attributes updates="NNNN" and obsoletes="NNNN"
     they will automatically be output with "(if approved)" -->

  <!-- ***** FRONT MATTER ***** -->

  <front>
    <!-- The abbreviated title is used in the page header - it is only necessary if the
         full title is longer than 39 characters -->

    <title abbrev="MAC for NTP">
    Message Authentication Code for the Network Time Protocol
    </title>

    <!-- add 'role="editor"' below for the editors if appropriate -->

    <!-- Another author who claims to be an editor -->


    <author fullname="Aanchal Malhotra" initials="A." surname="Malhotra">
      <organization>Boston University </organization>

      <address>
        <postal>
          <street>111 Cummington St</street>

          <!-- Reorder these if your country does things differently -->

          <city>Boston, MA</city>

          <region/>

          <code>02215</code>

          <country>US</country>
        </postal>

        <phone/>

        <email>aanchal4@bu.edu</email>

        <!-- uri and facsimile elements may also be added -->
      </address>
    </author>

    <author fullname="Sharon Goldberg" initials="S." surname="Goldberg">
      <organization>Boston University</organization>

      <address>
        <postal>
          <street>111 Cummington St</street>

          <!-- Reorder these if your country does things differently -->

          <city>Boston, MA</city>

          <region/>

          <code>02215</code>

          <country>US</country>
        </postal>

        <phone/>

        <email>goldbe@cs.bu.edu</email>

        <!-- uri and facsimile elements may also be added -->
      </address>
    </author>

<!-- other authors -->

    <date year="2017"/>

    <!-- If the month and year are both specified and are the current ones,
         xml2rfc will fill in the current day for you. If only the current
         year is specified, xml2rfc will fill in the current day and month
         for you. If the year is not the current one, it is necessary to
         specify at least a month (xml2rfc assumes day="1" if not specified
         for the purpose of calculating the expiry date).  With drafts it is
         normally sufficient to specify just the year. -->

    <!-- Meta-data Declarations -->

    <area>General</area>

    <workgroup>Internet Engineering Task Force</workgroup>

    <!-- WG name at the upperleft corner of the doc,
         IETF is fine for individual submissions.
	 If this element is not present, the default is "Network Working
         Group", which is used by the RFC Editor as a nod to the history of
         the IETF. -->

    <keyword>NTP</keyword>

    <!-- Keywords will be incorporated into HTML output
         files in a meta tag but they have no effect on text or nroff
         output. If you submit your draft to the RFC Editor, the
         keywords will be used for the search engine. -->

    <abstract>
      <t>
          RFC 5905 <xref target="RFC5905"></xref> states that Network Time Protocol (NTP)
          packets should be authenticated by appending a 128-bit key
          to the NTP data, and hashing the result with MD5 to obtain a 128-bit tag.
          This document deprecates MD5-based authentication, which is considered to be too weak,
          and recommends the use of AES-CMAC <xref target="RFC4493"></xref> as a replacement.
      </t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
        <t> RFC 5905 <xref target="RFC5905"></xref> states that Network Time Protocol
            (NTP) packets should be authenticated by appending a 128-bit key to
            the NTP data, and hashing the result with MD5 to obtain a 128-bit tag.
            This document deprecates MD5-based authentication, which is considered to be too weak,
            and recommends the use of AES-CMAC <xref target="RFC4493"></xref> as a replacement.
          </t>


      <section title="Requirements Language">
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
        document are to be interpreted as described in <xref
        target="RFC2119">RFC 2119</xref>.</t>
      </section>
    </section>


    <section title="Deprecating MD5">

      <t>

      RFC 5905 <xref target="RFC5905"></xref> defines how the MD5 digest algorithm in
      <xref target="RFC1321">RFC 1321</xref> can be
      used as a message authentication code (MAC) for authenticating NTP packets. However, as
      discussed in <xref target="BCK"></xref> and
      <xref target="RFC6151"> RFC 6151 </xref>, this is not a secure MAC and therefore MUST be deprecated.
      </t>
      </section>

          <section title="Replacement Recommendation">
              <t>
                  If authentication is implemented, then AES-CMAC as specified
                  in <xref target="RFC4493">RFC 4493</xref> SHOULD be computed over all fields
                  in the NTP header, and any extension fields that are present in the NTP packet as described in <xref target="RFC5905"> RFC 5905 </xref>.
                   The MAC key for NTP SHOULD be 128 bits long AES-128 key and
                   the resulting MAC tag SHOULD be 128 bits long as stated in section 2.4 of <xref
                       target="RFC4493">RFC 4493</xref>. NTP makes this transition possible as it supports algorithm agility as described in Section 2.1 of <xref target="RFC7696">RFC 7696</xref>. </t>
              
                  
          </section>
          <section title="Motivation">
          <t>  AES-CMAC is recommended for the following reasons:</t>      
                  <t>
                  <list style="numbers">
                          <t>It is an IETF standard that is available 
                          in many open source implementations.</t>
                          <t>It is immune to nonce-reuse vulnerabilities 
                          (e.g. <xref target="Joux"></xref>)
                          because it does not use a nonce.</t>
                          <t>It has fine performance in terms of latency 
                          and throughput. </t>
                          <t> It benefits from native hardware support,
                          for instance, Intel's New Instruction set. </t>
                  </list> </t>
              </section>

<section title="Test Vectors">
    <t> For test vectors and their outputs refer to Section 4 of <xref target="RFC4493">RFC 4493</xref>
    </t>
</section>
   <section anchor="Acknowledgements" title="Acknowledgements">
      <t>The authors wish to acknowledge useful discussions with Leen Alshenibr,
      Daniel Franke, Ethan Heilman, Kenny Paterson, Leonid Reyzin, Harlan Stenn,
      and Mayank Varia.</t>
    </section>
    <section anchor="IANA" title="IANA Considerations">
      <t>This memo includes no request to IANA.</t>
    </section>


</middle>


    <!-- Possibly a 'Contributors' section ... -->

<!--
    <section anchor="IANA" title="IANA Considerations">
      <t>This memo requests IANA to allocate NTP Extension Field Types
      0x0006 (Suggested REFID, MAC required), 0x2006 (Suggested REFID, MAC
      OPTIONAL) for this purpose.</t>
    </section>
-->


  <!--  *****BACK MATTER ***** -->

  <back>
    <!-- References split into informative and normative -->

    <!-- There are 2 ways to insert reference entries from the citation libraries:
     1. define an ENTITY at the top, and use "ampersand character"RFC2629; here (as shown)
     2. simply use a PI "less than character"?rfc include="reference.RFC.2119.xml"?> here
        (for I-Ds: include="reference.I-D.narten-iana-considerations-rfc2434bis.xml")

     Both are cited textually in the same manner: by using xref elements.
     If you use the PI option, xml2rfc will, by default, try to find included files in the same
     directory as the including file. You can also define the XML_LIBRARY environment variable
     with a value containing a set of directories to search.  These can be either in the local
     filing system or remote ones accessed by http (http://domain/dir/... ).-->

    <references title="Normative References">
      <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml"?-->

      &RFC2119;

      <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.5905.xml"?-->
      &RFC5905;

      <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.1321.xml"?-->
      &RFC1321;

      <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.6151.xml"?-->
      &RFC6151;
      <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4493.xml"?-->

      &RFC4493;
      <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.7696.xml"?-->
      
      &RFC7696;
           </references>

    <!-- Here we use entities that we defined at the beginning. -->

    <references title="Informative References">
      <!--&RFC3552;-->

      <reference anchor="BCK">
          <front>
              <title>Keyed Hash Functions and Message Authentication</title>
              <author initials="M." surname="Bellare"><organization /></author>
              <author initials="R." surname="Canetti"><organization /></author>
              <author initials="H." surname="Krawczyk"><organization /></author>
              <date year="1996" />
          </front>
          <seriesInfo name="in" value="Proceedings of Crypto'96" />

      </reference>


      <reference anchor="Joux" target="http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/comments/800-38_Series-Drafts/GCM/Joux_comments.pdf">
          <front>
              <title>Authentication Failures in NIST version of GCM</title>
              <author initials="A." surname="Joux"><organization /></author>
              <date/>
          </front>
      </reference>




    </references>

    <!--
    <section anchor="app-additional" title="Additional Stuff">
      <t>This becomes an Appendix.</t>
    </section>
-->

    <!-- Change Log

v00 2016-07-NN  AM Initial Submission
                                                                                        -->
  </back>
</rfc>
