summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc8039.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc8039.txt')
-rw-r--r--doc/rfc/rfc8039.txt955
1 files changed, 955 insertions, 0 deletions
diff --git a/doc/rfc/rfc8039.txt b/doc/rfc/rfc8039.txt
new file mode 100644
index 0000000..537361e
--- /dev/null
+++ b/doc/rfc/rfc8039.txt
@@ -0,0 +1,955 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) A. Shpiner
+Request for Comments: 8039 Mellanox
+Category: Experimental R. Tse
+ISSN: 2070-1721 Microsemi
+ C. Schelp
+ Oracle
+ T. Mizrahi
+ Marvell
+ December 2016
+
+
+ Multipath Time Synchronization
+
+Abstract
+
+ Clock synchronization protocols are very widely used in IP-based
+ networks. The Network Time Protocol (NTP) has been commonly deployed
+ for many years, and the last few years have seen an increasingly
+ rapid deployment of the Precision Time Protocol (PTP). As time-
+ sensitive applications evolve, clock accuracy requirements are
+ becoming increasingly stringent, requiring the time synchronization
+ protocols to provide high accuracy. This memo describes a multipath
+ approach to PTP and NTP over IP networks, allowing the protocols to
+ run concurrently over multiple communication paths between the master
+ and slave clocks, without modifying these protocols. The multipath
+ approach can significantly contribute to clock accuracy, security,
+ and fault tolerance. The multipath approach that is presented in
+ this document enables backward compatibility with nodes that do not
+ support the multipath functionality.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for examination, experimental implementation, and
+ evaluation.
+
+ This document defines an Experimental Protocol for the Internet
+ community. This document is a product of the Internet Engineering
+ Task Force (IETF). It represents the consensus of the IETF
+ community. It has received public review and has been approved for
+ publication by the Internet Engineering Steering Group (IESG). Not
+ all documents approved by the IESG are a candidate for any level of
+ Internet Standard; see Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc8039.
+
+
+
+
+Shpiner, et al. Experimental [Page 1]
+
+RFC 8039 Multipath Time Synchronization December 2016
+
+
+Copyright Notice
+
+ Copyright (c) 2016 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction ....................................................3
+ 2. Conventions Used in This Document ...............................4
+ 2.1. Abbreviations ..............................................4
+ 2.2. Terminology ................................................4
+ 3. Multiple Paths in IP Networks ...................................5
+ 3.1. Load Balancing .............................................5
+ 3.2. Using Multiple Paths Concurrently ..........................5
+ 3.3. Two-Way Paths ..............................................5
+ 4. Solution Overview ...............................................6
+ 4.1. Path Configuration and Identification ......................6
+ 4.2. Combining ..................................................6
+ 5. Multipath Time Synchronization over IP Networks .................7
+ 5.1. Overview ...................................................7
+ 5.2. Single-Ended Multipath Synchronization .....................8
+ 5.2.1. Single-Ended MPPTP Synchronization Message
+ Exchange ............................................8
+ 5.2.2. Single-Ended MPNTP Synchronization Message
+ Exchange ............................................9
+ 5.3. Dual-Ended Multipath Synchronization ......................10
+ 5.3.1. Dual-Ended MPPTP Synchronization Message Exchange ..10
+ 5.3.2. Dual-Ended MPNTP Synchronization Message Exchange ..11
+ 5.4. Using Traceroute for Path Discovery .......................12
+ 5.5. Using Unicast Discovery for MPPTP .........................13
+ 6. Combining Algorithm ............................................13
+ 7. Security Considerations ........................................14
+ 8. Scope of the Experiment ........................................14
+ 9. References .....................................................15
+ 9.1. Normative References ......................................15
+ 9.2. Informative References ....................................15
+ Acknowledgments ...................................................17
+ Authors' Addresses ................................................17
+
+
+
+Shpiner, et al. Experimental [Page 2]
+
+RFC 8039 Multipath Time Synchronization December 2016
+
+
+1. Introduction
+
+ The two most common time synchronization protocols in IP networks are
+ (1) the Network Time Protocol [NTP] and (2) the Precision Time
+ Protocol (PTP) as defined in the IEEE 1588 standard [IEEE1588].
+
+ The accuracy of the time synchronization protocols directly depends
+ on the stability and the symmetry of propagation delays in both
+ directions between the master and slave clocks. Depending on the
+ nature of the underlying network, time synchronization protocol
+ packets can be subject to variable network latency or path asymmetry
+ (e.g., [ASYMMETRY] [ASYMMETRY2]). As time-sensitive applications
+ evolve, accuracy requirements are becoming increasingly stringent.
+ Using a single network path in a clock synchronization protocol
+ closely ties the slave clock accuracy to the behavior of the specific
+ path, which may suffer from temporal congestion, faults, or malicious
+ attacks. Relying on multiple clock servers, as in NTP, solves these
+ problems but requires active maintenance of multiple accurate sources
+ in the network, which is not always possible. The usage of
+ Transparent Clocks (TCs) in PTP solves the congestion problem by
+ eliminating the queuing time from the delay calculations but does not
+ address security or fault-tolerance aspects.
+
+ ____
+ ______/ \_____
+ ___/ \____
+ ____/ \
+ ____ / path 1 / ___
+ / \ / ________________________ \ / \
+ /Master\____\___/ \____\________/Slave\
+ \Clock / / \________ _______________/ \ \Clock/
+ \____/ \ / \__ /
+ \____ path 2 __/
+ \_______ ______/
+ \_________/
+
+ Figure 1: Multipath Connection
+
+ Since master and slave clocks are often connected through more than
+ one path in the network, as shown in Figure 1, [SLAVEDIV] suggested
+ that a time synchronization protocol can be run over multiple paths,
+ providing several advantages. First, it can significantly increase
+ the clock accuracy as shown in [SLAVEDIV]. Second, this approach
+ provides additional security, allowing the mitigation of
+ man-in-the-middle attacks against the time synchronization protocol
+ [DELAY-ATT]. Third, using multiple paths concurrently provides an
+ inherent failure protection mechanism.
+
+
+
+
+Shpiner, et al. Experimental [Page 3]
+
+RFC 8039 Multipath Time Synchronization December 2016
+
+
+ This document introduces Multipath PTP (MPPTP) and Multipath NTP
+ (MPNTP). The functionality of the multipath approach is defined at
+ the network layer and does not require any changes in PTP or NTP.
+
+ MPPTP and MPNTP are defined over IP networks. As IP networks
+ typically combine ECMP routing, this property is leveraged for the
+ multiple paths used in MPPTP and MPNTP. The key property of the
+ multipath approach is that clocks in the network can use more than
+ one IP address. Each {master IP, slave IP} address pair defines a
+ path. Depending on the network topology and configuration, the IP
+ combination pairs can form multiple diverse paths used by the
+ multipath synchronization protocols. It has been shown [MULTI] that
+ using multiple IP addresses over the wide Internet indeed allows two
+ endpoints to attain multiple diverse paths.
+
+ This document introduces two variants of the multipath approach:
+ (1) a variant that requires both master and slave nodes to support
+ the multipath functionality, referred to as the dual-ended variant,
+ and (2) a backward-compatible variant that allows a multipath clock
+ to connect to a conventional single-path clock, referred to as the
+ single-ended variant.
+
+2. Conventions Used in This Document
+
+2.1. Abbreviations
+
+ BMC Best Master Clock [IEEE1588]
+
+ ECMP Equal-Cost Multipath
+
+ LAN Local Area Network
+
+ MPNTP Multipath Network Time Protocol
+
+ MPPTP Multipath Precision Time Protocol
+
+ NTP Network Time Protocol [NTP]
+
+ PTP Precision Time Protocol [IEEE1588]
+
+2.2. Terminology
+
+ In the NTP terminology, a time synchronization protocol is run
+ between a client and a server, while PTP uses the terms 'master' and
+ 'slave'. Throughout this document, the sections that refer to both
+ PTP and NTP generically use the terms 'master' and 'slave'.
+
+
+
+
+
+Shpiner, et al. Experimental [Page 4]
+
+RFC 8039 Multipath Time Synchronization December 2016
+
+
+3. Multiple Paths in IP Networks
+
+3.1. Load Balancing
+
+ Traffic sent across IP networks is often load-balanced across
+ multiple paths. The load-balancing decisions are typically based on
+ packet header fields: source and destination addresses, Layer 4
+ ports, the Flow Label field in IPv6, etc.
+
+ Three common load-balancing criteria are per-destination, per-flow,
+ and per-packet. The per-destination load balancers take a
+ load-balancing decision based on the destination IP address.
+ Per-flow load balancers use various fields in the packet header,
+ e.g., IP addresses and Layer 4 ports, for the load-balancing
+ decision. Per-packet load balancers use flow-blind techniques such
+ as round-robin without basing the choice on the packet content.
+
+3.2. Using Multiple Paths Concurrently
+
+ To utilize the diverse paths that traverse per-destination
+ load balancers or per-flow load balancers, the packet transmitter can
+ vary the IP addresses in the packet header. The analysis in [PARIS2]
+ shows that a significant majority of the flows on the Internet
+ traverse per-destination or per-flow load balancing. It presents
+ statistics that 72% of the flows traverse per-destination
+ load balancing and 39% of the flows traverse per-flow load balancing,
+ while only a negligible part of the flows traverse per-packet
+ load balancing. These statistics show that the vast majority of the
+ traffic on the Internet is load-balanced based on packet header
+ fields.
+
+ The approaches in this document are based on varying the source and
+ destination IP addresses in the packet header. Possible extensions
+ have been considered that also vary the UDP ports. However, some of
+ the existing implementations of PTP and NTP use fixed UDP port values
+ in both the source and destination UDP port fields and thus do not
+ allow this approach.
+
+3.3. Two-Way Paths
+
+ A key property of IP networks is that packets forwarded from A to B
+ do not necessarily traverse the same path as packets from B to A.
+ Thus, we define a two-way path for a master-slave connection as a
+ pair of one-way paths: the first from master to slave and the second
+ from slave to master.
+
+
+
+
+
+
+Shpiner, et al. Experimental [Page 5]
+
+RFC 8039 Multipath Time Synchronization December 2016
+
+
+ If possible, a traffic engineering approach can be used to verify
+ that time synchronization traffic is always forwarded through
+ bidirectional two-way paths, i.e., that each two-way path uses the
+ same route in the forward and reverse directions, thus allowing
+ propagation time symmetry. However, in the general case, two-way
+ paths do not necessarily use the same path for the forward and
+ reverse directions.
+
+4. Solution Overview
+
+ The multipath time synchronization protocols we present here are
+ comprised of two building blocks: one is the path configuration and
+ identification, and the other is the algorithm used by the slave to
+ combine the information received from the various paths.
+
+4.1. Path Configuration and Identification
+
+ The master and slave clocks must be able to determine the path of
+ transmitted protocol packets and to identify the path of incoming
+ protocol packets. A path is determined by a {master IP, slave IP}
+ address pair. The synchronization protocol message exchange is run
+ independently through each path.
+
+ Each IP address pair defines a two-way path and thus allows the
+ clocks to bind a transmitted packet to a specific path or to identify
+ the path of an incoming packet.
+
+ If possible, the routing tables across the network should be
+ configured with multiple traffic-engineered paths between the pair of
+ clocks. By carefully configuring the routers in such networks, it is
+ possible to create diverse paths for each of the IP address pairs
+ between two clocks in the network. However, in public and provider
+ networks, the load-balancing behavior is hidden from the end users.
+ In this case, the actual number of paths may be less than the number
+ of IP address pairs, since some of the address pairs may share common
+ paths.
+
+4.2. Combining
+
+ Various methods can be used for combining the time information
+ received from the different paths. The output of the combining
+ algorithm is the accurate time offset. Combining methods are further
+ discussed in Section 6.
+
+
+
+
+
+
+
+
+Shpiner, et al. Experimental [Page 6]
+
+RFC 8039 Multipath Time Synchronization December 2016
+
+
+5. Multipath Time Synchronization over IP Networks
+
+5.1. Overview
+
+ This section presents two variants of MPPTP and MPNTP: single-ended
+ multipath time synchronization and dual-ended multipath time
+ synchronization. In the first variant, the multipath approach is
+ only implemented by the slave, and the master is not aware of its
+ usage. In the second variant, all clocks use multiple paths.
+
+ The dual-ended variant provides higher path diversity by using
+ multiple IP addresses at both ends, the master and slave, while the
+ single-ended variant only uses multiple addresses at the slave.
+ Consequently, the single-ended approach can interoperate with
+ existing implementations that do not use multiple paths. The
+ dual-ended and single-ended approaches can coexist in the same
+ network; each slave selects the connection(s) it wants to make with
+ the available masters. A dual-ended slave could switch to
+ single-ended mode if it does not see any dual-ended masters
+ available. A single-ended slave could connect to a single IP address
+ of a dual-ended master.
+
+ Multipath time synchronization, in both variants, requires clocks to
+ use multiple IP addresses. Using multiple IP addresses introduces a
+ trade-off. A large number of IP addresses allows a large number of
+ diverse paths, providing the advantages of slave diversity discussed
+ in Section 1. On the other hand, a large number of IP addresses is
+ more costly, requires the network topology to be more redundant, and
+ exacts extra management overhead.
+
+ If possible, the set of IP addresses for each clock should be chosen
+ in a way that enables the establishment of paths that are the most
+ different. If the load-balancing rules in the network are known, it
+ is possible to choose the IP addresses in a way that enforces path
+ diversity. However, even if the load-balancing scheme is not known,
+ a careful choice of the IP addresses can increase the probability of
+ path diversity. For example, choosing multiple addresses with
+ different prefixes is likely to produce higher path diversity, as BGP
+ routers are more likely to route these different prefixes through
+ different routes.
+
+ The use of Network Address Translation (NAT) may significantly reduce
+ the effectiveness of multipath synchronization in some cases. For
+ example, if a master uses multiple IP addresses that are translated
+ to a single IP address, the path diversity can be dramatically
+ reduced compared to a network that does not use NAT. Thus, path
+
+
+
+
+
+Shpiner, et al. Experimental [Page 7]
+
+RFC 8039 Multipath Time Synchronization December 2016
+
+
+ discovery should be used to identify the possible paths between the
+ master and slave. Path discovery is further discussed in
+ Section 5.4.
+
+ The concept of using multiple IP addresses or multiple interfaces is
+ well established and is being used today by various applications and
+ protocols, e.g., [MPTCP]. Using multiple interfaces introduces some
+ challenges and issues, which were presented and discussed in [MIF].
+
+ The descriptions in this section refer to the end-to-end scheme of
+ PTP but are similarly applicable to the peer-to-peer scheme. MPNTP,
+ as described in this document, refers to the NTP client-server mode,
+ although the concepts described here can be extended to include the
+ symmetric variant as well.
+
+ Multipath synchronization by nature requires protocol messages to be
+ sent as unicast. Specifically in PTP, the following messages must be
+ sent as unicast in MPPTP: Sync, Delay_Req, Delay_Resp, PDelay_Req,
+ PDelay_Resp, Follow_Up, and PDelay_Resp_Follow_Up. Note that
+ [IEEE1588] allows these messages to be sent either as multicast or as
+ unicast.
+
+5.2. Single-Ended Multipath Synchronization
+
+ In the single-ended approach, only the slave is aware of the fact
+ that multiple paths are used, while the master is agnostic to the
+ usage of multiple paths. This approach allows a hybrid network,
+ where some of the clocks are multipath clocks and others are
+ conventional one-path clocks. A single-ended multipath clock
+ presents itself to the network as N independent clocks, using N IP
+ addresses, as well as N clockIdentity [IEEE1588] values (in PTP).
+ Thus, the usage of multiple slave identities by a slave clock is
+ transparent from the master's point of view, such that it treats each
+ of the identities as a separate slave clock.
+
+5.2.1. Single-Ended MPPTP Synchronization Message Exchange
+
+ The single-ended MPPTP message exchange procedure is as follows.
+
+ o Each single-ended MPPTP clock has a fixed set of N IP addresses
+ and N corresponding clockIdentities. Each clock arbitrarily
+ defines one of its IP addresses and clockIdentity values as the
+ clock primary identity.
+
+ o A single-ended MPPTP port sends Announce messages only from its
+ primary identity, according to the BMC algorithm.
+
+
+
+
+
+Shpiner, et al. Experimental [Page 8]
+
+RFC 8039 Multipath Time Synchronization December 2016
+
+
+ o The BMC algorithm at each clock determines the master, based on
+ the received Announce messages.
+
+ o A single-ended MPPTP port that is in the 'slave' state uses
+ unicast negotiation to request the master to transmit unicast
+ messages to each of the N slave clockIdentity values. The slave
+ port periodically sends N Signaling messages to the master, using
+ each of its N identities. The Signaling message includes the
+ REQUEST_UNICAST_TRANSMISSION TLV [IEEE1588].
+
+ o The master periodically sends unicast Sync messages from its
+ primary identity, identified by the sourcePortIdentity [IEEE1588]
+ and IP address, to each of the slave identities.
+
+ o The slave, upon receiving a Sync message, identifies its path
+ according to the destination IP address. The slave sends a
+ Delay_Req unicast message to the primary identity of the master.
+ The Delay_Req is sent using the slave identity corresponding to
+ the path through which the Sync was received. Note that the rate
+ of Delay_Req messages may be lower than the Sync message rate, and
+ thus a Sync message is not necessarily followed by a Delay_Req.
+
+ o The master, in response to a Delay_Req message from the slave,
+ responds with a Delay_Resp message using the IP address and
+ sourcePortIdentity from the Delay_Req message.
+
+ o Upon receiving the Delay_Resp message, the slave identifies the
+ path using the destination IP address and the
+ requestingPortIdentity [IEEE1588]. The slave can then compute the
+ corresponding path delay and the offset from the master.
+
+ o The slave combines the information from all negotiated paths.
+
+5.2.2. Single-Ended MPNTP Synchronization Message Exchange
+
+ The single-ended MPNTP message exchange procedure is as follows.
+
+ o A single-ended MPNTP client has N separate identities, i.e., N IP
+ addresses. The assumption is that the server information,
+ including its IP address, is known to the NTP clients. This is a
+ fair assumption, as typically the address(es) of the NTP server(s)
+ is provided to the NTP client by configuration.
+
+ o A single-ended MPNTP client initiates NTP with an NTP server
+ N times, using each of its N identities.
+
+ o NTP is maintained between the server and each of the N client
+ identities.
+
+
+
+Shpiner, et al. Experimental [Page 9]
+
+RFC 8039 Multipath Time Synchronization December 2016
+
+
+ o The client sends NTP messages to the master using each of its
+ N identities.
+
+ o The server responds to the client's NTP messages using the IP
+ address from the received NTP packet.
+
+ o The client, upon receiving an NTP packet, uses the IP destination
+ address to identify the path through which it came, and it uses
+ the time information accordingly.
+
+ o The client combines the information from all paths.
+
+5.3. Dual-Ended Multipath Synchronization
+
+ In dual-ended multipath synchronization, each clock has N IP
+ addresses. Time synchronization messages are exchanged between some
+ of the combinations of {master IP, slave IP} addresses, allowing
+ multiple paths between the master and slave. Note that the actual
+ number of paths between the master and slave may be less than the
+ number of chosen {master IP, slave IP} address pairs.
+
+ Once the multiple two-way connections are established, a separate
+ synchronization protocol exchange instance is run through each
+ of them.
+
+5.3.1. Dual-Ended MPPTP Synchronization Message Exchange
+
+ The dual-ended MPPTP message exchange procedure is as follows.
+
+ o Every clock has N IP addresses but uses a single clockIdentity.
+
+ o The BMC algorithm at each clock determines the master. The master
+ is identified by its clockIdentity, allowing other clocks to know
+ the multiple IP addresses it uses.
+
+ o When a clock sends an Announce message, it sends it from each of
+ its IP addresses with its clockIdentity.
+
+ o A dual-ended MPPTP port that is in the 'slave' state uses unicast
+ negotiation to request the master to transmit unicast messages to
+ some or all of its N_s IP addresses. This negotiation is done
+ individually between a slave IP address and the corresponding
+ master IP address with which the slave desires a connection. The
+ slave port periodically sends Signaling messages to the master,
+ using some or all of its N_s IP addresses as the source, to the
+ corresponding master's N_m IP addresses. The Signaling message
+ includes the REQUEST_UNICAST_TRANSMISSION TLV [IEEE1588].
+
+
+
+
+Shpiner, et al. Experimental [Page 10]
+
+RFC 8039 Multipath Time Synchronization December 2016
+
+
+ ('N_s' and 'N_m' indicate the number of IP addresses of the slave
+ and master, respectively.)
+
+ o The master periodically sends unicast Sync messages from each of
+ its IP addresses to the corresponding slave IP addresses for which
+ a unicast connection was negotiated.
+
+ o The slave, upon receiving a Sync message, identifies its path
+ according to the {source IP, destination IP} addresses. The slave
+ sends a Delay_Req unicast message, swapping the source and
+ destination IP addresses from the Sync message. Note that the
+ rate of Delay_Req messages may be lower than the Sync message
+ rate, and thus a Sync message is not necessarily followed by a
+ Delay_Req.
+
+ o The master, in response to a Delay_Req message from the slave,
+ responds with a Delay_Resp message using the sourcePortIdentity
+ from the Delay_Req message and swapping the IP addresses from the
+ Delay_Req.
+
+ o Upon receiving the Delay_Resp message, the slave identifies the
+ path using the {source IP, destination IP} address pair. The
+ slave can then compute the corresponding path delay and the offset
+ from the master.
+
+ o The slave combines the information from all negotiated paths.
+
+5.3.2. Dual-Ended MPNTP Synchronization Message Exchange
+
+ The MPNTP message exchange procedure is as follows.
+
+ o Each NTP clock has a set of N IP addresses. The assumption is
+ that the server information, including its multiple IP addresses,
+ is known to the NTP clients.
+
+ o The MPNTP client chooses N_svr server IP addresses and N_c client
+ IP addresses and initiates the N_svr*N_c instances of the
+ protocol, one for each {server IP, client IP} address pair,
+ allowing the client to combine the information from the N_s*N_c
+ paths.
+
+ ('N_svr' and 'N_c' indicate the number of IP addresses of the
+ server and client, respectively, with which a client chooses to
+ connect.)
+
+ o The client sends NTP messages to the master using each of the
+ source-destination address combinations.
+
+
+
+
+Shpiner, et al. Experimental [Page 11]
+
+RFC 8039 Multipath Time Synchronization December 2016
+
+
+ o The server responds to the client's NTP messages using the IP
+ address combination from the received NTP packet.
+
+ o Using the {source IP, destination IP} address pair in the received
+ packets, the client identifies the path and performs its
+ computations for each of the paths accordingly.
+
+ o The client combines the information from all paths.
+
+5.4. Using Traceroute for Path Discovery
+
+ The approach described thus far uses multiple IP addresses in a
+ single clock to create multiple paths. However, although each
+ two-way path is defined by a different {master IP, slave IP} address
+ pair, some of the IP address pairs may traverse exactly the same
+ network path, making them redundant.
+
+ Traceroute-based path discovery can be used for filtering only the IP
+ addresses that obtain diverse paths. 'Paris traceroute' [PARIS] and
+ 'TraceFlow' [TRACEFLOW] are examples of tools that discover the paths
+ between two points in the network. It should be noted that this
+ filtering approach is effective only if the Traceroute implementation
+ uses the same IP addresses and UDP ports as the synchronization
+ protocol packets. Since some Traceroute implementations vary the UDP
+ ports, they may not be effective in identifying and filtering
+ redundant paths in synchronization protocols.
+
+ Traceroute-based filtering can be implemented by both master and
+ slave nodes, or it can be restricted to run only on slave nodes to
+ reduce the overhead on the master. For networks that guarantee that
+ the path of the timing packets in the forward and reverse directions
+ are the same, path discovery should only be performed at the slave.
+
+ Since network routes change over time, path discovery and redundant
+ path filtering should be performed periodically. Two {master IP,
+ slave IP} address pairs that produce two diverse paths may be
+ rerouted to use the same paths. Thus, the set of addresses that are
+ used by each clock should be reassessed regularly.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Shpiner, et al. Experimental [Page 12]
+
+RFC 8039 Multipath Time Synchronization December 2016
+
+
+5.5. Using Unicast Discovery for MPPTP
+
+ As presented above, MPPTP uses Announce messages and the BMC
+ algorithm to discover the master. The unicast discovery option of
+ PTP can be used as an alternative.
+
+ When using unicast discovery, the MPPTP slave ports maintain a list
+ of the IP addresses of the master. The slave port uses unicast
+ negotiation to request unicast service from the master as follows:
+
+ o In single-ended MPPTP, the slave uses unicast negotiation from
+ each of its identities to the master's (only) identity.
+
+ o In dual-ended MPPTP, the slave uses unicast negotiation from its
+ IP addresses, each to a corresponding master IP address, to
+ request unicast synchronization messages.
+
+ Afterwards, the message exchange continues as described in
+ Sections 5.2.1 and 5.3.1.
+
+ The unicast discovery option can be used in networks that do not
+ support multicast or in networks in which the master clocks are known
+ in advance. In particular, unicast discovery avoids multicasting
+ Announce messages.
+
+6. Combining Algorithm
+
+ Previous sections discussed the methods of creating the multiple
+ paths and obtaining the time information required by the slave
+ algorithm. Once the time information is received through each of the
+ paths, the slave should use a combining algorithm, which consolidates
+ the information from the different paths into a single clock.
+ Various methods have been suggested for combining information from
+ different paths or from different clocks, e.g., [NTP] [SLAVEDIV]
+ [HIGH-AVAI] [KALMAN]. The choice of the combining algorithm is local
+ to the slave and does not affect interoperability. Hence, this
+ document does not define a specific method to be used by the slave.
+ The combining algorithm should be chosen carefully based on the
+ system properties, as different combining algorithms provide
+ different advantages. For example, some combining algorithms (e.g.,
+ [NTP] [DELAY-ATT]) are intended to be robust in the face of security
+ attacks, while other combining algorithms (e.g., [KALMAN]) are more
+ resilient to random delay variation.
+
+
+
+
+
+
+
+
+Shpiner, et al. Experimental [Page 13]
+
+RFC 8039 Multipath Time Synchronization December 2016
+
+
+7. Security Considerations
+
+ The security aspects of time synchronization protocols are discussed
+ in detail in [RFC7384]. The methods described in this document
+ propose to run a time synchronization protocol through redundant
+ paths and thus allow the detection and mitigation of
+ man-in-the-middle attacks, as described in [DELAY-ATT].
+ Specifically, multipath synchronization can mitigate the following
+ threats (as per [RFC7384]):
+
+ o Packet manipulation (Section 3.2.1 of [RFC7384]).
+
+ o Packet interception and removal (Section 3.2.5 of [RFC7384]).
+
+ o Packet delay manipulation (Section 3.2.6 of [RFC7384]).
+
+ It should be noted that when using multiple paths, these paths may
+ partially overlap, and thus an attack that takes place in a common
+ segment of these paths is not mitigated by the redundancy. Moreover,
+ an on-path attacker may in some cases have access to more than one
+ router or may be able to migrate from one router to another.
+ Therefore, when using multiple paths, it is important for the paths
+ to be as diverse and as independent as possible, making the
+ redundancy scheme more tolerant to on-path attacks.
+
+ It should be noted that the multipath approach requires the master
+ (or NTP server) to dedicate more resources to each slave (client)
+ than the conventional single-path approach. Hence, well-known
+ Distributed Denial-of-Service (DDoS) attacks may potentially be
+ amplified when the multipath approach is enabled.
+
+8. Scope of the Experiment
+
+ This memo is published as an Experimental RFC. The purpose of the
+ experimental period is to allow the community to analyze and to
+ verify the methods defined in this document. An experimental
+ evaluation of some of these methods has been published in [MULTI].
+ It is expected that the experimental period will allow the methods to
+ be further investigated and verified by the community. The duration
+ of the experiment is expected to be no less than two years from the
+ publication of this document.
+
+
+
+
+
+
+
+
+
+
+Shpiner, et al. Experimental [Page 14]
+
+RFC 8039 Multipath Time Synchronization December 2016
+
+
+9. References
+
+9.1. Normative References
+
+ [IEEE1588] IEEE Instrumentation and Measurement Society, "IEEE
+ Standard for a Precision Clock Synchronization Protocol
+ for Networked Measurement and Control Systems", IEEE
+ Std 1588-2008, DOI 10.1109/IEEESTD.2008.4579760.
+
+ [NTP] Mills, D., Martin, J., Ed., Burbank, J., and W. Kasch,
+ "Network Time Protocol Version 4: Protocol and Algorithms
+ Specification", RFC 5905, DOI 10.17487/RFC5905, June 2010,
+ <http://www.rfc-editor.org/info/rfc5905>.
+
+9.2. Informative References
+
+ [ASYMMETRY]
+ He, Y., Faloutsos, M., Krishnamurthy, S., and B. Huffaker,
+ "On routing asymmetry in the Internet", IEEE GLOBECOM,
+ DOI 10.1109/GLOCOM.2005.1577769, December 2005.
+
+ [ASYMMETRY2]
+ Pathak, A., Pucha, H., Zhang, Y., Hu, C., and Z. Mao, "A
+ measurement study of internet delay asymmetry",
+ International Conference on Passive and Active Network
+ Measurement 2008, DOI 10.1007/978-3-540-79232-1_19,
+ April 2008.
+
+ [DELAY-ATT]
+ Mizrahi, T., "A Game Theoretic Analysis of Delay Attacks
+ against Time Synchronization Protocols", IEEE
+ International Symposium on Precision Clock Synchronization
+ for Measurement, Control and Communication (ISPCS),
+ DOI 10.1109/ISPCS.2012.6336612, September 2012.
+
+ [HIGH-AVAI]
+ Ferrari, P., Flammini, A., Rinaldi, S., and G. Prytz,
+ "High availability IEEE 1588 nodes over IEEE 802.1 aq
+ Shortest Path Bridging networks", IEEE International
+ Symposium on Precision Clock Synchronization for
+ Measurement, Control and Communication (ISPCS),
+ DOI 10.1109/ISPCS.2013.6644760, September 2013.
+
+ [KALMAN] Giorgi, G. and C. Narduzzi, "Kalman filtering for
+ multi-path network synchronization", IEEE International
+ Symposium on Precision Clock Synchronization for
+ Measurement, Control and Communication (ISPCS),
+ DOI 10.1109/ISPCS.2014.6948693, September 2014.
+
+
+
+Shpiner, et al. Experimental [Page 15]
+
+RFC 8039 Multipath Time Synchronization December 2016
+
+
+ [MIF] Blanchet, M. and P. Seite, "Multiple Interfaces and
+ Provisioning Domains Problem Statement", RFC 6418,
+ DOI 10.17487/RFC6418, November 2011,
+ <http://www.rfc-editor.org/info/rfc6418>.
+
+ [MPTCP] Ford, A., Raiciu, C., Handley, M., and O. Bonaventure,
+ "TCP Extensions for Multipath Operation with Multiple
+ Addresses", RFC 6824, DOI 10.17487/RFC6824, January 2013,
+ <http://www.rfc-editor.org/info/rfc6824>.
+
+ [MULTI] Shpiner, A., Revah, Y., and T. Mizrahi, "Multi-path Time
+ Protocols", IEEE International Symposium on Precision
+ Clock Synchronization for Measurement, Control and
+ Communication (ISPCS), DOI 10.1109/ISPCS.2013.6644754,
+ September 2013.
+
+ [PARIS] Augustin, B., Friedman, T., and R. Teixeira, "Measuring
+ Load-balanced Paths in the Internet", 7th ACM SIGCOMM
+ conference on Internet measurement (IMC '07),
+ DOI 10.1145/1298306.1298329, October 2007.
+
+ [PARIS2] Augustin, B., Friedman, T., and R. Teixeira, "Measuring
+ Multipath Routing in the Internet", IEEE/ACM Transactions
+ on Networking, 19(3), pp. 830-840,
+ DOI 10.1109/TNET.2010.2096232, June 2011.
+
+ [RFC7384] Mizrahi, T., "Security Requirements of Time Protocols in
+ Packet Switched Networks", RFC 7384, DOI 10.17487/RFC7384,
+ October 2014, <http://www.rfc-editor.org/info/rfc7384>.
+
+ [SLAVEDIV] Mizrahi, T., "Slave Diversity: Using Multiple Paths to
+ Improve the Accuracy of Clock Synchronization Protocols",
+ IEEE International Symposium on Precision Clock
+ Synchronization for Measurement, Control and Communication
+ (ISPCS), DOI 10.1109/ISPCS.2012.6336621, September 2012.
+
+ [TRACEFLOW]
+ Narasimhan, J., Venkataswami, B., Groves, R., and P.
+ Hoose, "Traceflow", Work in Progress,
+ draft-janapath-intarea-traceflow-00, January 2012.
+
+
+
+
+
+
+
+
+
+
+
+Shpiner, et al. Experimental [Page 16]
+
+RFC 8039 Multipath Time Synchronization December 2016
+
+
+Acknowledgments
+
+ The authors would like to thank Yoram Revah for his contribution to
+ this work. The authors also gratefully acknowledge the useful
+ comments provided by Peter Meyer, Doug Arnold, Joe Abley, Zhen Cao,
+ Watson Ladd, and Mirja Kuehlewind, as well as other comments received
+ from the TICTOC working group participants.
+
+Authors' Addresses
+
+ Alex Shpiner
+ Mellanox Technologies, Ltd.
+ Hakidma 26
+ Ofer Industrial Park
+ Yokneam, 2069200
+ Israel
+
+ Email: alexshp@mellanox.com
+
+
+ Richard Tse
+ Microsemi
+ 8555 Baxter Place
+ Burnaby, BC V5A 4V7
+ Canada
+
+ Email: Richard.Tse@microsemi.com
+
+
+ Craig Schelp
+ Oracle
+
+ Email: craig.schelp@oracle.com
+
+
+ Tal Mizrahi
+ Marvell
+ 6 Hamada St.
+ Yokneam, 2066721
+ Israel
+
+ Email: talmi@marvell.com
+
+
+
+
+
+
+
+
+
+Shpiner, et al. Experimental [Page 17]
+