<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="historic" consensus="true" docName="draft-ietf-ntp-mode-6-cmds-11" indexInclude="true" ipr="pre5378Trust200902" number="9327" prepTime="2022-11-01T14:01:53" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-ntp-mode-6-cmds-11" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9327" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="NTP Control Messages">Control Messages Protocol for Use with Network Time Protocol Version 4</title>
    <seriesInfo name="RFC" value="9327" stream="IETF"/>
    <author fullname="Brian Haberman" initials="B." surname="Haberman" role="editor">
      <organization showOnFrontPage="true">JHU</organization>
      <address>
        <email>brian@innovationslab.net</email>
      </address>
    </author>
    <date month="11" year="2022"/>
    <area>int</area>
    <workgroup>ntp</workgroup>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">This document describes the structure of the control messages that were
      historically used
      with the Network Time Protocol (NTP) before the advent of more modern control and
      management approaches. These control messages have been used to
      monitor and control the NTP application running on any
      IP network attached computer. The information in this document
      was originally described in Appendix B of RFC 1305. The goal of this document
      is to provide an updated description of the control messages described in RFC
      1305 in order to conform with the updated NTP specification
      documented in RFC 5905.</t>
      <t indent="0" pn="section-abstract-2">The publication of this document is not meant to encourage the development
      and deployment of these control messages. This document is only providing a
      current reference for these control messages given the current status of RFC
      1305.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This document is not an Internet Standards Track specification; it is
            published for the historical record.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document defines a Historic Document for the Internet
            community.  This document is a product of the Internet Engineering
            Task Force (IETF).  It represents the consensus of the IETF community.
            It has received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Not all documents
            approved by the IESG are candidates for any level of Internet
            Standard; see Section 2 of RFC 7841. 
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9327" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2022 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
        <t indent="0" pn="section-boilerplate.2-3">
            This document may contain material from IETF Documents or IETF
            Contributions published or made publicly available before November
            10, 2008. The person(s) controlling the copyright in some of this
            material may not have granted the IETF Trust the right to allow
            modifications of such material outside the IETF Standards Process.
            Without obtaining an adequate license from the person(s)
            controlling the copyright in such materials, this document may not
            be modified outside the IETF Standards Process, and derivative
            works of it may not be created outside the IETF Standards Process,
            except to format it for publication as an RFC or to translate it
            into languages other than English.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.2">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.2.1"><xref derivedContent="1.2" format="counter" sectionFormat="of" target="section-1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-control-message-overview">Control Message Overview</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.3">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.3.1"><xref derivedContent="1.3" format="counter" sectionFormat="of" target="section-1.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-remote-facility-message-ove">Remote Facility Message Overview</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ntp-control-message-format">NTP Control Message Format</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-status-words">Status Words</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-system-status-word">System Status Word</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-peer-status-word">Peer Status Word</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.3">
                <t indent="0" pn="section-toc.1-1.3.2.3.1"><xref derivedContent="3.3" format="counter" sectionFormat="of" target="section-3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-clock-status-word">Clock Status Word</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.4">
                <t indent="0" pn="section-toc.1-1.3.2.4.1"><xref derivedContent="3.4" format="counter" sectionFormat="of" target="section-3.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-error-status-word">Error Status Word</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-commands">Commands</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.7.2">
              <li pn="section-toc.1-1.7.2.1">
                <t indent="0" pn="section-toc.1-1.7.2.1.1"><xref derivedContent="7.1" format="counter" sectionFormat="of" target="section-7.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.2">
                <t indent="0" pn="section-toc.1-1.7.2.2.1"><xref derivedContent="7.2" format="counter" sectionFormat="of" target="section-7.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="Appendix A" format="default" sectionFormat="of" target="section-appendix.a"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-ntp-remote-facility-message">NTP Remote Facility Message Format</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.c"/><xref derivedContent="" format="title" sectionFormat="of" target="name-contributors">Contributors</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.d"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-address">Author's Address</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1"><xref target="RFC1305" format="default" sectionFormat="of" derivedContent="RFC1305"/> describes a set of control messages
      for use within the Network Time Protocol (NTP) when a comprehensive network
      management solution was not available. The definitions of these control messages
      were not promulgated to <xref target="RFC5905" format="default" sectionFormat="of" derivedContent="RFC5905"/> when NTP version
      4 was documented.  These messages were intended for use only in
      systems where no other management facilities were available or
      appropriate, such as in dedicated-function bus peripherals. Support for
      these messages is not required in order to conform to
      <xref target="RFC5905" format="default" sectionFormat="of" derivedContent="RFC5905"/>. The control messages are described here as a
      current reference for use with an implementation of NTP from RFC 5905.</t>
      <t indent="0" pn="section-1-2">The publication of this document is not meant to encourage the development
      and deployment of these control messages. This document is only providing a
      current reference for these control messages given the current status of RFC
      1305.</t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-1.1">
        <name slugifiedName="name-terminology">Terminology</name>
        <t indent="0" pn="section-1.1-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>",
    "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", and
    "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as described in
    BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> when, and
    only when, they appear in all capitals, as shown here.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-1.2">
        <name slugifiedName="name-control-message-overview">Control Message Overview</name>
        <t indent="0" pn="section-1.2-1">The NTP mode 6 control messages are used by NTP management programs
	(e.g., ntpq) when a more robust network management facility (e.g., SNMP)
	is not available. These control messages provide rudimentary control and
	monitoring functions to manage a running instance of an NTP server. These
	commands are not designed to be used for communication between instances
	of running NTP servers.</t>
        <t indent="0" pn="section-1.2-2">The NTP control message has the value 6 specified in the mode field
        of the first octet of the NTP header and is formatted as shown in
        <xref target="M6Hdr" format="default" sectionFormat="of" derivedContent="Figure 1"/>.
        The format of the data field is specific to each command or response;
        however, in most cases, the format is designed to be constructed and
        viewed by humans and so is coded in free-form ASCII. This facilitates
        the specification and implementation of simple management tools in the
        absence of fully evolved network-management facilities. As in ordinary
        NTP messages, the authenticator field follows the data field. If the
        authenticator is used, the data field is zero-padded to a 32-bit
        boundary, but the padding bits are not considered part of the data field
        and are not included in the field count.</t>
        <t indent="0" pn="section-1.2-3">IP hosts are not required to reassemble datagrams over a certain size
	(576 octets for IPv4 <xref target="RFC0791" format="default" sectionFormat="of" derivedContent="RFC0791"/> and 1280 octets for
	IPv6 <xref target="RFC8200" format="default" sectionFormat="of" derivedContent="RFC8200"/>); however, some commands or responses may
        involve more data than
        will fit into a single datagram. Accordingly, a simple reassembly
        feature is included in which each octet of the message data is numbered
        starting with zero. As each fragment is transmitted, the number of its
        first octet is inserted in the offset field and the number of octets is
        inserted in the count field. The more-data (M) bit is set in all
        fragments except the last.</t>
        <t indent="0" pn="section-1.2-4">Most control functions involve sending a command and receiving a
        response, perhaps involving several fragments. The sender chooses a
        distinct, nonzero sequence number and sets the status field, "R" bit, and "E"
        bit to zero. The responder interprets the opcode and additional
        information in the data field, updates the status field, sets the "R" bit
        to one and returns the three 32-bit words of the header along with
        additional information in the data field. In the case of invalid message
        format or contents, the responder inserts a code in the status field,
        sets the "R" and "E" bits to one and, optionally, inserts a diagnostic
        message in the data field.</t>
        <t indent="0" pn="section-1.2-5">Some commands read or write system variables (e.g., s.offset) and peer
        variables (e.g., p.stratum) for
        an association identified in the command. Others read or write variables
        associated with a radio clock or other device directly connected to a
        source of primary synchronization information. To identify which type of
        variable and association, the Association ID is used. System
        variables are indicated by the identifier zero. As each association is
        mobilized a unique, nonzero identifier is created for it. These
        identifiers are used in a cyclic fashion, so that the chance of using an
        old identifier that matches a newly created association is remote. A
        management entity can request a list of current identifiers and
        subsequently use them to read and write variables for each association.
        An attempt to use an expired identifier results in an exception
        response, following which the list can be requested again.</t>
        <t indent="0" pn="section-1.2-6">Some exception events, such as when a peer becomes reachable or
        unreachable, occur spontaneously and are not necessarily associated with
        a command. An implementation may elect to save the event information for
        later retrieval, to send an asynchronous response (called a trap), or
        both. In case of a trap, the IP address and port number are determined by
        a previous command and the sequence field is set as described below.
        Current status and summary information for the latest exception event is
        returned in all normal responses. Bits in the status field indicate
        whether an exception has occurred since the last response and whether
        more than one exception has occurred.</t>
        <t indent="0" pn="section-1.2-7">Commands need not necessarily be sent by an NTP peer, so ordinary
        access-control procedures may not apply; however, the optional
	mask/match mechanism suggested in <xref target="Security" format="default" sectionFormat="of" derivedContent="Section 6"/>
	 provides the
        capability to control access by mode number, so this could be used to
        limit access for control messages (mode 6) to selected address
        ranges.</t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-1.3">
        <name slugifiedName="name-remote-facility-message-ove">Remote Facility Message Overview</name>
        <t indent="0" pn="section-1.3-1">The original development of the NTP daemon included a Remote Facility
        for monitoring and configuration. This facility used mode 7 commands
        to communicate with the NTP daemon. This document illustrates the mode
        7 packet format only. The commands embedded in the mode 7 messages are
        implementation specific and not standardized in any way. The mode 7 message
        format is described in <xref target="mode7" format="default" sectionFormat="of" derivedContent="Appendix A"/>.</t>
      </section>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-ntp-control-message-format">NTP Control Message Format</name>
      <t indent="0" pn="section-2-1">The format of the NTP Control Message header, which immediately
      follows the UDP header, is shown in <xref target="M6Hdr" format="default" sectionFormat="of" derivedContent="Figure 1"/>. Following the figure is a description
      of its header fields.</t>
      <figure anchor="M6Hdr" align="left" suppress-title="false" pn="figure-1">
        <name slugifiedName="name-ntp-control-message-header">NTP Control Message Header</name>
        <artwork align="center" name="" type="" alt="" pn="section-2-2.1">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|LI |  VN |Mode |R|E|M| opcode  |       Sequence Number         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|            Status             |       Association ID          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|            Offset             |            Count              |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
/                    Data (up to 468 bytes)                     /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Padding (optional)                         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
/              Authenticator (optional, 20 or 24 bits)          /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</artwork>
      </figure>
      <dl newline="true" spacing="normal" indent="3" pn="section-2-3">
        <dt pn="section-2-3.1">Leap Indicator (LI):</dt>
        <dd pn="section-2-3.2">This is a 2-bit integer that is set to
      b00 for control message requests and responses. The Leap Indicator
      value used at this position in most NTP modes is in the system status
      word provided in some control message responses.</dd>
        <dt pn="section-2-3.3">Version Number (VN):</dt>
        <dd pn="section-2-3.4">This is a 3-bit integer indicating a minimum
      NTP version number. NTP servers do not respond to control messages with
      an unrecognized version number. Requests may intentionally use a lower
      version number to enable interoperability with earlier versions of NTP.
      Responses carry the same version as the corresponding request.</dd>
        <dt pn="section-2-3.5">Mode:</dt>
        <dd pn="section-2-3.6">This is a 3-bit integer indicating the mode.
      The value 6 indicates an NTP control message.</dd>
        <dt pn="section-2-3.7">Response Bit (R):</dt>
        <dd pn="section-2-3.8">Set to zero for commands; set to one for responses.</dd>
        <dt pn="section-2-3.9">Error Bit (E):</dt>
        <dd pn="section-2-3.10">Set to zero for normal responses; set to one for an error
      response.</dd>
        <dt pn="section-2-3.11">More Bit (M):</dt>
        <dd pn="section-2-3.12">Set to zero for the last fragment; set to one for all others.</dd>
        <dt pn="section-2-3.13">Operation Code (opcode):</dt>
        <dd pn="section-2-3.14">This is a 5-bit integer specifying the
      command function. Values currently defined include the following:</dd>
      </dl>
      <table anchor="opcodes" align="center" pn="table-1">
        <name slugifiedName="name-operation-codes">Operation Codes</name>
        <thead>
          <tr>
            <th align="left" colspan="1" rowspan="1">Code</th>
            <th align="left" colspan="1" rowspan="1">Meaning</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">0</td>
            <td align="left" colspan="1" rowspan="1">reserved</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">1</td>
            <td align="left" colspan="1" rowspan="1">read status command/response</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">2</td>
            <td align="left" colspan="1" rowspan="1">read variables command/response</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">3</td>
            <td align="left" colspan="1" rowspan="1">write variables command/response</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">4</td>
            <td align="left" colspan="1" rowspan="1">read clock variables command/response</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">5</td>
            <td align="left" colspan="1" rowspan="1">write clock variables command/response</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">6</td>
            <td align="left" colspan="1" rowspan="1">set trap address/port command/response</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">7</td>
            <td align="left" colspan="1" rowspan="1">trap response</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">8</td>
            <td align="left" colspan="1" rowspan="1">runtime configuration command/response</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">9</td>
            <td align="left" colspan="1" rowspan="1">export configuration to file command/response</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">10</td>
            <td align="left" colspan="1" rowspan="1">retrieve remote address stats command/response</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">11</td>
            <td align="left" colspan="1" rowspan="1">retrieve ordered list command/response</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">12</td>
            <td align="left" colspan="1" rowspan="1">request client-specific nonce command/response</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">13-30</td>
            <td align="left" colspan="1" rowspan="1">reserved</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">31</td>
            <td align="left" colspan="1" rowspan="1">unset trap address/port command/response</td>
          </tr>
        </tbody>
      </table>
      <dl newline="true" spacing="normal" indent="3" pn="section-2-5">
        <dt pn="section-2-5.1">Sequence Number:</dt>
        <dd pn="section-2-5.2">This is a 16-bit integer indicating the sequence number of
      the command or response. Each request uses a different sequence number. Each
      response carries the same sequence number as its corresponding request. For
      asynchronous trap responses, the responder increments the sequence number by
      one for each response, allowing trap receivers to detect missing trap responses.
      The sequence number of each fragment of a multiple-datagram response carries the
      same sequence number, copied from the request.</dd>
        <dt pn="section-2-5.3">Status:</dt>
        <dd pn="section-2-5.4">This is a 16-bit code indicating the current status of the
      system, peer, or clock with values coded as described in following
      sections.</dd>
        <dt pn="section-2-5.5">Association ID:</dt>
        <dd pn="section-2-5.6">This is a 16-bit unsigned integer identifying a valid
      association or zero for the system clock.</dd>
        <dt pn="section-2-5.7">Offset:</dt>
        <dd pn="section-2-5.8">This is a 16-bit unsigned integer indicating the offset, in octets, of
      the first octet in the data area. The offset is set to zero in requests. Responses
      spanning multiple datagrams use a positive offset in all but the first datagram.</dd>
        <dt pn="section-2-5.9">Count:</dt>
        <dd pn="section-2-5.10">This is a 16-bit unsigned integer indicating the length of the data
      field, in octets.</dd>
        <dt pn="section-2-5.11">Data:</dt>
        <dd pn="section-2-5.12">This contains the message data for the command or response. The
      maximum number of data octets is 468.</dd>
        <dt pn="section-2-5.13">Padding (optional):</dt>
        <dd pn="section-2-5.14">Contains zero to 3 octets with a value of zero, as needed to
      ensure the overall control message size is a multiple of 4 octets.</dd>
        <dt pn="section-2-5.15">Authenticator (optional):</dt>
        <dd pn="section-2-5.16">When the NTP authentication mechanism is
      implemented, this contains the authenticator information defined in
      <xref target="RFC1305" sectionFormat="of" section="C" format="default" derivedLink="https://rfc-editor.org/rfc/rfc1305#appendix-C" derivedContent="RFC1305"/>.</dd>
      </dl>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-status-words">Status Words</name>
      <t indent="0" pn="section-3-1">Status words indicate the present status of the system, associations,
      and clock. They are designed to be interpreted by network-monitoring
      programs and are in one of four 16-bit formats shown in <xref target="M6SW" format="default" sectionFormat="of" derivedContent="Figure 2"/>
      and described in this section. System and peer status words are associated
      with responses for all commands except the read clock variables, write
      clock variables, and set trap address/port commands. The association
      identifier zero specifies the system status word, while a nonzero
      identifier specifies a particular peer association. The status word
      returned in response to read clock variables and write clock variables
      commands indicates the state of the clock hardware and decoding
      software. A special error status word is used to report malformed
      command fields or invalid values.</t>
      <figure anchor="M6SW" align="left" suppress-title="false" pn="figure-2">
        <name slugifiedName="name-status-word-formats">Status Word Formats</name>
        <artwork align="center" name="" type="" alt="" pn="section-3-2.1">
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| LI| Clock Src | Count | Code  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       System Status Word

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Status | SEL | Count | Code  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        Peer Status Word         

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Clock Status  |    Code       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        Radio Status Word

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Error Code  |   Reserved    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        Error Status Word

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Reserved    | Count | Code  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        Clock Status Word</artwork>
      </figure>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-3.1">
        <name slugifiedName="name-system-status-word">System Status Word</name>
        <t indent="0" pn="section-3.1-1">The system status word appears in the status field of the response
        to a read status or read variables command with a zero association
        identifier. The format of the system status word is as follows:</t>
        <dl newline="true" spacing="normal" indent="3" pn="section-3.1-2">
          <dt pn="section-3.1-2.1">Leap Indicator (LI):</dt>
          <dd pn="section-3.1-2.2">This is a 2-bit code warning of an impending
        leap second to be inserted/deleted in the last minute of the current
        day, with bit 0 and bit 1, respectively, coded as follows:</dd>
        </dl>
        <table anchor="LeapIndicator" align="center" pn="table-2">
          <name slugifiedName="name-leap-indicator-codes">Leap Indicator Codes</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">LI</th>
              <th align="left" colspan="1" rowspan="1">Meaning</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">00</td>
              <td align="left" colspan="1" rowspan="1">no warning</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">01</td>
              <td align="left" colspan="1" rowspan="1">insert second after 23:59:59 of the current day</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">10</td>
              <td align="left" colspan="1" rowspan="1">delete second 23:59:59 of the current day</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">11</td>
              <td align="left" colspan="1" rowspan="1">unsynchronized</td>
            </tr>
          </tbody>
        </table>
        <dl newline="true" spacing="normal" indent="3" pn="section-3.1-4">
          <dt pn="section-3.1-4.1">Clock Source (Clock Src):</dt>
          <dd pn="section-3.1-4.2">This is a 6-bit integer
        indicating the current synchronization source, with values coded as
        follows:</dd>
        </dl>
        <table anchor="ClockSource" align="center" pn="table-3">
          <name slugifiedName="name-clock-source-values">Clock Source Values</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">Code</th>
              <th align="left" colspan="1" rowspan="1">Meaning</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">0</td>
              <td align="left" colspan="1" rowspan="1">unspecified or unknown</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">1</td>
              <td align="left" colspan="1" rowspan="1">Calibrated atomic clock (e.g., PPS, HP 5061)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">2</td>
              <td align="left" colspan="1" rowspan="1">VLF (band 4) or LF (band 5) radio (e.g., OMEGA,, WWVB)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">3</td>
              <td align="left" colspan="1" rowspan="1">HF (band 7) radio (e.g., CHU, MSF, WWV/H)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">4</td>
              <td align="left" colspan="1" rowspan="1">UHF (band 9) satellite (e.g., GOES, GPS)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">5</td>
              <td align="left" colspan="1" rowspan="1">local net (e.g., DCN, TSP, DTS)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">6</td>
              <td align="left" colspan="1" rowspan="1">UDP/NTP</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">7</td>
              <td align="left" colspan="1" rowspan="1">UDP/TIME</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">8</td>
              <td align="left" colspan="1" rowspan="1">eyeball-and-wristwatch</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">9</td>
              <td align="left" colspan="1" rowspan="1">telephone modem (e.g., NIST)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">10-63</td>
              <td align="left" colspan="1" rowspan="1">reserved</td>
            </tr>
          </tbody>
        </table>
        <dl newline="true" spacing="normal" indent="3" pn="section-3.1-6">
          <dt pn="section-3.1-6.1">System Event Counter (Count):</dt>
          <dd pn="section-3.1-6.2">This is a 4-bit integer indicating the
        number of system events occurring since the last time the
        System Event Code changed. Upon reaching 15, subsequent events with the same
        code are not counted.</dd>
          <dt pn="section-3.1-6.3">System Event Code (Code):</dt>
          <dd pn="section-3.1-6.4">This is a 4-bit integer identifying the
        latest system exception event, with new values overwriting previous
        values, and coded as follows:</dd>
        </dl>
        <table anchor="SystemEventCode" align="center" pn="table-4">
          <name slugifiedName="name-system-event-codes">System Event Codes</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">Code</th>
              <th align="left" colspan="1" rowspan="1">Meaning</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">0</td>
              <td align="left" colspan="1" rowspan="1">unspecified</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">1</td>
              <td align="left" colspan="1" rowspan="1">frequency correction (drift) file not available</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">2</td>
              <td align="left" colspan="1" rowspan="1">frequency correction started (frequency stepped)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">3</td>
              <td align="left" colspan="1" rowspan="1">spike detected and ignored, starting stepout timer</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">4</td>
              <td align="left" colspan="1" rowspan="1">frequency training started</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">5</td>
              <td align="left" colspan="1" rowspan="1">clock synchronized</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">6</td>
              <td align="left" colspan="1" rowspan="1">system restart</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">7</td>
              <td align="left" colspan="1" rowspan="1">panic stop (required step greater than panic threshold)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">8</td>
              <td align="left" colspan="1" rowspan="1">no system peer</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">9</td>
              <td align="left" colspan="1" rowspan="1">leap second insertion/deletion armed for the current month</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">10</td>
              <td align="left" colspan="1" rowspan="1">leap second disarmed</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">11</td>
              <td align="left" colspan="1" rowspan="1">leap second inserted or deleted</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">12</td>
              <td align="left" colspan="1" rowspan="1">clock stepped (stepout timer expired)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">13</td>
              <td align="left" colspan="1" rowspan="1">kernel loop discipline status changed</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">14</td>
              <td align="left" colspan="1" rowspan="1">leapseconds table loaded from file</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">15</td>
              <td align="left" colspan="1" rowspan="1">leapseconds table outdated, updated file needed</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-3.2">
        <name slugifiedName="name-peer-status-word">Peer Status Word</name>
        <t indent="0" pn="section-3.2-1">A peer status word is returned in the status field of a response to
        a read status, read variables, or write variables command and appears
        in the list of Association IDs and status words returned
        by a read status command with a zero Association ID. The
        format of a peer status word is as follows:</t>
        <dl newline="true" spacing="normal" indent="3" pn="section-3.2-2">
          <dt pn="section-3.2-2.1">Peer Status (Status):</dt>
          <dd pn="section-3.2-2.2">This is a 5-bit code indicating
        the status of the peer determined by the packet procedure, with bits
        assigned as follows:</dd>
        </dl>
        <table anchor="PeerStatus" align="center" pn="table-5">
          <name slugifiedName="name-peer-status-bits">Peer Status Bits</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">Peer Status bit</th>
              <th align="left" colspan="1" rowspan="1">Meaning</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">0</td>
              <td align="left" colspan="1" rowspan="1">configured (peer.config)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">1</td>
              <td align="left" colspan="1" rowspan="1">authentication enabled (peer.authenable)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">2</td>
              <td align="left" colspan="1" rowspan="1">authentication okay (peer.authentic)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">3</td>
              <td align="left" colspan="1" rowspan="1">reachability okay (peer.reach != 0)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">4</td>
              <td align="left" colspan="1" rowspan="1">broadcast association</td>
            </tr>
          </tbody>
        </table>
        <dl newline="true" spacing="normal" indent="3" pn="section-3.2-4">
          <dt pn="section-3.2-4.1">Peer Selection (SEL):</dt>
          <dd pn="section-3.2-4.2">This is a 3-bit integer indicating the
        status of the peer determined by the clock-selection procedure, with
        values coded as follows:</dd>
        </dl>
        <table anchor="PeerSelection" align="center" pn="table-6">
          <name slugifiedName="name-peer-selection-values">Peer Selection Values</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">Sel</th>
              <th align="left" colspan="1" rowspan="1">Meaning</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">0</td>
              <td align="left" colspan="1" rowspan="1">rejected</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">1</td>
              <td align="left" colspan="1" rowspan="1">discarded by intersection algorithm</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">2</td>
              <td align="left" colspan="1" rowspan="1">discarded by table overflow (not currently used)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">3</td>
              <td align="left" colspan="1" rowspan="1">discarded by the cluster algorithm</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">4</td>
              <td align="left" colspan="1" rowspan="1">included by the combine algorithm</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">5</td>
              <td align="left" colspan="1" rowspan="1">backup source (with more than sys.maxclock survivors)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">6</td>
              <td align="left" colspan="1" rowspan="1">system peer (synchronization source)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">7</td>
              <td align="left" colspan="1" rowspan="1">PPS (pulse per second) peer</td>
            </tr>
          </tbody>
        </table>
        <dl newline="true" spacing="normal" indent="3" pn="section-3.2-6">
          <dt pn="section-3.2-6.1">Peer Event Counter (Count):</dt>
          <dd pn="section-3.2-6.2">This is a 4-bit integer indicating the
        number of peer exception events that occurred since the last time the
        peer event code changed. Upon reaching 15, subsequent events with the same
        code are not counted.</dd>
          <dt pn="section-3.2-6.3">Peer Event Code (Code):</dt>
          <dd pn="section-3.2-6.4">This is a 4-bit integer identifying the
        latest peer exception event, with new values overwriting previous values,
        and coded as follows:</dd>
        </dl>
        <table anchor="PeerEventCode" align="center" pn="table-7">
          <name slugifiedName="name-peer-event-code-values">Peer Event Code Values</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">Peer Event Code</th>
              <th align="left" colspan="1" rowspan="1">Meaning</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">0</td>
              <td align="left" colspan="1" rowspan="1">unspecified</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">1</td>
              <td align="left" colspan="1" rowspan="1">association mobilized</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">2</td>
              <td align="left" colspan="1" rowspan="1">association demobilized</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">3</td>
              <td align="left" colspan="1" rowspan="1">peer unreachable (peer.reach was nonzero now zero)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">4</td>
              <td align="left" colspan="1" rowspan="1">peer reachable (peer.reach was zero now nonzero)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">5</td>
              <td align="left" colspan="1" rowspan="1">association restarted or timed out</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">6</td>
              <td align="left" colspan="1" rowspan="1">no reply (only used with one-shot clock set command)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">7</td>
              <td align="left" colspan="1" rowspan="1">peer rate limit exceeded (kiss code RATE received)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">8</td>
              <td align="left" colspan="1" rowspan="1">access denied (kiss code DENY received)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">9</td>
              <td align="left" colspan="1" rowspan="1">leap second insertion/deletion at month's end armed by peer vote</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">10</td>
              <td align="left" colspan="1" rowspan="1">became system peer (sys.peer)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">11</td>
              <td align="left" colspan="1" rowspan="1">reference clock event (see clock status word)</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">12</td>
              <td align="left" colspan="1" rowspan="1">authentication failed</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">13</td>
              <td align="left" colspan="1" rowspan="1">popcorn spike suppressed by peer clock filter register</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">14</td>
              <td align="left" colspan="1" rowspan="1">entering interleaved mode</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">15</td>
              <td align="left" colspan="1" rowspan="1">recovered from interleave error</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-3.3">
        <name slugifiedName="name-clock-status-word">Clock Status Word</name>
        <t indent="0" pn="section-3.3-1">There are two ways a reference clock can be attached to an NTP
        service host: as a dedicated device managed by the operating system
        and as a synthetic peer managed by NTP.  As in the read status command, the Association ID is used to
identify the correct variable for each clock: zero for the system clock and nonzero for a peer clock. Only one system clock is
        supported by the protocol, although many peer clocks can be supported.
        A system or peer clock status word appears in the status field of the
        response to a read clock variables or write clock variables command.
        This word can be considered to be an extension of the system status word or
        the peer status word as appropriate. The format of the clock status
        word is as follows:</t>
        <dl newline="true" spacing="normal" indent="3" pn="section-3.3-2">
          <dt pn="section-3.3-2.1">Reserved:</dt>
          <dd pn="section-3.3-2.2">This is an 8-bit integer that is ignored by requesters and
        zeroed by responders.</dd>
          <dt pn="section-3.3-2.3">Count:</dt>
          <dd pn="section-3.3-2.4">This is a 4-bit integer indicating the number of clock
        events that occurred since the last time the clock event code changed.
        Upon reaching 15, subsequent events with the same code are not counted.</dd>
          <dt pn="section-3.3-2.5">Clock Code (Code):</dt>
          <dd pn="section-3.3-2.6">This is a 4-bit integer indicating the current
        clock status, with values coded as follows:</dd>
        </dl>
        <table anchor="ClockStatus" align="center" pn="table-8">
          <name slugifiedName="name-clock-code-values">Clock Code Values</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">Clock Status</th>
              <th align="left" colspan="1" rowspan="1">Meaning</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">0</td>
              <td align="left" colspan="1" rowspan="1">clock operating within nominals</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">1</td>
              <td align="left" colspan="1" rowspan="1">reply timeout</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">2</td>
              <td align="left" colspan="1" rowspan="1">bad reply format</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">3</td>
              <td align="left" colspan="1" rowspan="1">hardware or software fault</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">4</td>
              <td align="left" colspan="1" rowspan="1">propagation failure</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">5</td>
              <td align="left" colspan="1" rowspan="1">bad date format or value</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">6</td>
              <td align="left" colspan="1" rowspan="1">bad time format or value</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">7-15</td>
              <td align="left" colspan="1" rowspan="1">reserved</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-3.4">
        <name slugifiedName="name-error-status-word">Error Status Word</name>
        <t indent="0" pn="section-3.4-1">An error status word is returned in the status field of an error
        response as the result of invalid message format or contents. Its
        presence is indicated when the E (error) bit is set along with the
        response (R) bit in the response. It consists of an 8-bit integer
        coded as follows:</t>
        <table anchor="ErrorStatus" align="center" pn="table-9">
          <name slugifiedName="name-error-status-word-codes">Error Status Word Codes</name>
          <thead>
            <tr>
              <th align="left" colspan="1" rowspan="1">Error Status</th>
              <th align="left" colspan="1" rowspan="1">Meaning</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">0</td>
              <td align="left" colspan="1" rowspan="1">unspecified</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">1</td>
              <td align="left" colspan="1" rowspan="1">authentication failure</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">2</td>
              <td align="left" colspan="1" rowspan="1">invalid message length or format</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">3</td>
              <td align="left" colspan="1" rowspan="1">invalid opcode</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">4</td>
              <td align="left" colspan="1" rowspan="1">unknown Association ID</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">5</td>
              <td align="left" colspan="1" rowspan="1">unknown variable name</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">6</td>
              <td align="left" colspan="1" rowspan="1">invalid variable value</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">7</td>
              <td align="left" colspan="1" rowspan="1">administratively prohibited</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">8-255</td>
              <td align="left" colspan="1" rowspan="1">reserved</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="commands" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-commands">Commands</name>
      <t indent="0" pn="section-4-1">Commands consist of the header and optional data field shown in
      <xref target="M6Hdr" format="default" sectionFormat="of" derivedContent="Figure 1"/>. When present, the data field contains a list of
      identifiers or assignments in the form
      &lt;&lt;identifier&gt;&gt;[=&lt;&lt;value&gt;&gt;],&lt;&lt;identifier&gt;&gt;[=&lt;&lt;value&gt;&gt;],...
      where &lt;&lt;identifier&gt;&gt; is the ASCII name of a system or peer
      variable such as the ones specified in RFC 5905 and
      &lt;&lt;value&gt;&gt; is expressed as a decimal, hexadecimal, or string
      constant in the syntax of the C programming language. Where no ambiguity
      exists, the "sys." or "peer." prefixes can be suppressed.
      Space characters (ASCII nonprinting format effectors) can be added to improve
      readability for simple monitoring programs that do not reformat the data
      field.  Representations of note are as follows:</t>
      <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-4-2">
        <li pn="section-4-2.1">
      IPv4 internet addresses
      are written in the form [n.n.n.n], where n is in decimal notation and
      the brackets are optional</li>
        <li pn="section-4-2.2">IPv6 internet addresses are formulated based on the
      guidelines defined in <xref target="RFC5952" format="default" sectionFormat="of" derivedContent="RFC5952"/>.</li>
        <li pn="section-4-2.3">Timestamps (including reference, originate, receive, and transmit values)
      and the logical clock are represented in units of seconds and
      fractions, preferably in hexadecimal notation.</li>
        <li pn="section-4-2.4">Delay, offset,
      dispersion, and distance values are represented in units of milliseconds
      and fractions, preferably in decimal notation.</li>
        <li pn="section-4-2.5">All other values are
      represented as is, preferably in decimal notation.</li>
      </ul>
      <t indent="0" pn="section-4-3">Implementations may define variables other than those described in
      RFC 5905; called "extramural variables", these are
      distinguished by the inclusion of some character type other than
      alphanumeric or "." in the name. For those commands
      that return a list of assignments in the response data field, if the
      command data field is empty, it is expected that all available variables
      defined in RFC 5905 will be included in the
      response. For the read commands, if the command data field is nonempty,
      an implementation may choose to process this field to individually
      select which variables are to be returned.</t>
      <t indent="0" pn="section-4-4">Commands are interpreted as follows:</t>
      <dl newline="true" spacing="normal" indent="3" pn="section-4-5">
        <dt pn="section-4-5.1">Read Status (1):</dt>
        <dd pn="section-4-5.2">The command data field is empty or contains a list
      of identifiers separated by commas. The command operates in two ways
      depending on the value of the Association ID. If this identifier
      is nonzero, the response includes the peer identifier and status word.
      Optionally, the response data field may contain other information, such
      as described in the Read Variables command. If the association
      identifier is zero, the response includes the system identifier (0) and
      status word; the data field contains a list of binary-coded pairs
      &lt;&lt;Association ID&gt;&gt; &lt;&lt;status word&gt;&gt;, one
      for each currently defined association.</dd>
        <dt pn="section-4-5.3">Read Variables (2):</dt>
        <dd pn="section-4-5.4">The command data field is empty or contains a
      list of identifiers separated by commas. If the Association ID
      is nonzero, the response includes the requested peer identifier and
      status word; the data field contains a list of peer variables and
      values as described above. If the Association ID is zero, the
      data field contains a list of system variables. If a peer has
      been selected as the synchronization source, the response includes the
      peer identifier and status word; otherwise, the response includes the
      system identifier (0) and status word.</dd>
        <dt pn="section-4-5.5">Write Variables (3):</dt>
        <dd pn="section-4-5.6">The command data field contains a list of
      assignments as described above. The variables are updated as indicated.
      The response is as described for the Read Variables command.</dd>
        <dt pn="section-4-5.7">Read Clock Variables (4):</dt>
        <dd pn="section-4-5.8">The command data field is empty or contains
      a list of identifiers separated by commas. The Association ID
      selects the system clock variables or peer clock variables in the same
      way as in the Read Variables command. The response includes the
      requested clock identifier and status word; the data field contains a
      list of clock variables and values, including the last timecode message
      received from the clock.</dd>
        <dt pn="section-4-5.9">Write Clock Variables (5):</dt>
        <dd pn="section-4-5.10">The command data field contains a list of
      assignments as described above. The clock variables are updated as
      indicated. The response is as described for the read clock variables
      command.</dd>
        <dt pn="section-4-5.11">Set Trap Address/Port (6):</dt>
        <dd pn="section-4-5.12">The command Association ID, status,
      and data fields are ignored. The address and port number for subsequent
      trap messages are taken from the source address and port of the control
      message itself. The initial trap counter for trap response messages is
      taken from the sequence field of the command. The response association
      identifier, status, and data fields are not significant. Implementations
      should include logical timeouts that prevent trap transmissions if the
      monitoring program does not renew this information after a lengthy
      interval.</dd>
        <dt pn="section-4-5.13">Trap Response (7):</dt>
        <dd pn="section-4-5.14">This message is sent when a system, peer, or clock
      exception event occurs. The opcode field is 7 and the R bit is set. The
      trap counter is incremented by one for each trap sent and the sequence
      field set to that value. The trap message is sent using the IP address
      and port fields established by the set trap address/port command. If a
      system trap, the Association ID field is set to zero and the
      status field contains the system status word. If a peer trap, the
      Association ID field is set to that peer and the status field
      contains the peer status word. Optional ASCII-coded information can be
      included in the data field.</dd>
        <dt pn="section-4-5.15">Configure (8):</dt>
        <dd pn="section-4-5.16">The command data is parsed and applied as if supplied
	      in the daemon configuration file.</dd>
        <dt pn="section-4-5.17">Save Configuration (9):</dt>
        <dd pn="section-4-5.18">Writes a snapshot of the current configuration
      to the file name supplied as the command data.
      Further, the command is refused unless a directory in which to store
      the resulting files has been explicitly configured by the operator.</dd>
        <dt pn="section-4-5.19">Read Most Recently Used (MRU) list (10):</dt>
        <dd pn="section-4-5.20">Retrieves records
      of recently seen remote addresses and associated statistics.  This
      command supports all of the state variables defined in <xref target="RFC5905" sectionFormat="of" section="9" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5905#section-9" derivedContent="RFC5905"/>.  Command data
      consists of name=value pairs controlling the selection of records, as
      well as a requestor-specific nonce previously retrieved using this
      command or opcode 12 (Request Nonce).  The response consists of
      name=value pairs where some names can appear multiple times using a dot
      followed by a zero-based index to distinguish them and to associate
      elements of the same record with the same index.  A new nonce is
      provided with each successful response.</dd>
        <dt pn="section-4-5.21">Read ordered list (11):</dt>
        <dd pn="section-4-5.22">Retrieves a list ordered by IP address
      (IPv4 information precedes IPv6 information).  If the command
      data is empty or is the seven characters "ifstats", the associated
      statistics, status, and counters for each local address are returned.
      If the command data is the characters "addr_restrictions", then the
      set of IPv4 remote address restrictions followed by the set of IPv6
      remote address restrictions (access control lists) are returned.
      Other command data returns error code 5 (unknown variable name).
      Similar to Read MRU, response information uses zero-based indexes as
      part of the variable name preceding the equals sign and value, where
      each index relates information for a single address or network.  This
      opcode requires authentication.</dd>
        <dt pn="section-4-5.23">Request Nonce (12):</dt>
        <dd pn="section-4-5.24">Retrieves a 96-bit nonce specific to the
      requesting remote address, which is valid for a limited period.
      Command data is not used in the request.  The nonce consists of a
      64-bit NTP timestamp and 32 bits of hash derived from that timestamp,
      the remote address, and salt known only to the server, which varies
      between daemon runs. Inclusion of the
      nonce by a management agent demonstrates to the server that the agent
      can receive datagrams sent to the source address of the request,
      making source address "spoofing" more difficult in a similar way as
      TCP's three-way handshake.</dd>
        <dt pn="section-4-5.25">Unset Trap (31):</dt>
        <dd pn="section-4-5.26">Removes the requesting remote address and port from
      the list of trap receivers.  Command data is not used in the request.
      If the address and port are not in the list of trap receivers, the
      error code is 4 (bad association).</dd>
      </dl>
    </section>
    <section anchor="IANA" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-5-1">This document has no IANA actions.</t>
    </section>
    <section anchor="Security" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-6-1">A number of security vulnerabilities have been identified with
      these control messages.</t>
      <t indent="0" pn="section-6-2">NTP's control query interface allows reading and writing of system,
      peer, and clock variables remotely from arbitrary IP addresses using
      commands mentioned in <xref target="commands" format="default" sectionFormat="of" derivedContent="Section 4"/>.  Overwriting these
      variables, but not reading them, requires authentication by default.
      However, this document argues that an NTP host must authenticate all
      control queries and not just ones that overwrite these variables.
      Alternatively, the host can use an access control list to explicitly list IP
      addresses that are allowed to control query the clients. These access
      controls are required for the following reasons:</t>
      <dl newline="true" spacing="normal" indent="3" pn="section-6-3">
        <dt pn="section-6-3.1">NTP as a Distributed Denial-of-Service (DDoS) vector:</dt>
        <dd pn="section-6-3.2">NTP timing query
         and response packets (modes 1-2, 3-4, and 5) are usually short in size. However,
         some NTP control queries generate a very long packet in response to a
         short query. As such, there is a history of use of NTP's control queries,
         which exhibit such behavior, to perform DoS attacks. These off-path attacks
         exploit the large size of NTP control queries to cause UDP-based
         amplification attacks (e.g., mode 7 monlist command generates a very long
         packet in response to a small query <xref target="CVE-DOS" format="default" sectionFormat="of" derivedContent="CVE-DOS"/>). These attacks only
         use NTP as a vector for DoS attacks on other protocols, but do not affect
         the time service on the NTP host itself. To limit the sources of these
         malicious commands, NTP server operators are recommended to deploy ingress
         filtering <xref target="RFC3704" format="default" sectionFormat="of" derivedContent="RFC3704"/>.</dd>
        <dt pn="section-6-3.3">Time-shifting attacks through information leakage/overwriting:</dt>
        <dd pn="section-6-3.4">NTP hosts
         save important system and peer state variables. An off-path attacker who can
         read these variables remotely can leverage the information leaked by these
         control queries to perform time-shifting and DDoS attacks on NTP clients. These
         attacks do affect time synchronization on the NTP hosts.  For instance:</dd>
      </dl>
      <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-6-4">
        <li pn="section-6-4.1">In the client/server mode, the client stores its local time when it sends the
            query to the server in its xmt peer variable. This variable is used to perform
            TEST2 to non-cryptographically authenticate the server (i.e., if the origin
            timestamp field in the corresponding server response packet matches the xmt peer
            variable, then the client accepts the packet). An off-path attacker with the ability
            to read this variable can easily spoof server response packets for the client, which
            will pass TEST2 and can deny service or shift time on the NTP client. The specific
            attack is described in <xref target="CVE-SPOOF" format="default" sectionFormat="of" derivedContent="CVE-SPOOF"/>.</li>
        <li pn="section-6-4.2">The client also stores its local time when the server response is received in its
            rec peer variable. This variable is used for authentication in interleaved-pivot mode.
            An off-path attacker with the ability to read this state variable can easily shift time
            on the client by passing this test. This attack is described in <xref target="CVE-SHIFT" format="default" sectionFormat="of" derivedContent="CVE-SHIFT"/>.</li>
      </ul>
      <dl newline="true" spacing="normal" indent="3" pn="section-6-5">
        <dt pn="section-6-5.1">Fast-Scanning:</dt>
        <dd pn="section-6-5.2">NTP mode 6 control messages are usually small UDP packets. Fast-scanning
         tools like ZMap can be used to spray the entire (potentially reachable) Internet with these
         messages within hours to identify vulnerable hosts. To make things worse, these attacks can
         be extremely low-rate, only requiring a control query for reconnaissance and a spoofed
         response to shift time on vulnerable clients.</dd>
        <dt pn="section-6-5.3">The mode 6 and 7 messages are vulnerable to replay attacks <xref target="CVE-Replay" format="default" sectionFormat="of" derivedContent="CVE-Replay"/>:</dt>
        <dd pn="section-6-5.4">
         If an attacker observes mode 6/7 packets that modify the configuration of the server in any
         way, the attacker can apply the same change at any time later by simply sending the packets
         to the server again. The use of the nonce (Request Nonce command) provides limited protection
         against replay attacks.</dd>
      </dl>
      <t indent="0" pn="section-6-6">NTP best practices recommend configuring NTP with the no-query parameter. The no-query
      parameter blocks access to all remote control queries. However, sometimes the hosts do not
      want to block all queries and want to give access for certain control queries remotely. This
      could be for the purpose of remote management and configuration of the hosts in certain
      scenarios. Such hosts tend to use firewalls or other middleboxes to blacklist certain queries
      within the network.</t>
      <t indent="0" pn="section-6-7">Significantly fewer hosts respond to mode 7
      monlist queries as compared to other control queries because it is a well-known and exploited
      control query. These queries are likely blocked using blacklists on firewalls and middleboxes
      rather than the no-query option on NTP hosts. The remaining control queries that can be
      exploited likely remain out of the blacklist because they are undocumented in the current
      NTP specification <xref target="RFC5905" format="default" sectionFormat="of" derivedContent="RFC5905"/>.</t>
      <t indent="0" pn="section-6-8">This document describes all of the mode 6 control queries allowed by NTP and can help
      administrators make informed decisions on security measures to protect NTP devices from
      harmful queries and likely make those systems less vulnerable. The use of the legacy mode 6
      interface is <bcp14>NOT RECOMMENDED</bcp14>.  Regardless of which mode
      6 commands an administrator may elect to allow, remote access to this facility needs to be
      protected from unauthorized access (e.g., strict Access Control Lists (ACLs)). Additionally, the legacy interface
      for mode 6 commands <bcp14>SHOULD NOT</bcp14> be utilized in new deployments or implementation of NTP.</t>
    </section>
  </middle>
  <back>
    <references pn="section-7">
      <name slugifiedName="name-references">References</name>
      <references pn="section-7.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC1305" target="https://www.rfc-editor.org/info/rfc1305" quoteTitle="true" derivedAnchor="RFC1305">
          <front>
            <title>Network Time Protocol (Version 3) Specification, Implementation and Analysis</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <date month="March" year="1992"/>
            <abstract>
              <t indent="0">This document describes the Network Time Protocol (NTP), specifies its formal structure and summarizes information useful for its implementation. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1305"/>
          <seriesInfo name="DOI" value="10.17487/RFC1305"/>
          <format target="https://www.rfc-editor.org/info/rfc1305" type="TXT"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
          <format target="https://www.rfc-editor.org/info/rfc2119" type="TXT"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" quoteTitle="true" derivedAnchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t indent="0">BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network.  As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment.  There are cases when this may create problems, e.g., with multihoming.  This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular.  This memo updates RFC 2827.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
          <format target="https://www.rfc-editor.org/info/rfc3704" type="TXT"/>
        </reference>
        <reference anchor="RFC5905" target="https://www.rfc-editor.org/info/rfc5905" quoteTitle="true" derivedAnchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author fullname="D. Mills" initials="D." surname="Mills"/>
            <author fullname="J. Martin" initials="J." role="editor" surname="Martin"/>
            <author fullname="J. Burbank" initials="J." surname="Burbank"/>
            <author fullname="W. Kasch" initials="W." surname="Kasch"/>
            <date month="June" year="2010"/>
            <abstract>
              <t indent="0">The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet.  This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol.  NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family.  NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs.  It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required.  It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
          <format target="https://www.rfc-editor.org/info/rfc5905" type="TXT"/>
        </reference>
        <reference anchor="RFC5952" target="https://www.rfc-editor.org/info/rfc5952" quoteTitle="true" derivedAnchor="RFC5952">
          <front>
            <title>A Recommendation for IPv6 Address Text Representation</title>
            <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
            <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
            <date month="August" year="2010"/>
            <abstract>
              <t indent="0">As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text.  While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users.  This document defines a canonical textual representation format.  It does not define a format for internal storage, such as within an application or database.  It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5952"/>
          <seriesInfo name="DOI" value="10.17487/RFC5952"/>
          <format target="https://www.rfc-editor.org/info/rfc5952" type="TXT"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
          <format target="https://www.rfc-editor.org/info/rfc8174" type="TXT"/>
        </reference>
      </references>
      <references pn="section-7.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="CVE-DOS" target="https://nvd.nist.gov/vuln/detail/CVE-2013-5211" quoteTitle="true" derivedAnchor="CVE-DOS">
          <front>
            <title>CVE-2013-5211 Detail</title>
            <author>
              <organization showOnFrontPage="true">NIST National Vulnerability Database</organization>
            </author>
            <date month="January" year="2014" day="02"/>
          </front>
        </reference>
        <reference anchor="CVE-Replay" target="https://nvd.nist.gov/vuln/detail/CVE-2015-8140" quoteTitle="true" derivedAnchor="CVE-Replay">
          <front>
            <title>CVE-2015-8140 Detail</title>
            <author>
              <organization showOnFrontPage="true">NIST National Vulnerability Database</organization>
            </author>
            <date month="January" year="2015" day="30"/>
          </front>
        </reference>
        <reference anchor="CVE-SHIFT" target="https://nvd.nist.gov/vuln/detail/CVE-2016-1548" quoteTitle="true" derivedAnchor="CVE-SHIFT">
          <front>
            <title>CVE-2016-1548 Detail</title>
            <author>
              <organization showOnFrontPage="true">NIST National Vulnerability Database</organization>
            </author>
            <date month="January" year="2017" day="06"/>
          </front>
        </reference>
        <reference anchor="CVE-SPOOF" target="https://nvd.nist.gov/vuln/detail/CVE-2015-8139" quoteTitle="true" derivedAnchor="CVE-SPOOF">
          <front>
            <title>CVE-2015-8139 Detail</title>
            <author>
              <organization showOnFrontPage="true">NIST National Vulnerability Database</organization>
            </author>
            <date month="January" year="2017" day="30"/>
          </front>
        </reference>
        <reference anchor="RFC0791" target="https://www.rfc-editor.org/info/rfc791" quoteTitle="true" derivedAnchor="RFC0791">
          <front>
            <title>Internet Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="791"/>
          <seriesInfo name="DOI" value="10.17487/RFC0791"/>
          <format target="https://www.rfc-editor.org/info/rfc791" type="TXT"/>
        </reference>
        <reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200" quoteTitle="true" derivedAnchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t indent="0">This document specifies version 6 of the Internet Protocol (IPv6).  It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
          <format target="https://www.rfc-editor.org/info/rfc8200" type="TXT"/>
        </reference>
      </references>
    </references>
    <section anchor="mode7" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-ntp-remote-facility-message">NTP Remote Facility Message Format</name>
      <t indent="0" pn="section-appendix.a-1">The format of the NTP Remote Facility Message header, which immediately
      follows the UDP header, is shown in <xref target="M7Hdr" format="default" sectionFormat="of" derivedContent="Figure 3"/>. A description
      of its fields follows <xref target="M7Hdr" format="default" sectionFormat="of" derivedContent="Figure 3"/>. Bit positions marked as zero are reserved and should
      always be transmitted as zero.</t>
      <figure anchor="M7Hdr" align="left" suppress-title="false" pn="figure-3">
        <name slugifiedName="name-ntp-remote-facility-message-">NTP Remote Facility Message Header</name>
        <artwork align="center" name="" type="" alt="" pn="section-appendix.a-2.1">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|R|M| VN  |Mode |A|  Sequence   | Implementation|   Req Code    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Err  |        Count          |  MBZ  |       Size            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
/                    Data (up to 500 bytes)                     /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Encryption KeyID (when A bit set)              |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
/          Message Authentication Code (when A bit set)         /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</artwork>
      </figure>
      <dl newline="true" spacing="normal" indent="3" pn="section-appendix.a-3">
        <dt pn="section-appendix.a-3.1">Response Bit (R):</dt>
        <dd pn="section-appendix.a-3.2">Set to 0 if the packet is a request. Set to 1 if the
    packet is a response.</dd>
        <dt pn="section-appendix.a-3.3">More Bit (M):</dt>
        <dd pn="section-appendix.a-3.4">Set to 0 if this is the last packet in a response; otherwise,
    set to 1 in responses requiring more than one packet.</dd>
        <dt pn="section-appendix.a-3.5">Version Number (VN):</dt>
        <dd pn="section-appendix.a-3.6">Set to the version number of the NTP daemon.</dd>
        <dt pn="section-appendix.a-3.7">Mode:</dt>
        <dd pn="section-appendix.a-3.8">Set to 7 for Remote Facility messages.</dd>
        <dt pn="section-appendix.a-3.9">Authenticated Bit (A):</dt>
        <dd pn="section-appendix.a-3.10">If set to 1, this packet contains
      authentication information.</dd>
        <dt pn="section-appendix.a-3.11">Sequence:</dt>
        <dd pn="section-appendix.a-3.12">For a multi-packet response, this field contains the
      sequence number of this packet. Packets in a multi-packet response are
      numbered starting with 0. The More Bit is set to 1 for all packets but
      the last.</dd>
        <dt pn="section-appendix.a-3.13">Implementation:</dt>
        <dd pn="section-appendix.a-3.14">The version number of the implementation
      that defined the request code used in this message. An implementation
      number of 0 is used for a request code supported by all versions of the
      NTP daemon. The value 255 is reserved for future extensions.</dd>
        <dt pn="section-appendix.a-3.15">Request Code (Req Code):</dt>
        <dd pn="section-appendix.a-3.16">An implementation-specific code
      that specifies the operation being requested. A request code definition
      includes the format and semantics of the data included in the
      packet.</dd>
        <dt pn="section-appendix.a-3.17">Error (Err):</dt>
        <dd pn="section-appendix.a-3.18">
          <t indent="0" pn="section-appendix.a-3.18.1">Set to 0 for a request. For a response, this field
      contains an error code relating to the request. If the Error is
      nonzero, the operation requested wasn't performed.</t>
          <dl newline="false" spacing="normal" indent="3" pn="section-appendix.a-3.18.2">
            <dt pn="section-appendix.a-3.18.2.1">0:</dt>
            <dd pn="section-appendix.a-3.18.2.2">no error</dd>
            <dt pn="section-appendix.a-3.18.2.3">1:</dt>
            <dd pn="section-appendix.a-3.18.2.4">incompatible implementation number</dd>
            <dt pn="section-appendix.a-3.18.2.5">2:</dt>
            <dd pn="section-appendix.a-3.18.2.6">unimplemented request code</dd>
            <dt pn="section-appendix.a-3.18.2.7">3:</dt>
            <dd pn="section-appendix.a-3.18.2.8">format error</dd>
            <dt pn="section-appendix.a-3.18.2.9">4:</dt>
            <dd pn="section-appendix.a-3.18.2.10">no data available</dd>
            <dt pn="section-appendix.a-3.18.2.11">7:</dt>
            <dd pn="section-appendix.a-3.18.2.12">authentication failure</dd>
          </dl>
        </dd>
      </dl>
      <dl newline="true" spacing="normal" indent="3" pn="section-appendix.a-4">
        <dt pn="section-appendix.a-4.1">Count:</dt>
        <dd pn="section-appendix.a-4.2">The number of data items in the packet. Range is 0 to
      500.</dd>
        <dt pn="section-appendix.a-4.3">Must Be Zero (MBZ):</dt>
        <dd pn="section-appendix.a-4.4">A reserved field set to 0 in requests and responses.</dd>
        <dt pn="section-appendix.a-4.5">Size:</dt>
        <dd pn="section-appendix.a-4.6">The size of each data item in the packet. Range is 0 to 500.</dd>
        <dt pn="section-appendix.a-4.7">Data:</dt>
        <dd pn="section-appendix.a-4.8">A variable-sized field containing request/response data. For requests and
    responses, the size in octets must be greater than or equal to the product of the number
    of data items (Count) and the size of a data item (Size). For requests, the data area
    is exactly 40 octets in length. For responses, the data area will range from 0 to 500
    octets, inclusive.</dd>
        <dt pn="section-appendix.a-4.9">Encryption KeyID:</dt>
        <dd pn="section-appendix.a-4.10">A 32-bit unsigned integer used to designate the key used for the
    Message Authentication Code. This field is included only when the A bit is set to 1.</dd>
        <dt pn="section-appendix.a-4.11">Message Authentication Code:</dt>
        <dd pn="section-appendix.a-4.12">An optional Message Authentication Code defined by the
    version of the NTP daemon indicated in the Implementation field. This field is included
    only when the A bit is set to 1.</dd>
      </dl>
    </section>
    <section anchor="Acknowledgements" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.b">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.b-1"><contact fullname="Tim Plunkett"/> created the original version of
      this document. <contact fullname="Aanchal Malhotra"/> provided the initial version of the
      Security Considerations section.</t>
      <t indent="0" pn="section-appendix.b-2"><contact fullname="Karen O'Donoghue"/>, <contact fullname="David       Hart"/>, <contact fullname="Harlan Stenn"/>, and <contact fullname="Philip Chimento"/> deserve credit for portions of this
      document due to their earlier efforts to document these commands.</t>
      <t indent="0" pn="section-appendix.b-3"><contact fullname="Miroshav Lichvar"/>, <contact fullname="Ulrich       Windl"/>, <contact fullname="Dieter Sibold"/>, <contact fullname="J       Ignacio Alvarez-Hamelin"/>, and <contact fullname="Alex Campbell"/>
      provided valuable comments on various draft versions of this document.</t>
    </section>
    <section numbered="false" toc="include" removeInRFC="false" pn="section-appendix.c">
      <name slugifiedName="name-contributors">Contributors</name>
      <t indent="0" pn="section-appendix.c-1">Dr. <contact fullname="David Mills"/> specified the vast majority of
      the mode 6 commands during the development of <xref target="RFC1305" format="default" sectionFormat="of" derivedContent="RFC1305"/> and deserves the credit for their
      existence and use.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.d">
      <name slugifiedName="name-authors-address">Author's Address</name>
      <author fullname="Brian Haberman" initials="B." surname="Haberman" role="editor">
        <organization showOnFrontPage="true">JHU</organization>
        <address>
          <email>brian@innovationslab.net</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
