<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!-- One method to get references from the online citation libraries.
    There has to be one entity for each item to be referenced.
    An alternate method (rfc include) is described in the references. -->

<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC2629 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2629.xml">
<!ENTITY RFC3552 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3552.xml">
<!ENTITY RFC5226 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5226.xml">

<!ENTITY RFC768 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.0768.xml">
<!ENTITY RFC791 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.0791.xml">
<!ENTITY RFC8200 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.8200.xml">

<!ENTITY RFC6241 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6241.xml">
<!ENTITY RFC5905 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5905.xml">
<!ENTITY RFC7384 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7384.xml">
]>

<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs),
    please see http://xml.resource.org/authoring/README.html. -->
<!-- Below are generally applicable Processing Instructions (PIs) that most I-Ds might want to use.
    (Here they are set differently than their defaults in xml2rfc v1.32) -->
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation -->
<!-- control the table of contents (ToC) -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="4"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space
    (using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of list of popular I-D processing instructions -->
<rfc category="std" docName="draft-ietf-tictoc-ptp-enterprise-profile-18" ipr="trust200902">
 <!-- category values: std, bcp, info, exp, and historic
    ipr values: trust200902, noModificationTrust200902, noDerivativesTrust200902,
       or pre5378Trust200902
    you can add the attributes updates="NNNN" and obsoletes="NNNN"
    they will automatically be output with "(if approved)" -->

 <!-- ***** FRONT MATTER ***** -->

 <front>
   <!-- The abbreviated title is used in the page header - it is only necessary if the
        full title is longer than 39 characters -->

   <title abbrev="Enterprise Profile for PTP">Enterprise Profile for the Precision Time Protocol With Mixed Multicast and Unicast Messages</title>

   <!-- add 'role="editor"' below for the editors if appropriate -->

   <!-- Another author who claims to be an editor -->

   <author fullname="Doug Arnold" initials="D.A."
           surname="Arnold">
     <organization>Meinberg-USA</organization>

     <address>
       <postal>
         <street>3 Concord Rd</street>

         <!-- Reorder these if your country does things differently -->

         <city>Shrewsbury</city>

         <region>Massachusetts</region>

         <code>01545</code>

         <country>USA</country>
       </postal>

       <phone></phone>

       <email>doug.arnold@meinberg-usa.com</email>

       <!-- uri and facsimile elements may also be added -->
     </address>
   </author>

   <author fullname="Heiko Gerstung" initials="H.G."
           surname="Gerstung">
     <organization>Meinberg</organization>

     <address>
       <postal>
         <street>Lange Wand 9</street>

         <!-- Reorder these if your country does things differently -->

         <city>Bad Pyrmont</city>

         <region></region>

         <code>31812</code>

         <country>Germany</country>
       </postal>

       <phone></phone>

       <email>heiko.gerstung@meinberg.de</email>

       <!-- uri and facsimile elements may also be added -->
     </address>
   </author>

   <date year="2020" />

   <!-- If the month and year are both specified and are the current ones, xml2rfc will fill
        in the current day for you. If only the current year is specified, xml2rfc will fill
	 in the current day and month for you. If the year is not the current one, it is
	 necessary to specify at least a month (xml2rfc assumes day="1" if not specified for the
	 purpose of calculating the expiry date).  With drafts it is normally sufficient to
	 specify just the year. -->

   <!-- Meta-data Declarations -->

   <area>General</area>

   <workgroup>TICTOC Working Group</workgroup>


   <keyword>PTP</keyword>
   <keyword>Enterprise Profile</keyword>


   <abstract>
     <t>This document describes a profile for the use of the Precision
    Time Protocol in an IPV4 or IPv6 Enterprise information system
    environment.  The profile uses the End to End Delay Measurement
    Mechanism, allows both multicast and unicast Delay Request and Delay
    Response Messages.</t>
   </abstract>

 </front>

 <middle>
   <section title="Introduction">
     <t>The Precision Time Protocol ("PTP"), standardized in IEEE 1588,
     has been designed in its first version (IEEE 1588-2002) with the
     goal to minimize configuration on the participating nodes. Network
     communication was based solely on multicast messages, which unlike
     NTP did not require that a receiving node ("slave clock") in
     <xref target="IEEE1588">IEEE&nbsp;1588-2008</xref> needs to know the identity
     of the time sources in the network (the Master Clocks).</t>

     <t>The "Best Master Clock Algorithm" (<xref
     target="IEEE1588">IEEE&nbsp;1588-2008</xref> Subclause 9.3), a
     mechanism that all participating PTP nodes must follow, set up
     strict rules for all members of a PTP domain to determine which
     node shall be the active sending time source (Master Clock).
     Although the multicast communication model has advantages in
     smaller networks, it complicated the application of PTP in larger
     networks, for example in environments like IP based
     telecommunication networks or financial data centers. It is
     considered inefficient that, even if the content of a message
     applies only to one receiver, it is forwarded by the underlying
     network (IP) to all nodes, requiring them to spend network
     bandwidth and other resources, such as CPU cycles, to drop the
     message.</t>

     <t>The second revision of the standard (IEEE 1588-2008) is the
     current version (also known as PTPv2) and introduced the
     possibility to use unicast communication between the PTP nodes in
     order to overcome the limitation of using multicast messages for
     the bi-directional information exchange between PTP nodes. The
     unicast approach avoided that, in PTP domains with a lot of nodes,
     devices had to throw away more than 99% of the received multicast
     messages because they carried information for some other node.
     PTPv2 also introduced PTP profiles (<xref
     target="IEEE1588">IEEE&nbsp;1588-2008</xref> subclause 19.3).
     This construct allows organizations to specify selections of
     attribute values and optional features, simplifying the
     configuration of PTP nodes for a specific application. Instead of
     having to go through all possible parameters and configuration
     options and individually set them up, selecting a profile on a PTP
     node will set all the parameters that are specified in the profile
     to a defined value. If a PTP profile definition allows multiple
     values for a parameter, selection of the profile will set the
     profile-specific default value for this parameter. Parameters not
     allowing multiple values are set to the value defined in the PTP
     profile. Many PTP features and functions are optional, and a
     profile should also define which optional features of PTP are
     required, permitted, or prohibited. It is possible to extend the
     PTP standard with a PTP profile by using the TLV mechanism of PTP
     (see <xref target="IEEE1588">IEEE&nbsp;1588-2008</xref> subclause 13.4),
     defining an optional Best Master Clock Algorithm and a few other ways.
     PTP has its own management protocol (defined in
     <xref target="IEEE1588">IEEE&nbsp;1588-2008</xref> subclause 15.2) but
     allows a PTP profile specify an alternative management mechanism,
     for example SNMP.</t>

   </section>

   <section title="Requirements Language">
       <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
       "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
       document are to be interpreted as described in <xref
       target="RFC2119">RFC 2119</xref>.</t>
   </section>

   <section anchor="technical_terms" title="Technical Terms">
     <t>
      <list style="symbols">
          <t>Acceptable Master Table: A PTP Slave Clock may maintain a list of
          masters which it is willing to synchronize to.</t>

          <t>Alternate Master: A PTP Master Clock, which is not the Best
          Master, may act as a master with the Alternate Master flag set on
          the messages it sends.</t>

          <t>Announce message: Contains the Master Clock properties of a Master
          Clock.  Used to determine the Best Master.</t>

          <t>Best Master:  A clock with a port in the master state, operating
          consistently with the Best Master Clock Algorithm.</t>

          <t>Best Master Clock Algorithm: A method for determining which state
          a port of a PTP clock should be in.  The algorithm works by
          identifying which of several PTP Master capable clocks is the best
          master.  Clocks have priority to become the acting Grandmaster,
          based on the properties each Master Clock sends in its Announce
          Message.</t>

          <t>Boundary Clock: A device with more than one PTP port.  Generally
          boundary Clocks will have one port in slave state to receive
          timing and then other ports in master state to re-distribute the
          timing.</t>

          <t>Clock Identity: In IEEE 1588-2008 this is a 64-bit number
          assigned to each PTP clock which must be unique. Often it is
          derived from the Ethernet MAC address, since there is already an
          international infrastructure for assigning unique numbers to each
          device manufactured.</t>

          <t>Domain: Every PTP message contains a domain number.  Domains are
          treated as separate PTP systems in the network.  Clocks, however,
          can combine the timing information derived from multiple domains.</t>

          <t>End to End Delay Measurement Mechanism: A network delay
          measurement mechanism in PTP facilitated by an exchange of
          messages between a Master Clock and Slave Clock.</t>

          <t>Grandmaster: the primary Master Clock within a domain of a PTP
          system</t>

          <t>IEEE 1588: The timing and synchronization standard which defines
          PTP, and describes the node, system, and communication properties
          necessary to support PTP.</t>

          <t>Master Clock: a clock with at least one port in the master state.</t>

          <t>NTP: Network Time Protocol, defined by RFC 5905, see <xref
          target="RFC5905">RFC 5905</xref></t>

          <t>Ordinary Clock: A clock that has a single Precision Time Protocol
          (PTP) port in a domain and maintains the timescale used in the
          domain. It may serve as a Master Clock, or be a slave clock.</t>

          <t>Peer to Peer Delay Measurement Mechanism: A network delay
          measurement mechanism in PTP facilitated by an exchange of
          messages between adjacent devices in a network.</t>

          <t>Preferred Master: A device intended to act primarily as the
          Grandmaster of a PTP system, or as a back up to a Grandmaster.</t>

          <t>PTP: The Precision Time Protocol, the timing and synchronization
          protocol defined by IEEE 1588.</t>

          <t>PTP port: An interface of a PTP clock with the network.  Note that
          there may be multiple PTP ports running on one physical interface,
          for example, a unicast slave which talks to several Grandmaster
          clocks in parallel.</t>

          <t>PTPv2: Refers specifically to the second version of PTP defined by
          IEEE 1588-2008.</t>

          <t>Rogue Master: A clock with a port in the master state, even though
          it should not be in the master state according to the Best Master
          Clock Algorithm, and does not set the alternate master flag.</t>

          <t>Slave clock: a clock with at least one port in the slave state,
          and no ports in the master state.</t>

          <t>Slave Only Clock: An Ordinary Clock which cannot become a Master
          Clock.</t>

          <t>TLV: Type Length Value, a mechanism for extending messages in
          networked communications.</t>

          <t>Transparent Clock.  A device that measures the time taken for a
          PTP event message to transit the device and then updates the
          message with a correction for this transit time.</t>

          <t>Unicast Discovery: A mechanism for PTP slaves to establish a
          unicast communication with PTP masters using a configures table of
          master IP addresses and Unicast Message Negotiation.</t>

          <t>Unicast Negotiation: A mechanism in PTP for Slave Clocks to
          negotiate unicast Sync, announce and Delay Request Message Rates
          from a Master Clock.</t>

       </list>
     </t>
   </section>

   <section title="Problem Statement">

      <t>This document describes a version of PTP intended to work in large
      enterprise networks.  Such networks are deployed, for example, in
      financial corporations.  It is becoming increasingly common in such
      networks to perform distributed time tagged measurements, such as
      one-way packet latencies and cumulative delays on software
      systems spread across multiple computers. Furthermore, there is
      often a desire to check the age of information time tagged by a
      different machine.  To perform these measurements, it is necessary
      to deliver a common precise time to multiple devices on a network.
      Accuracy currently required in the Financial Industry range from
      100 microseconds to 100 nanoseconds to the Grandmaster.  This
      profile does not specify timing performance requirements, but such
      requirements explain why the needs cannot always be met by NTP, as
      commonly implemented. Such accuracy cannot usually be achieved with
      a traditional time transfer such as NTP, without adding
      non-standard customizations such as hardware time stamping, and on
      path support.  These features are currently part of PTP, or are
      allowed by it.  Because PTP has a complex range of features and
      options it is necessary to create a profile for enterprise
      networks to achieve interoperability between equipment
      manufactured by different vendors.</t>

      <t>Although enterprise networks can be large, it is becoming
      increasingly common to deploy multicast protocols, even across
      multiple subnets. For this reason, it is desired to make use of
      multicast whenever the information going to many destinations is
      the same.  It is also advantageous to send information which is
      unique to one device as a unicast message.  The latter can be
      essential as the number of PTP slaves becomes hundreds or
      thousands.</t>

      <t>PTP devices operating in these networks need to be robust.  This
      includes the ability to ignore PTP messages which can be
      identified as improper, and to have redundant sources of time.</t>

      <t>Interoperability among independent implementations of this PTP
      profile has been demonstrated at the ISPCS Plugfest <xref
      target="ISPCS">ISPCS</xref>.</t>

   </section>

   <section title="Network Technology">
      <t>This PTP profile SHALL operate only in networks characterized by
      UDP <xref
      target="RFC0768">RFC 768</xref> over either IPv4 <xref
      target="RFC0791">RFC 791</xref> or IPv6 <xref target="RFC8200">RFC 8200</xref>,
      as described by Annexes D and E in <xref target="IEEE1588">IEEE 1588
      </xref> respectively.  If a
      network contains both IPv4 and IPv6, then they SHALL be treated as
      separate communication paths.  Clocks which communicate using IPv4
      can interact with clocks using IPv6 if there is an intermediary
      device which simultaneously communicates with both IP versions. A
      Boundary Clock might perform this function, for example.  A PTP
      domain SHALL use either IPv4 or IPv6 over a communication path,
      but not both. The PTP system MAY include switches and routers.
      These devices MAY be Transparent Clocks, boundary Clocks, or
      neither, in any combination.  PTP Clocks MAY be Preferred Masters,
      Ordinary Clocks, or Boundary Clocks.  The Ordinary Clocks may be
      Slave Only Clocks, or be master capable.</t>

      <t>Note that clocks SHOULD always be identified by their clock ID and
      not the IP or Layer 2 address.  This is important in IPv6 networks
      since Transparent Clocks are required to change the source address
      of any packet which they alter.  In IPv4 networks some clocks
      might be hidden behind a NAT, which hides their IP addresses from
      the rest of the network.  Note also that the use of NATs may place
      limitations on the topology of PTP networks, depending on the port
      forwarding scheme employed.  Details of implementing PTP with NATs
      are out of scope of this document.</t>

      <t>PTP, like NTP, assumes that the one-way network delay for Sync
      Messages and Delay Response Messages are the same. When this is
      not true it can cause errors in the transfer of time from the
      Master to the Slave. It is up to the system integrator to design
      the network so that such effects do not prevent the PTP system
      from meeting the timing requirements. The details of network asymmetry
      are outside the scope of this document.  See for
      example, <xref target="G8271">ITU-T G.8271</xref>.</t>
  </section>

  <section title="Time Transfer and Delay Measurement">

    <t>Master Clocks, Transparent Clocks and Boundary Clocks MAY be
    either one-step clocks or two-step clocks.  Slave clocks MUST
    support both behaviors. The End to End Delay Measurement Method
    MUST be used.</t>

    <t>Note that, in IP networks, Sync messages and Delay Request
    messages exchanged between a master and slave do not necessarily
    traverse the same physical path. Thus, wherever possible, the
    network SHOULD be traffic engineered so that the forward and
    reverse routes traverse the same physical path.  Traffic
    engineering techniques for path consistency are out of scope of
    this document.</t>

    <t>Sync messages MUST be sent as PTP event multicast messages (UDP
    port 319) to the PTP primary IP address.   Two step clocks SHALL
    send Follow-up messages as PTP general messages (UDP port 320).
    Announce messages MUST be sent as multicast messages (UDP port 320)
    to the PTP primary address.  The PTP primary IP address is
    224.0.1.129 for IPv4 and FF0X:0:0:0:0:0:0:181 for Ipv6, where X can
    be a value between 0x0 and 0xF, see <xref
    target="IEEE1588">IEEE 1588</xref> Annex E, Section
    E.3.</t>

    <t>Delay Request Messages MAY be sent as either multicast or unicast
    PTP event messages. Master Clocks SHALL respond to multicast Delay
    Request messages with multicast Delay Response PTP general
    messages. Master Clocks SHALL respond to unicast Delay Request PTP
    event messages with unicast Delay Response PTP general messages.
    This allow for the use of Ordinary Clocks which do not support the
    Enterprise Profile, if they are slave Only Clocks.</t>

    <t>Clocks SHOULD include support for multiple domains.  The purpose is
    to support multiple simultaneous masters for redundancy. Leaf
    devices (non-forwarding devices) can use timing information from
    multiple masters by combining information from multiple
    instantiations of a PTP stack, each operating in a different
    domain. Redundant sources of timing can be ensembled, and/or
    compared to check for faulty Master Clocks. The use of multiple
    simultaneous masters will help mitigate faulty masters reporting as
    healthy, network delay asymmetry, and security problems.  Security
    problems include man-in-the-middle attacks such as delay attacks,
    packet interception / manipulation attacks. Assuming the path to
    each master is different, failures malicious or otherwise would
    have to happen at more than one path simultaneously. Whenever
    feasible, the underlying network transport technology SHOULD be
    configured so that timing messages in different domains traverse
    different network paths.</t>

  </section>


  <section title="Default Message Rates">

    <t>The Sync, Announce and Delay Request default message rates SHALL
    each be once per second.  The Sync and Delay Request message rates
    MAY be set to other values, but not less than once every 128
    seconds, and not more than 128 messages per second.  The Announce
    message rate SHALL NOT be changed from the default value.  The
    Announce Receipt Timeout Interval SHALL be three Announce
    Intervals for Preferred Masters, and four Announce Intervals for
    all other masters.</t>

    <t>The logMessageInterval carried in the unicast Delay Response
    message MAY be set to correspond to the master ports preferred
    message period, rather than 7F, which indicates message periods
    are to be negotiated.  Note that negotiated message periods are not
    allowed, see <xref target="forbidden_ptp_options">forbidden PTP
    options</xref>.</t>

  </section>

  <section title="Requirements for Master Clocks">

    <t>Master Clocks SHALL obey the standard Best Master Clock Algorithm
    from <xref
    target="IEEE1588">IEEE 1588</xref>.  PTP systems using this profile MAY support
    multiple simultaneous Grandmasters if each active Grandmaster is
    operating in a different PTP domain.</t>

    <t>A port of a clock SHALL NOT be in the master state unless the
    clock has a current value for the number of UTC leap
    seconds.</t>

    <t>If a unicast negotiation signaling message is received it SHALL
    be ignored.</t>

  </section>

  <section title="Requirements for Slave Clocks">

    <t>Slave clocks MUST be able to operate properly in a network which
    contains multiple Masters in multiple domains.  Slaves SHOULD make
    use of information from the all Masters in their clock control
    subsystems.  Slave Clocks MUST be able to operate properly in the
    presence of a Rogue Master.  Slaves SHOULD NOT Synchronize to a
    Master which is not the Best Master in its domain. Slaves will
    continue to recognize a Best Master for the duration of the
    Announce Time Out Interval. Slaves MAY use an Acceptable Master
    Table.  If a Master is not an Acceptable Master, then the Slave
    MUST NOT synchronize to it. Note that IEEE 1588-2008 requires
    slave clocks to support both two-step or one-step Master clocks.
    See <xref
    target="IEEE1588">IEEE 1588</xref>, subClause 11.2.</t>

    <t>Since Announce messages are sent as multicast messages slaves can
    obtain the IP addresses of a master from the Announce messages.
    Note that the IP source addresses of Sync and Follow-up messages
    may have been replaced by the source addresses of a Transparent
    Clock, so, slaves MUST send Delay Request messages to the IP
    address in the Announce message.  Sync and Follow-up messages can
    be correlated with the Announce message using the clock ID, which
    is never altered by Transparent Clocks in this profile.</t>

  </section>

  <section title="Requirements for Transparent Clocks">

    <t>Transparent Clocks SHALL NOT change the transmission mode of an
    Enterprise Profile PTP message.  For example, a Transparent Clock
    SHALL NOT change a unicast message to a multicast message.
    Transparent Clocks SHOULD support multiple domains.  Transparent
    Clocks which syntonize to the master clock will need to maintain
    separate clock rate offsets for each of the supported domains.</t>

  </section>

  <section title="Requirements for Boundary Clocks">

    <t>Boundary Clocks SHOULD support multiple simultaneous PTP domains.
    This will require them to maintain servo loops for each of the
    domains supported, at least in software.  Boundary Clocks MUST NOT
    combine timing information from different domains.</t>

  </section>

  <section title="Management and Signaling Messages">

    <t>PTP Management messages MAY be used.  Management
    messages intended for a specific clock, i.e. the <xref
    target="IEEE1588">IEEE 1588</xref> defined
    attribute targetPortIdentity.clockIdentity is not set to All 1s,
    MUST be sent as a unicast message.  Similarly, if any signaling
    messages are used they MUST also be sent as unicast messages
    whenever the message is intended for a specific clock.</t>

  </section>

  <section title="Forbidden PTP Options" anchor="forbidden_ptp_options">

    <t>Clocks operating in the Enterprise Profile SHALL NOT use peer to
    peer timing for delay measurement.  Grandmaster Clusters are NOT
    ALLOWED. The Alternate Master option is also NOT ALLOWED. Clocks
    operating in the Enterprise Profile SHALL NOT use Alternate
    Timescales. Unicast discovery and unicast negotiation SHALL NOT be
    used.</t>

  </section>

  <section title="Interoperation with IEEE 1588 Default Profile">

    <t>Clocks operating in the Enterprise Profile will interoperate with
    clocks operating in the Default Profile described in <xref
    target="IEEE1588">IEEE 1588</xref>
    Annex J.3.  This variant of the Default Profile uses the End to End
    Delay Measurement Mechanism.  In addition, the Default Profile
    would have to operate over IPv4 or IPv6 networks, and use
    management messages in unicast when those messages are directed at
    a specific clock. If either of these requirements are not met than
    Enterprise Profile clocks will not interoperate with Annex J.3
    Default Profile Clocks.  The Enterprise Profile will not
    interoperate with the Annex J.4 variant of the Default Profile
    which requires use of the Peer to Peer Delay Measurement Mechanism.</t>

    <t>Enterprise Profile Clocks will interoperate with clocks operating
    in other profiles if the clocks in the other profiles obey the
    rules of the Enterprise Profile.  These rules MUST NOT be changed
    to achieve interoperability with other profiles.</t>

  </section>

  <section title="Profile Identification">
    <figure>
      <preamble>The IEEE 1588 standard requires that all profiles provide the
        following identifying information.</preamble>

        <artwork>
          PTP Profile:
          Enterprise Profile
          Version: 1.0
          Profile identifier: 00-00-5E-00-01-00

          This profile was specified by the IETF

          A copy may be obtained at
          https://datatracker.ietf.org/wg/tictoc/documents
        </artwork>
    </figure>
  </section>


   <section anchor="Acknowledgements" title="Acknowledgements">
      <t>The authors would like to thank members of IETF for reviewing and providing feedback on this draft.</t>

      <t>This document was initially prepared using 2-Word-v2.0.template.dot
         and has later been converted manually into xml format using an xml2rfc template.</t>
   </section>

   <section anchor="IANA" title="IANA Considerations">
      <t>There are no IANA requirements in this specification.</t>
   </section>

   <section anchor="Security" title="Security Considerations">

       <t>Protocols used to transfer time, such as PTP and NTP can be
       important to security mechanisms which use time windows for keys
       and authorization. Passing time through the networks poses a
       security risk since time can potentially be manipulated.
       The use of multiple simultaneous masters, using multiple PTP
       domains can mitigate problems from rogue masters and
       man-in-the-middle attacks.  See sections 9 and 10. Additional
       security mechanisms are outside the scope of this document.</t>

       <t>PTP native management messages SHOULD not be used, due to the lack
       of a security mechanism for this option. Secure management can be
       obtained using standard management mechanisms which include
       security, for example NETCONF <xref
       target="RFC6241">NETCONF</xref>.</t>

       <t>General security considerations of time protocols are discussed in
       <xref
       target="RFC7384">RFC 7384</xref>.</t>

   </section>

</middle>

 <!--  *****BACK MATTER ***** -->

<back>
   <!-- References split into informative and normative -->

   <!-- There are 2 ways to insert reference entries from the citation libraries:
    1. define an ENTITY at the top, and use "ampersand character"RFC2629; here (as shown)
    2. simply use a PI "less than character"?rfc include="reference.RFC.2119.xml"?> here
       (for I-Ds: include="reference.I-D.narten-iana-considerations-rfc2434bis.xml")

    Both are cited textually in the same manner: by using xref elements.
    If you use the PI option, xml2rfc will, by default, try to find included files in the same
    directory as the including file. You can also define the XML_LIBRARY environment variable
    with a value containing a set of directories to search.  These can be either in the local
    filing system or remote ones accessed by http (http://domain/dir/... ).-->

   <references title="Normative References">
     <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml"?-->

     <reference anchor="IEEE1588" target="https://www.ieee.org">
       <!-- the following is the minimum to make xml2rfc happy -->

       <front>
         <title>IEEE std. 1588-2008, "IEEE Standard for a
                Precision Clock Synchronization for Networked
                Measurement and Control Systems."</title>

         <author>
           <organization>Institute of Electrical and Electronics Engineers</organization>
         </author>

         <date month="7" year="2008" />
       </front>
     </reference>

     &RFC768;

     &RFC791;

     &RFC2119;

     &RFC8200;


   </references>

   <references title="Informative References">

     <reference anchor="G8271" target="https://www.itu.int">

       <front>
         <title>ITU-T G.8271/Y.1366, "Time and Phase Synchronization Aspects of Packet Networks"</title>

         <author>
           <organization>International Telecommunication Union</organization>
         </author>


         <date month="2" year="2012"/>
       </front>
     </reference>

     <reference anchor="ISPCS" target="https://www.ispcs.org">

       <front>
         <title>Plugfest Report</title>

         <author surname="Arnold" initials="D.A.">
           <organization>International Symposium on Precision Clock
                   Synchronization for Measurement, Control and Communications</organization>
         </author>
         <date month="10" year="2017"/>
       </front>
     </reference>

     &RFC6241;

     &RFC5905;

     &RFC7384;

   </references>

 </back>
</rfc>
