<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-idr-flowspec-sav-01" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.4 -->
  <front>
    <title abbrev="BGP FlowSpec for SAV">BGP Flow Specification for Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-idr-flowspec-sav-01"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="February" day="17"/>
    <area>Routing</area>
    <workgroup>IDR</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 57?>

<t>BGP FlowSpec reuses BGP route to distribute infrastructure and propogates traffic flow information with filtering actions. 
This document specifies a new BGP extended community named Source Address Validation (SAV) Interface-set to disseminate SAV rules through BGP FlowSpec.</t>
    </abstract>
  </front>
  <middle>
    <?line 62?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is an efficient method for preventing source address spoofing-based attacks. SAV rules indicate the valid/invalid incoming interfaces of a specific source IP address or source IP prefix. The rules can be deployed on edge routers, border routers, or aggregation routers for checking the validity of intra-domain and inter-domain packets. For invalid packets, filtering actions can be taken such as block, rate-limit, and redirect. There are many mechanisms that can generate SAV rules on routers (<xref target="RFC2827"/>, <xref target="RFC3704"/>, <xref target="RFC5210"/>, <xref target="RFC8704"/>, and <xref target="manrs-antispoofing"/>). However, the challenges of accurate validation and operation exist in asymetric routing scenarios or dynamic networks <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/><xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. To facilitate SAV management, additional SAV rule dissemination is needed <xref target="I-D.li-savnet-intra-domain-architecture"/><xref target="I-D.wu-savnet-inter-domain-architecture"/>.</t>
      <t>BGP FlowSpec is a convenient and flexible tool for traffic filtering/controling (<xref target="RFC8955"/>, <xref target="RFC8956"/>). It propogates traffic flow information for different traffic control purposes through the BGP protocol extension. Existing BGP FlowSpec design has supported source prefix matching and various traffic filtering actions but does not support binding valid/invalid incoming interfaces to source prefixes. With a minor extension, BGP FlowSpec can be used for SAV rule dissemination.</t>
      <t>This document specifies a new BGP extended community named SAV Interface-set extended community. SAV rules can be disseminated through BGP FlowSpec by combining the new extended community with source prefix component and filtering actions of existing BGP FlowSpec. The new extension can be used to configure SAV rules on remote routers. It can also act as a supplement of existing SAV mechanisms and help improve SAV accuracy.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV: Source address validation</t>
        <t>SAV Rule: The rule that indicates the valid/invalid incoming interfaces of a specific source IP address or source IP prefix.</t>
        <t>AS: Autonomous System</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="flow-specifications-for-sav">
      <name>Flow Specifications for SAV</name>
      <section anchor="sav-rules">
        <name>SAV Rules</name>
        <t>SAV rules can be used for checking the validity of source addresses of incoming packets. A rule usually has a format of &lt;source prefix, interface set, validity indicator&gt;. source prefix is for matching specific packets. Interface set represents a set of physical interfaces from which the packets arrive. Validity indicator indicates whether the packets matching the source prefix and arrival interface are valid or invalid. So, validity indicator has a value of either valid or invalid. For example, the rule &lt;P1, [intf1, intf2], valid&gt; means the source prefix P1 must arrive the router at interface Intf1 or Intf2, otherwise, P1 is invalid. For invalid source prefixes, the filtering actions, such as block, rate-limit, and redirect, can be taken on the packets <xref target="I-D.huang-savnet-sav-table"/>.</t>
        <t>In real networks, the interface set in SAV rules usually can be grouped. For example, the interfaces can be grouped as:</t>
        <ul spacing="normal">
          <li>
            <t>Subnet interface set that contains the interfaces connecting a target subnet.</t>
          </li>
          <li>
            <t>All customer AS interfaces set or the customer AS interfaces set of a customer AS.</t>
          </li>
          <li>
            <t>All lateral peer AS interfaces set or the lateral peer AS interfaces set of a lateral peer AS.</t>
          </li>
          <li>
            <t>All transit provider AS interfaces set or the transit provider AS interfaces set of a transit provider AS.</t>
          </li>
        </ul>
        <t>These interface set can be indentified by a group id for easy management.</t>
      </section>
      <section anchor="bgp-flowspec-for-sav">
        <name>BGP FlowSpec for SAV</name>
        <t>SAV can be disseminated to Edge/Border/Aggragation routers through BGP FlowSpec, as shown in the figure below. The controller is used to set up BGP connection with the routers in a SAV-deployed AS or domain. Note that, SAV rules disseminated by BGP FlowSpec can take effect alone or acts as a management tool of other SAV mechanisms (e.g., <xref target="RFC8704"/>).</t>
        <artwork><![CDATA[
                      +------------+
                      | Controller |
                      +------------+
                        /   |    \
                       / FS | FS  \ FS
                      /     |      \
+-------------+      +--------------+      +---------+
| Provider or |      | SAV-deployed |      |         |
| Customer or |------# AS/Domain    #------| Subnets |
| Peer AS     |      |              |      |         |
+-------------+      +--------------+      +---------+
]]></artwork>
      </section>
    </section>
    <section anchor="extended-community-for-sav">
      <name>Extended Community for SAV</name>
      <t>Existing BGP FlowSpec supports the component for matching source prefix and various filtering actions. This document will define a new extended community called SAV Interface-set extended community, whose design follows <xref target="I-D.ietf-idr-flowspec-interfaceset"/>. SAV rules can be disseminated through BGP FlowSpec by combining the new extended community with source prefix component and filtering actions of existing BGP FlowSpec (<xref target="RFC8955"/>, <xref target="RFC8956"/>).</t>
      <section anchor="sav-interface-set-extended-community">
        <name>SAV Interface-set Extended Community</name>
        <t>The newly defined SAV Interface-set extended community is encoded as follows:</t>
        <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |    SubType    |           AS Number           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       AS Number (cont.)       |U|V|     Group Identifier      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The meaning of fields:</t>
        <ul spacing="normal">
          <li>
            <t>Type (1 octect): 0x07 or 0x47. The value of 0x07 is for FlowSpec Transitive Extended Communities, and 0x47 represents FlowSpec Non-Transitive Extended Communities. The two values have been allocated by IANA <xref target="I-D.ietf-idr-flowspec-interfaceset"/>.</t>
          </li>
          <li>
            <t>SubType (1 octect): TBD. SubType field indicates SAV Interface-set extended community.</t>
          </li>
          <li>
            <t>AS Number (4 octects): Four-octect AS number. This field indicates the target AS where the SAV rule takes effect.</t>
          </li>
          <li>
            <t>Group Identifier (14 bits): A 14-bit number with the value ranging within 0..16383. Group identifier is a local property and identifies a set of interfaces for the source prefix carried in NLRI. The meaning of a group identifier depends on the configuration of network administrator. An interface is usually associated with one group identifiers.</t>
          </li>
          <li>
            <t>Flag V (1 bit): 1 means the identified interface set is valid for the source prefix, while 0 means the interface set is invalid for the source prefix.</t>
          </li>
          <li>
            <t>Flag U (1 bit): 1 means the rest of interfaces (not included in the interface set) on the local router are unknown for the source prefix. 0 means the rest of interfaces on the local router are invalid (when V=1) or valid (when V=0) for the source prefix.</t>
          </li>
        </ul>
        <t>In a BGP update, there may be more than one instances of SAV Interface-set extended community. The final interface set for the corresponding source prefix <bcp14>MUST</bcp14> be the union of these instances.</t>
        <t>Multiple source prefixes can be put in multiple BGP FlowSpec NLRIs of one BGP update. In such case, these source prefixes <bcp14>MUST</bcp14> share the same SAV Interface-set extended communities.</t>
      </section>
      <section anchor="examples">
        <name>Examples</name>
        <t>Example 1: Configure soucre prefix P1 as valid at AS1's interfaces (Group Identifier=ID1) connecting a multi-homed subnet.</t>
        <t>Encoding description: NLRI carries source prefix P1 following existing BGP FlowSpec. The SAV Interface-set community with Type=0x07 and subType=TBD carries ID1 with AS number=AS1, flag V=1, and U=1.</t>
        <t>Example 2: Block soucre prefix P2 at AS2's interfaces (Group Identifier=ID2) connecting to transit providers.</t>
        <t>Encoding description: NLRI carries source prefix P2 and BGP extended community carries the drop action (e.g., set traffic-rate-bytes to zero). The SAV Interface-set community with Type=0x07 and subType=TBD carries ID2 with AS number=AS2, flag V=0 and U=1.</t>
      </section>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document requests a new subtype (suggested value 0x03) within the FlowSpec Transitive Extended Communities (0x07) and FlowSpec Non-Transitive Extended Communities (0x47). This sub-type shall be named "SAV Interface-set", with a reference to this document.</t>
      <artwork><![CDATA[
+=======+======================+===============+
| Value | Name                 | Reference     |
+=======+======================+===============+
| TBD   | SAV Interface-set    | This document |
+-------+----------------------+---------------+
]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>No new security issues are introduced.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the comments from Shunwan Zhuang.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-idr-flowspec-interfaceset" target="https://datatracker.ietf.org/doc/html/draft-ietf-idr-flowspec-interfaceset-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-idr-flowspec-interfaceset.xml">
          <front>
            <title>Applying BGP flowspec rules on a specific interface set</title>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Individual</organization>
            </author>
            <author fullname="Adam Simpson" initials="A." surname="Simpson">
              <organization>Nokia</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus, Inc</organization>
            </author>
            <author fullname="Jeffrey Haas" initials="J." surname="Haas">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Lucy Yong" initials="L." surname="Yong">
              <organization>Huawei</organization>
            </author>
            <date day="18" month="November" year="2019"/>
            <abstract>
              <t>The BGP Flow Specification (flowspec) Network Layer Reachability Information (BGP NLRI) extension (draft-ietf-idr-rfc5575bis) is used to distribute traffic flow specifications into BGP. The primary application of this extension is the distribution of traffic filtering policies for the mitigation of distributed denial of service (DDoS) attacks. By default, flow specification filters are applied on all forwarding interfaces that are enabled for use by the BGP flowspec extension. A network operator may wish to apply a given filter selectively to a subset of interfaces based on an internal classification scheme. Examples of this include "all customer interfaces", "all peer interfaces", "all transit interfaces", etc. This document defines BGP Extended Communities (RFC4360) that allow such filters to be selectively applied to sets of forwarding interfaces sharing a common group identifier. The BGP Extended Communities carrying this group identifier are referred to as the BGP Flowspec "interface-set" Extended Communities.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-flowspec-interfaceset-05"/>
        </reference>
        <reference anchor="RFC8955" target="https://www.rfc-editor.org/info/rfc8955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8955.xml">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8956" target="https://www.rfc-editor.org/info/rfc8956" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8956.xml">
          <front>
            <title>Dissemination of Flow Specification Rules for IPv6</title>
            <author fullname="C. Loibl" initials="C." role="editor" surname="Loibl"/>
            <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>"Dissemination of Flow Specification Rules" (RFC 8955) provides a Border Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.</t>
              <t>This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8956"/>
          <seriesInfo name="DOI" value="10.17487/RFC8956"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-problem-statement-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="13" month="February" year="2024"/>
            <abstract>
              <t>This document provides the gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-03"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="22" month="August" year="2023"/>
            <abstract>
              <t>This document provides the gap analysis of existing inter-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-02"/>
        </reference>
        <reference anchor="I-D.li-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-intra-domain-architecture-06" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Fang Gao" initials="F." surname="Gao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="21" month="January" year="2024"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL rules that require manual efforts to accommodate to network dynamics, SAVNET routers learn the SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-06"/>
        </reference>
        <reference anchor="I-D.wu-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-wu-savnet-inter-domain-architecture-06" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.wu-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <date day="5" month="February" year="2024"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can rely on general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. It also defines the architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-06"/>
        </reference>
        <reference anchor="I-D.huang-savnet-sav-table" target="https://datatracker.ietf.org/doc/html/draft-huang-savnet-sav-table-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.huang-savnet-sav-table.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <date day="5" month="November" year="2023"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilitiies from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-03"/>
        </reference>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
      </references>
    </references>
    <?line 210?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
