<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" docName="draft-ietf-ntp-port-randomization-08" indexInclude="true" ipr="trust200902" number="9109" prepTime="2021-08-23T21:11:34" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" updates="5905" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-ntp-port-randomization-08" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9109" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="NTP Port Randomization">Network Time Protocol Version 4: Port Randomization</title>
    <seriesInfo name="RFC" value="9109" stream="IETF"/>
    <author initials="F." surname="Gont" fullname="Fernando Gont">
      <organization showOnFrontPage="true">SI6 Networks</organization>
      <address>
        <postal>
          <street>Evaristo Carriego 2644</street>
          <city>Haedo, Provincia de Buenos Aires</city>
          <code>1706</code>
          <country>Argentina</country>
        </postal>
        <phone>+54 11 4650 8472</phone>
        <email>fgont@si6networks.com</email>
        <uri>https://www.si6networks.com</uri>
      </address>
    </author>
    <author initials="G." surname="Gont" fullname="Guillermo Gont">
      <organization showOnFrontPage="true">SI6 Networks</organization>
      <address>
        <postal>
          <street>Evaristo Carriego 2644</street>
          <city>Haedo, Provincia de Buenos Aires</city>
          <code>1706</code>
          <country>Argentina</country>
        </postal>
        <phone>+54 11 4650 8472</phone>
        <email>ggont@si6networks.com</email>
        <uri>https://www.si6networks.com</uri>
      </address>
    </author>
    <author initials="M." surname="Lichvar" fullname="Miroslav Lichvar">
      <organization showOnFrontPage="true">Red Hat</organization>
      <address>
        <postal>
          <street>Purkynova 115</street>
          <city>Brno</city>
          <code>612 00</code>
          <country>Czech Republic</country>
        </postal>
        <email>mlichvar@redhat.com</email>
      </address>
    </author>
    <date month="08" year="2021"/>
    <workgroup>Network Time Protocol (ntp) Working Group</workgroup>
    <keyword>security</keyword>
    <keyword>transport protocols</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">
   The Network Time Protocol (NTP) can operate in several modes.  Some of these
   modes are based on the receipt of unsolicited packets and therefore
   require the use of a well-known port as the local port.  However, in
   the case of NTP modes where the use of a well-known port is not required,
   employing such a well-known port unnecessarily facilitates the ability of
   attackers to perform blind/off-path attacks. This document formally
   updates RFC 5905, recommending the use of transport-protocol ephemeral port
   randomization for those modes where use of the NTP well-known port is not
   required.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9109" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2021 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Simplified BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Simplified BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-considerations-about-port-r">Considerations about Port Randomization in NTP</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-mitigation-against-off-path">Mitigation against Off-Path Attacks</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-effects-on-path-selection">Effects on Path Selection</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.3">
                <t indent="0" pn="section-toc.1-1.3.2.3.1"><xref derivedContent="3.3" format="counter" sectionFormat="of" target="section-3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-filtering-of-ntp-traffic">Filtering of NTP Traffic</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.4">
                <t indent="0" pn="section-toc.1-1.3.2.4.1"><xref derivedContent="3.4" format="counter" sectionFormat="of" target="section-3.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-effect-on-napt-devices">Effect on NAPT Devices</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-update-to-rfc-5905">Update to RFC 5905</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.7.2">
              <li pn="section-toc.1-1.7.2.1">
                <t indent="0" pn="section-toc.1-1.7.2.1.1"><xref derivedContent="7.1" format="counter" sectionFormat="of" target="section-7.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.2">
                <t indent="0" pn="section-toc.1-1.7.2.2.1"><xref derivedContent="7.2" format="counter" sectionFormat="of" target="section-7.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgments">Acknowledgments</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="sect-1" numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">
   The Network Time Protocol (NTP) is one of the oldest Internet
   protocols and is currently specified in <xref target="RFC5905" format="default" sectionFormat="of" derivedContent="RFC5905"/>.  Since its original
   implementation, standardization, and deployment, a number of
   vulnerabilities have been found both in the NTP specification and in
   some of its implementations <xref target="NTP-VULN" format="default" sectionFormat="of" derivedContent="NTP-VULN"/>.  Some of these
   vulnerabilities allow for blind/off-path attacks, where an attacker
   can send forged packets to one or both NTP peers to achieve Denial
   of Service (DoS), time shifts, or other undesirable outcomes.  Many
   of these attacks require the attacker to guess or know at least a
   target NTP association, typically identified by the tuple {srcaddr,
   srcport, dstaddr, dstport, keyid} (see <xref target="RFC5905" sectionFormat="of" section="9.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5905#section-9.1" derivedContent="RFC5905"/>).
   Some of these parameters may be known or easily guessed.</t>
      <t indent="0" pn="section-1-2">
   NTP can operate in several modes.  Some of these modes rely on the
   ability of nodes to receive unsolicited packets and therefore
   require the use of the NTP well-known port (123).  However, for modes
   where the use of a well-known port is not required, employing the
   NTP well-known port unnecessarily facilitates the ability of attackers
   to perform blind/off-path attacks (since knowledge of the port
   numbers is typically required for such attacks).  A recent study
   <xref target="NIST-NTP" format="default" sectionFormat="of" derivedContent="NIST-NTP"/> that analyzes the port numbers employed by NTP clients
   suggests that numerous NTP clients employ the NTP well-known port as their local port, or select predictable ephemeral
   port numbers, thus unnecessarily facilitating the ability of
   attackers to perform blind/off-path attacks against NTP.</t>
      <t indent="0" pn="section-1-3">
   BCP 156 <xref target="RFC6056" format="default" sectionFormat="of" derivedContent="RFC6056"/> already recommends the randomization of transport-protocol ephemeral ports.  This document aligns NTP with the
   recommendation in BCP 156 <xref target="RFC6056" format="default" sectionFormat="of" derivedContent="RFC6056"/> by formally updating <xref target="RFC5905" format="default" sectionFormat="of" derivedContent="RFC5905"/>
   such that port randomization is employed for those NTP modes for
   which the use of the NTP well-known port is not needed.</t>
    </section>
    <section anchor="sect-2" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-terminology">Terminology</name>
      <t indent="0" pn="section-2-1">
   The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>",
   "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", and
   "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as described in BCP
   14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> when, and only when, they appear in all
   capitals, as shown here.</t>
    </section>
    <section anchor="sect-3" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-considerations-about-port-r">Considerations about Port Randomization in NTP</name>
      <t indent="0" pn="section-3-1">
   The following subsections analyze a number of considerations about
   transport-protocol ephemeral port randomization when applied to NTP.</t>
      <section anchor="sect-3.1" numbered="true" toc="include" removeInRFC="false" pn="section-3.1">
        <name slugifiedName="name-mitigation-against-off-path">Mitigation against Off-Path Attacks</name>
        <t indent="0" pn="section-3.1-1">
   There has been a fair share of work in the area of blind/off-path
   attacks against transport protocols and upper-layer protocols, such
   as <xref target="RFC4953" format="default" sectionFormat="of" derivedContent="RFC4953"/> and <xref target="RFC5927" format="default" sectionFormat="of" derivedContent="RFC5927"/>.  Whether the target of the attack is a
   transport-protocol instance (e.g., TCP connection) or an upper-layer
   protocol instance (e.g., an application-protocol instance), the
   attacker is required to know or guess the five-tuple {Protocol, IP
   Source Address, IP Destination Address, Source Port, Destination
   Port} that identifies the target transport-protocol instance or the
   transport-protocol instance employed by the target upper-layer
   protocol instance.  Therefore, increasing the difficulty of guessing
   this five-tuple helps mitigate blind/off-path attacks.</t>
        <t indent="0" pn="section-3.1-2">
   As a result of these considerations, transport-protocol ephemeral
   port randomization is a best current practice (BCP 156) that helps
   mitigate off-path attacks at the transport layer.  This document
   aligns the NTP specification <xref target="RFC5905" format="default" sectionFormat="of" derivedContent="RFC5905"/> with the existing best current
   practice on transport-protocol ephemeral port selection, irrespective of other
   techniques that may (and should) be implemented for mitigating off-path attacks.</t>
        <t indent="0" pn="section-3.1-3">
   We note that transport-protocol ephemeral port randomization is a
   transport-layer mitigation against blind/off-path attacks and does
   not preclude (nor is it precluded by) other possible mitigations for
   off-path attacks that might be implemented at other layers (e.g.,
   <xref target="I-D.ietf-ntp-data-minimization" format="default" sectionFormat="of" derivedContent="NTP-DATA-MINIMIZATION"/>).  For instance, some of the
   aforementioned mitigations may be ineffective against some off-path
   attacks <xref target="NTP-FRAG" format="default" sectionFormat="of" derivedContent="NTP-FRAG"/> or may benefit from the additional entropy
   provided by port randomization <xref target="NTP-security" format="default" sectionFormat="of" derivedContent="NTP-security"/>.</t>
      </section>
      <section anchor="sect-3.2" numbered="true" toc="include" removeInRFC="false" pn="section-3.2">
        <name slugifiedName="name-effects-on-path-selection">Effects on Path Selection</name>
        <t indent="0" pn="section-3.2-1">
   Intermediate systems implementing the Equal-Cost Multipath (ECMP)
   algorithm may select the outgoing link by computing a hash over a
   number of values, including the transport-protocol source port.
   Thus, as discussed in <xref target="NTP-CHLNG" format="default" sectionFormat="of" derivedContent="NTP-CHLNG"/>, the selected client port may have
   an influence on the measured offset and delay.</t>
        <t indent="0" pn="section-3.2-2">
   If the source port is changed with each request, packets in different
   exchanges will be more likely to take different paths, which could
   cause the measurements to be less stable and have a negative impact
   on the stability of the clock.</t>
        <t indent="0" pn="section-3.2-3">

   Network paths to/from a given server are less likely to change between
   requests if port randomization is applied on a per-association basis. This 
   approach minimizes the impact on the stability of NTP measurements, 
   but it may cause different clients in the same network synchronized to the 
   same NTP server to have a significant stable offset between their clocks. 
   This is due to their NTP exchanges consistently taking different paths with 
   different asymmetry in the network delay.</t>
        <t indent="0" pn="section-3.2-4">
   <xref target="sect-4" format="default" sectionFormat="of" derivedContent="Section 4"/> recommends that NTP implementations randomize the ephemeral
   port number of client/server associations.  The choice of whether to
   randomize the port number on a per-association or a per-request basis
   is left to the implementation.</t>
      </section>
      <section anchor="sect-3.3" numbered="true" toc="include" removeInRFC="false" pn="section-3.3">
        <name slugifiedName="name-filtering-of-ntp-traffic">Filtering of NTP Traffic</name>
        <t indent="0" pn="section-3.3-1">
   In a number of scenarios (such as when mitigating DDoS attacks), a
   network operator may want to differentiate between NTP requests sent
   by clients and NTP responses sent by NTP servers.  If an
   implementation employs the NTP well-known port for the client port, requests/responses cannot be readily differentiated by
   inspecting the source and destination port numbers.  


   Implementation of port randomization for nonsymmetrical modes allows for   
   simple differentiation of NTP requests and responses and for the
   enforcement of security policies that may be valuable for the mitigation of 
   DDoS attacks, when all NTP clients in a given network employ port randomization.</t>
      </section>
      <section anchor="sect-3.4" numbered="true" toc="include" removeInRFC="false" pn="section-3.4">
        <name slugifiedName="name-effect-on-napt-devices">Effect on NAPT Devices</name>
        <t indent="0" pn="section-3.4-1">
   Some NAPT devices will reportedly not translate the source port of a
   packet when a system port number (i.e., a port number in the range
   0-1023) <xref target="RFC6335" format="default" sectionFormat="of" derivedContent="RFC6335"/> is employed.  In networks where such NAPT devices
   are employed, use of the NTP well-known port for the client port may
   limit the number of hosts that may successfully employ NTP client
	implementations at any given time.</t>
        <aside pn="section-3.4-2">
          <t indent="0" pn="section-3.4-2.1">NOTES:</t>
          <t indent="3" pn="section-3.4-2.2">NAPT devices are defined in <xref target="RFC2663" sectionFormat="of" section="4.1.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc2663#section-4.1.2" derivedContent="RFC2663"/>.</t>
          <t indent="3" pn="section-3.4-2.3">The reported behavior is similar to the special treatment of UDP
      port 500, which has been documented in <xref target="RFC3715" sectionFormat="of" section="2.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc3715#section-2.3" derivedContent="RFC3715"/>.</t>
        </aside>
        <t indent="0" pn="section-3.4-3">
   In the case of NAPT devices that will translate the source port even
   when a system port is employed, packets reaching the external realm
   of the NAPT will not employ the NTP well-known port as the source
   port, as a result of the port translation function being performed by the
   NAPT device.</t>
      </section>
    </section>
    <section anchor="sect-4" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-update-to-rfc-5905">Update to RFC 5905</name>
      <t indent="0" pn="section-4-1">
   The following text from Section                                       
      <xref target="RFC5905" section="9.1" sectionFormat="bare" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5905#section-9.1" derivedContent="RFC5905">Peer     
Process Variables</xref> of <xref target="RFC5905" format="default" sectionFormat="of" derivedContent="RFC5905"/>:</t>
      <blockquote pn="section-4-2">
        <dl newline="false" spacing="normal" indent="3" pn="section-4-2.1">
          <dt pn="section-4-2.1.1">dstport:</dt>
          <dd pn="section-4-2.1.2"> UDP port number of the client, ordinarily the NTP port
      number PORT (123) assigned by the IANA.  This becomes the source
      port number in packets sent from this association.</dd>
        </dl>
      </blockquote>
      <t indent="0" pn="section-4-3">is replaced with:</t>
      <blockquote pn="section-4-4">
        <dl newline="false" spacing="normal" indent="3" pn="section-4-4.1">
          <dt pn="section-4-4.1.1">dstport:</dt>
          <dd pn="section-4-4.1.2"> UDP port number of the client.  In the case of broadcast
      server mode (5) and symmetric modes (1 and 2), it <bcp14>SHOULD</bcp14> contain
      the NTP port number PORT (123) assigned by IANA.  In the
      client mode (3), it <bcp14>SHOULD</bcp14> contain a randomized port number, as
      specified in <xref target="RFC6056" format="default" sectionFormat="of" derivedContent="RFC6056"/>.  The value in this variable becomes the
      source port number of packets sent from this association.  The
      randomized port number <bcp14>SHOULD NOT</bcp14> be shared with other
      associations, to avoid revealing the randomized port to other
      associations.</dd>
          <dt pn="section-4-4.1.3"/>
          <dd pn="section-4-4.1.4">If a client implementation performs transport-protocol ephemeral port randomization
        on a per-request basis, it <bcp14>SHOULD</bcp14> close the corresponding socket/port
        after each request/response exchange.  In order to prevent duplicate
        or delayed server packets from eliciting ICMP port unreachable error
        messages <xref target="RFC0792" format="default" sectionFormat="of" derivedContent="RFC0792"/> <xref target="RFC4443" format="default" sectionFormat="of" derivedContent="RFC4443"/> at the client, the client <bcp14>MAY</bcp14> wait for more responses from
        the server for a specific period of time (e.g., 3 seconds) before
        closing the UDP socket/port.</dd>
          <dt pn="section-4-4.1.5"/>
          <dd pn="section-4-4.1.6"/>
        </dl>
        <dl newline="false" spacing="normal" indent="6" pn="section-4-4.2">
          <dt pn="section-4-4.2.1"/>
          <dd pn="section-4-4.2.2">
            <t indent="0" pn="section-4-4.2.2.1">NOTES:</t>
            <t indent="0" pn="section-4-4.2.2.2">Randomizing the ephemeral port number on a per-request basis
         will better mitigate blind/off-path attacks, particularly if
         the socket/port is closed after each request/response exchange,
         as recommended above.  The choice of whether to randomize the
         ephemeral port number on a per-request or a per-association
         basis is left to the implementation, and it should consider the
         possible effects on path selection along with its possible
         impact on time measurement.</t>
          </dd>
          <dt pn="section-4-4.2.3"/>
          <dd pn="section-4-4.2.4">On most current operating systems, which implement ephemeral
         port randomization <xref target="RFC6056" format="default" sectionFormat="of" derivedContent="RFC6056"/>, an NTP client may normally rely
         on the operating system to perform ephemeral port
         randomization.  For example, NTP implementations using POSIX
         sockets may achieve ephemeral port randomization by <em>not</em>
         binding the socket with the bind() function or binding it to
         port 0, which has a special meaning of "any port". Using the connect() function for the socket will make the port inaccessible 
   by other systems (that is, only packets from the specified remote socket will be
         received by the application).</dd>
        </dl>
      </blockquote>
    </section>
    <section anchor="sect-6" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-5-1">
This document has no IANA actions.</t>
    </section>
    <section anchor="sect-7" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-6-1">
   The security implications of predictable numeric identifiers
   <xref target="I-D.irtf-pearg-numeric-ids-generation" format="default" sectionFormat="of" derivedContent="PEARG-NUMERIC-IDS"/> (and of predictable
   transport-protocol port numbers <xref target="RFC6056" format="default" sectionFormat="of" derivedContent="RFC6056"/> in particular) have been
   known for a long time now.  However, the NTP specification has
   traditionally followed a pattern of employing common settings even
   when not strictly necessary, which at times has resulted in negative
   security and privacy implications (see, e.g.,
   <xref target="I-D.ietf-ntp-data-minimization" format="default" sectionFormat="of" derivedContent="NTP-DATA-MINIMIZATION"/>).  The use of the NTP well-known
   port (123) for the srcport and dstport variables is not required for
   all operating modes.  Such unnecessary usage comes at the expense of
   reducing the amount of work required for an attacker to successfully
   perform blind/off-path attacks against NTP.  Therefore, this document
   formally updates <xref target="RFC5905" format="default" sectionFormat="of" derivedContent="RFC5905"/>, recommending the use of transport-protocol port randomization when use of the NTP well-known port is
   not required.</t>
      <t indent="0" pn="section-6-2">
   This issue has been assigned CVE-2019-11331 <xref target="VULN-REPORT" format="default" sectionFormat="of" derivedContent="VULN-REPORT"/> in the U.S.
   National Vulnerability Database (NVD).</t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-ntp-data-minimization" to="NTP-DATA-MINIMIZATION"/>
    <displayreference target="I-D.irtf-pearg-numeric-ids-generation" to="PEARG-NUMERIC-IDS"/>
    <references pn="section-7">
      <name slugifiedName="name-references">References</name>
      <references pn="section-7.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5905" target="https://www.rfc-editor.org/info/rfc5905" quoteTitle="true" derivedAnchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author initials="D." surname="Mills" fullname="D. Mills">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Martin" fullname="J. Martin" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Burbank" fullname="J. Burbank">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Kasch" fullname="W. Kasch">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="June"/>
            <abstract>
              <t indent="0">The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet.  This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family.  NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs.  It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required.  It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC6056" target="https://www.rfc-editor.org/info/rfc6056" quoteTitle="true" derivedAnchor="RFC6056">
          <front>
            <title>Recommendations for Transport-Protocol Port Randomization</title>
            <author initials="M." surname="Larsen" fullname="M. Larsen">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="January"/>
            <abstract>
              <t indent="0">During the last few years, awareness has been raised about a number of "blind" attacks that can be performed against the Transmission Control Protocol (TCP) and similar protocols.  The consequences of these attacks range from throughput reduction to broken connections or data corruption.  These attacks rely on the attacker's ability to guess or know the five-tuple (Protocol, Source Address, Destination Address, Source Port, Destination Port) that identifies the transport protocol instance to be attacked.  This document describes a number of simple and efficient methods for the selection of the client port number, such that the possibility of an attacker guessing the exact value is reduced.  While this is not a replacement for cryptographic methods for protecting the transport-protocol instance, the aforementioned port selection algorithms provide improved security with very little effort and without any key management overhead.  The algorithms described in this document are local policies that may be incrementally deployed and that do not violate the specifications of any of the transport protocols that may benefit from them, such as TCP, UDP, UDP-lite, Stream Control Transmission Protocol (SCTP), Datagram Congestion Control Protocol (DCCP), and RTP (provided that the RTP application explicitly signals the RTP and RTCP port numbers).  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="156"/>
          <seriesInfo name="RFC" value="6056"/>
          <seriesInfo name="DOI" value="10.17487/RFC6056"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references pn="section-7.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="NIST-NTP" target="https://tf.nist.gov/general/pdf/2818.pdf" quoteTitle="true" derivedAnchor="NIST-NTP">
          <front>
            <title>Usage Analysis of the NIST Internet Time Service</title>
            <author initials="J." surname="Sherman" fullname="Jeffrey Sherman">
	</author>
            <author initials="J." surname="Levine" fullname="Judah Levine">
	</author>
            <date month="March" year="2016"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/jres.121.003"/>
          <refcontent>Journal of Research of the National Institute of Standards and Technology, Volume 121</refcontent>
        </reference>
        <reference anchor="NTP-CHLNG" target="http://leapsecond.com/ntp/NTP_Paper_Sommars_PTTI2017.pdf" quoteTitle="true" derivedAnchor="NTP-CHLNG">
          <front>
            <title>Challenges in Time Transfer using the Network Time Protocol (NTP)</title>
            <author initials="S." surname="Sommars" fullname="Steven Sommars">
	</author>
            <date month="January" year="2017"/>
          </front>
          <seriesInfo name="DOI" value="10.33012/2017.14978"/>
          <refcontent>Proceedings of the 48th Annual Precise Time and Time Interval Systems and Applications Meeting, pp. 271-290</refcontent>
        </reference>
        <reference anchor="I-D.ietf-ntp-data-minimization" quoteTitle="true" target="https://datatracker.ietf.org/doc/html/draft-ietf-ntp-data-minimization-04" derivedAnchor="NTP-DATA-MINIMIZATION">
          <front>
            <title>NTP Client Data Minimization</title>
            <author initials="D" surname="Franke" fullname="Daniel Franke">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A" surname="Malhotra" fullname="Aanchal Malhotra">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="March" day="25" year="2019"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ntp-data-minimization-04"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="NTP-FRAG" target="https://www.cs.bu.edu/~goldbe/papers/NTPattack.pdf" quoteTitle="true" derivedAnchor="NTP-FRAG">
          <front>
            <title>Attacking the Network Time Protocol</title>
            <author initials="A." surname="Malhotra" fullname="Aanchal Malhotra">
	</author>
            <author initials="I." surname="Cohen" fullname="Isaac Cohen">
	</author>
            <author initials="E." surname="Brakke" fullname="Erik Brakke">
	</author>
            <author initials="S." surname="Goldberg" fullname="Sharon Goldberg">
	</author>
            <date month="February" year="2016"/>
          </front>
          <seriesInfo name="DOI" value="10.14722/ndss.2016.23090"/>
          <refcontent>NDSS '16</refcontent>
        </reference>
        <reference anchor="NTP-security" target="https://eprint.iacr.org/2016/1006.pdf" quoteTitle="true" derivedAnchor="NTP-security">
          <front>
            <title>The Security of NTP's Datagram Protocol</title>
            <author initials="A." surname="Malhotra" fullname="Aanchal Malhotra">
	</author>
            <author initials="M." surname="Van Gundy" fullname="Matthew Van Gundy">
	</author>
            <author initials="M." surname="Varia" fullname="Mayank Varia">
	</author>
            <author initials="H." surname="Kennedy" fullname="Haydn Kennedy">
	</author>
            <author initials="J." surname="Gardner" fullname="Jonathan Gardner">
	</author>
            <author initials="S." surname="Goldberg" fullname="Sharon Goldberg">
	</author>
            <date year="2017" month="February"/>
          </front>
          <seriesInfo name="DOI" value="10.1007/978-3-319-70972-7_23"/>
          <refcontent>Cryptology ePrint Archive Report 2016/1006</refcontent>
        </reference>
        <reference anchor="NTP-VULN" target="http://support.ntp.org/bin/view/Main/SecurityNotice" quoteTitle="true" derivedAnchor="NTP-VULN">
          <front>
            <title>Network Time Foundation</title>
            <author>
	</author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.irtf-pearg-numeric-ids-generation" quoteTitle="true" target="https://datatracker.ietf.org/doc/html/draft-irtf-pearg-numeric-ids-generation-07" derivedAnchor="PEARG-NUMERIC-IDS">
          <front>
            <title>On the Generation of Transient Numeric Identifiers</title>
            <author fullname="Fernando Gont">
              <organization showOnFrontPage="true">SI6 Networks</organization>
            </author>
            <author fullname="Ivan Arce">
              <organization showOnFrontPage="true">Quarkslab</organization>
            </author>
            <date month="February" day="2" year="2021"/>
            <abstract>
              <t indent="0">   This document performs an analysis of the security and privacy
   implications of different types of "transient numeric identifiers"
   used in IETF protocols, and tries to categorize them based on their
   interoperability requirements and their associated failure severity
   when such requirements are not met.  Subsequently, it provides advice
   on possible algorithms that could be employed to satisfy the
   interoperability requirements of each identifier category, while
   minimizing the negative security and privacy implications, thus
   providing guidance to protocol designers and protocol implementers.
   Finally, it describes a number of algorithms that have been employed
   in real implementations to generate transient numeric identifiers,
   and analyzes their security and privacy properties.  This document is
   a product of the Privacy Enhancement and Assessment Research Group
   (PEARG) in the IRTF.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-pearg-numeric-ids-generation-07"/>
          <format type="TXT" target="https://www.ietf.org/archive/id/draft-irtf-pearg-numeric-ids-generation-07.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="RFC0792" target="https://www.rfc-editor.org/info/rfc792" quoteTitle="true" derivedAnchor="RFC0792">
          <front>
            <title>Internet Control Message Protocol</title>
            <author initials="J." surname="Postel" fullname="J. Postel">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1981" month="September"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="792"/>
          <seriesInfo name="DOI" value="10.17487/RFC0792"/>
        </reference>
        <reference anchor="RFC2663" target="https://www.rfc-editor.org/info/rfc2663" quoteTitle="true" derivedAnchor="RFC2663">
          <front>
            <title>IP Network Address Translator (NAT) Terminology and Considerations</title>
            <author initials="P." surname="Srisuresh" fullname="P. Srisuresh">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Holdrege" fullname="M. Holdrege">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1999" month="August"/>
            <abstract>
              <t indent="0">This document attempts to describe the operation of NAT devices and the associated considerations in general, and to define the terminology used to identify various flavors of NAT.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2663"/>
          <seriesInfo name="DOI" value="10.17487/RFC2663"/>
        </reference>
        <reference anchor="RFC3715" target="https://www.rfc-editor.org/info/rfc3715" quoteTitle="true" derivedAnchor="RFC3715">
          <front>
            <title>IPsec-Network Address Translation (NAT) Compatibility Requirements</title>
            <author initials="B." surname="Aboba" fullname="B. Aboba">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Dixon" fullname="W. Dixon">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2004" month="March"/>
            <abstract>
              <t indent="0">This document describes known incompatibilities between Network Address Translation (NAT) and IPsec, and describes the requirements for addressing them.  Perhaps the most common use of IPsec is in providing virtual private networking capabilities.  One very popular use of Virtual Private Networks (VPNs) is to provide telecommuter access to the corporate Intranet.  Today, NATs are widely deployed in home gateways, as well as in other locations likely to be used by telecommuters, such as hotels.  The result is that IPsec-NAT incompatibilities have become a major barrier in the deployment of IPsec in one of its principal uses.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3715"/>
          <seriesInfo name="DOI" value="10.17487/RFC3715"/>
        </reference>
        <reference anchor="RFC4443" target="https://www.rfc-editor.org/info/rfc4443" quoteTitle="true" derivedAnchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author initials="A." surname="Conta" fullname="A. Conta">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Deering" fullname="S. Deering">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Gupta" fullname="M. Gupta" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="March"/>
            <abstract>
              <t indent="0">This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol).  ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC4953" target="https://www.rfc-editor.org/info/rfc4953" quoteTitle="true" derivedAnchor="RFC4953">
          <front>
            <title>Defending TCP Against Spoofing Attacks</title>
            <author initials="J." surname="Touch" fullname="J. Touch">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="July"/>
            <abstract>
              <t indent="0">Recent analysis of potential attacks on core Internet infrastructure indicates an increased vulnerability of TCP connections to spurious resets (RSTs), sent with forged IP source addresses (spoofing).  TCP has always been susceptible to such RST spoofing attacks, which were indirectly protected by checking that the RST sequence number was inside the current receive window, as well as via the obfuscation of TCP endpoint and port numbers.  For pairs of well-known endpoints often over predictable port pairs, such as BGP or between web servers and well-known large-scale caches, increases in the path bandwidth-delay product of a connection have sufficiently increased the receive window space that off-path third parties can brute-force generate a viable RST sequence number.  The susceptibility to attack increases with the square of the bandwidth, and thus presents a significant vulnerability for recent high-speed networks.  This document addresses this vulnerability, discussing proposed solutions at the transport level and their inherent challenges, as well as existing network level solutions and the feasibility of their deployment.  This document focuses on vulnerabilities due to spoofed TCP segments, and includes a discussion of related ICMP spoofing attacks on TCP connections.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4953"/>
          <seriesInfo name="DOI" value="10.17487/RFC4953"/>
        </reference>
        <reference anchor="RFC5927" target="https://www.rfc-editor.org/info/rfc5927" quoteTitle="true" derivedAnchor="RFC5927">
          <front>
            <title>ICMP Attacks against TCP</title>
            <author initials="F." surname="Gont" fullname="F. Gont">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="July"/>
            <abstract>
              <t indent="0">This document discusses the use of the Internet Control Message Protocol (ICMP) to perform a variety of attacks against the Transmission Control Protocol (TCP).  Additionally, this document describes a number of widely implemented modifications to TCP's handling of ICMP error messages that help to mitigate these issues.  This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5927"/>
          <seriesInfo name="DOI" value="10.17487/RFC5927"/>
        </reference>
        <reference anchor="RFC6335" target="https://www.rfc-editor.org/info/rfc6335" quoteTitle="true" derivedAnchor="RFC6335">
          <front>
            <title>Internet Assigned Numbers Authority (IANA) Procedures for the Management of the Service Name and Transport Protocol Port Number Registry</title>
            <author initials="M." surname="Cotton" fullname="M. Cotton">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Eggert" fullname="L. Eggert">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Touch" fullname="J. Touch">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Westerlund" fullname="M. Westerlund">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Cheshire" fullname="S. Cheshire">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="August"/>
            <abstract>
              <t indent="0">This document defines the procedures that the Internet Assigned Numbers Authority (IANA) uses when handling assignment and other requests related to the Service Name and Transport Protocol Port Number registry.  It also discusses the rationale and principles behind these procedures and how they facilitate the long-term sustainability of the registry.</t>
              <t indent="0">This document updates IANA's procedures by obsoleting the previous UDP and TCP port assignment procedures defined in Sections 8 and 9.1 of the IANA Allocation Guidelines, and it updates the IANA service name and port assignment procedures for UDP-Lite, the Datagram Congestion Control Protocol (DCCP), and the Stream Control Transmission Protocol (SCTP).  It also updates the DNS SRV specification to clarify what a service name is and how it is registered.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="165"/>
          <seriesInfo name="RFC" value="6335"/>
          <seriesInfo name="DOI" value="10.17487/RFC6335"/>
        </reference>
        <reference anchor="VULN-REPORT" target="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11331" quoteTitle="true" derivedAnchor="VULN-REPORT">
          <front>
            <title>CVE-2019-1133</title>
            <author>
              <organization showOnFrontPage="true">The MITRE Corporation</organization>
            </author>
            <date month="August" year="2020"/>
          </front>
          <refcontent>National Vulnerability Database</refcontent>
        </reference>
      </references>
    </references>
    <section anchor="sect-8" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgments">Acknowledgments</name>
      <t indent="0" pn="section-appendix.a-1">
   The authors would like to thank (in alphabetical order) <contact fullname="Ivan Arce"/>,
   <contact fullname="Roman Danyliw"/>, <contact fullname="Dhruv Dhody"/>, <contact fullname="Lars Eggert"/>, <contact fullname="Todd Glassey"/>, <contact fullname="Blake Hudson"/>,
   <contact fullname="Benjamin Kaduk"/>, <contact fullname="Erik Kline"/>, <contact fullname="Watson Ladd"/>, <contact fullname="Aanchal Malhotra"/>, <contact fullname="Danny    Mayer"/>, <contact fullname="Gary E. Miller"/>, <contact fullname="Bjorn Mork"/>, <contact fullname="Hal Murray"/>, <contact fullname="Francesca Palombini"/>,
   <contact fullname="Tomoyuki Sahara"/>, <contact fullname="Zaheduzzaman Sarker"/>, <contact fullname="Dieter Sibold"/>, <contact fullname="Steven Sommars"/>,
   <contact fullname="Jean St-Laurent"/>, <contact fullname="Kristof Teichel"/>, <contact fullname="Brian Trammell"/>, <contact fullname="Éric Vyncke"/>, <contact fullname="Ulrich    Windl"/>, and <contact fullname="Dan Wing"/> for providing valuable comments on earlier draft versions of this document.</t>
      <t indent="0" pn="section-appendix.a-2">
   <contact fullname="Watson Ladd"/> raised the problem of DDoS mitigation when the NTP well-known
   port is employed as the client port (discussed in <xref target="sect-3.3" format="default" sectionFormat="of" derivedContent="Section 3.3"/> of this document).</t>
      <t indent="0" pn="section-appendix.a-3">
   The authors would like to thank <contact fullname="Harlan Stenn"/> for answering questions
   about a popular NTP implementation (see <eref target="https://www.nwtime.org" brackets="angle"/>).</t>
      <t indent="0" pn="section-appendix.a-4">
   <contact fullname="Fernando Gont"/> would like to thank <contact fullname="Nelida Garcia"/> and <contact fullname="Jorge Oscar Gont"/> for
   their love and support.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="F." surname="Gont" fullname="Fernando Gont">
        <organization showOnFrontPage="true">SI6 Networks</organization>
        <address>
          <postal>
            <street>Evaristo Carriego 2644</street>
            <city>Haedo, Provincia de Buenos Aires</city>
            <code>1706</code>
            <country>Argentina</country>
          </postal>
          <phone>+54 11 4650 8472</phone>
          <email>fgont@si6networks.com</email>
          <uri>https://www.si6networks.com</uri>
        </address>
      </author>
      <author initials="G." surname="Gont" fullname="Guillermo Gont">
        <organization showOnFrontPage="true">SI6 Networks</organization>
        <address>
          <postal>
            <street>Evaristo Carriego 2644</street>
            <city>Haedo, Provincia de Buenos Aires</city>
            <code>1706</code>
            <country>Argentina</country>
          </postal>
          <phone>+54 11 4650 8472</phone>
          <email>ggont@si6networks.com</email>
          <uri>https://www.si6networks.com</uri>
        </address>
      </author>
      <author initials="M." surname="Lichvar" fullname="Miroslav Lichvar">
        <organization showOnFrontPage="true">Red Hat</organization>
        <address>
          <postal>
            <street>Purkynova 115</street>
            <city>Brno</city>
            <code>612 00</code>
            <country>Czech Republic</country>
          </postal>
          <email>mlichvar@redhat.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
