<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-inter-domain-problem-statement-12" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Inter-domain SAVNET Problem Statement">Gap Analysis, Problem Statement, and Requirements for Inter-Domain SAV</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-12"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="K." surname="Sriram" fullname="Kotikalapudi Sriram">
      <organization abbrev="USA NIST">USA National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <city>Gaithersburg</city>
          <region>MD</region>
          <country>United States of America</country>
        </postal>
        <email>sriram.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 95?>

<t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 99?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Source address validation (SAV) is crucial for protecting networks from source address (SA) spoofing attacks <xref target="RFC2827"/> <xref target="RFC3704"/> <xref target="RFC8704"/>. The MANRS initiative advocates deploying SAV as close to the source as possible <xref target="manrs"/>, and access networks are the first line of defense against source address spoofing. However, access networks face various challenges in deploying SAV mechanisms due to different network environments, router vendors, and operational preferences. Hence, SAV may not be deployed ubiquitously in access networks. In addition, SA spoofing may also originate in ISP networks at higher levels of hierarchy in the Internet. So, deployment of SAV mechanisms in the edge routers of enterprises as well as the ISP networks (at different hierarchichal levels or tiers) is needed to prevent source address spoofing along the data forwarding paths. <xref target="RFC5210"/> highlights the importance of SAV at various network locations: access, intra-domain (intra-AS), and inter-domain (inter-AS). This document focuses on providing gap analysis and describing the problem space of existing inter-domain SAV solutions, and defining the requirements for a new solution of these problems. Access Control List (ACL) and unicast Reverse Path Forwarding (uRPF) techniques are currently utilized for inter-domain SAV <xref target="RFC3704"/> <xref target="RFC8704"/>. Here only existing IETF RFCs are considered as the state of the art (BCP 38 <xref target="RFC2827"/> and BCP 84 <xref target="RFC3704"/> <xref target="RFC8704"/>); IETF works-in-progress are not included in that.</t>
      <t>The terms customer, provider (transit provider), and lateral peer (non-transit peer; peer (for simplicity)) used in this document are consistent with those defined in <xref target="RFC7908"/> <xref target="RFC9234"/>. Further, <xref target="RFC9234"/> mentions Route Server (RS) and RS-client. An RS-to-RS-client interface is akin to a customer interface, and an RS-client-to-RS interface is akin to a provider interface for the purposes of SAV.</t>
      <t>There are several existing mechanisms for inter-domain SAV. This document analyzes them and attempts to answer: i) what are the technical gaps (<xref target="gap"/>), ii) what are the fundamental problems (<xref target="problem"/>), and iii) what are the practical requirements for the solution of these problems (<xref target="req"/>).</t>
      <t>The following summarizes the fundamental problems with existing SAV mechanisms, as analyzed in <xref target="gap"/> and <xref target="problem"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Improper block: Existing uRPF-based mechanisms suffer from improper block (false positives) in two inter-domain scenarios: limited propagation of prefixes and hidden prefixes.</t>
        </li>
        <li>
          <t>Improper permit: With some existing uRPF-based SAV mechanisms, improper permit (false negatives) can happen on any type interface (customer, lateral peer, or provider). Specifically, if the method relaxes the directionality constraint <xref target="RFC3704"/> <xref target="RFC8704"/>} to try to achieve zero improper blocking, the possibility of improper permit increases. (Note: It is recognized that unless there is full adoption of SAV in the customer cone (CC) of the interface in consideration, improper permit is not fully prevented in scenarios where source address spoofing occurs from within the CC, i.e., a prefix at one Autonomous System (AS) in the CC is spoofed from another AS in the CC.)</t>
        </li>
        <li>
          <t>High operational overhead: ACL-based ingress SAV filtering introduces significant operational overhead, as it needs to update ACL rules manually to adapt to prefix or routing changes in a timely manner.</t>
        </li>
      </ul>
      <t>To address these problems, in <xref target="req"/>, this document outlines the following technical requirements for a new solution:</t>
      <ul spacing="normal">
        <li>
          <t>Improved SAV accuracy over existing mechanisms: A new solution <bcp14>MUST</bcp14> avoid improper block and minimize improper permit.</t>
        </li>
        <li>
          <t>Reduced operational overhead: A new solution <bcp14>MUST</bcp14> have less operational overhead than ACL-based ingress SAV filtering.</t>
        </li>
      </ul>
      <t>In addition, this document defines three more requirements to ensure practicality:</t>
      <ul spacing="normal">
        <li>
          <t>Benefit in incremental/partial deployment: A new solution <bcp14>MUST NOT</bcp14> assume pervasive adoption including the adoption of both SAV method and SAV-related information (e.g., RPKI object registrations) and <bcp14>SHOULD</bcp14> provide benefit to early adopters in terms of effective SAV performance.</t>
        </li>
        <li>
          <t>Providing necessary security guarantee: For solutions involving communication of new SAV-specific information between ASes, there <bcp14>SHOULD</bcp14> be a security mechanism assuring trustworthiness of the information.</t>
        </li>
        <li>
          <t>Efficient convergence: A new solution <bcp14>SHOULD</bcp14> achieve efficient SAV rule (SAV table) convergence in response to prefix or route changes.</t>
        </li>
      </ul>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV Rule:</dt>
        <dd>
          <t>The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        </dd>
        <dt>Improper Block:</dt>
        <dd>
          <t>The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Improper Permit:</dt>
        <dd>
          <t>The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        </dd>
      </dl>
    </section>
    <section anchor="existing-inter-domain-sav-mechanisms">
      <name>Existing Inter-domain SAV Mechanisms</name>
      <t>Inter-domain SAV is typically performed at the AS level (on a per neighbor-AS-interface basis) and can be deployed at AS border routers (ASBRs) to prevent source address spoofing. There are various mechanisms available to implement inter-domain SAV for anti-spoofing ingress filtering <xref target="nist"/> <xref target="manrs"/> <xref target="isoc"/>, which are reviewed in this section.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering <xref target="RFC3704"/>: ACL-based ingress SAV filtering is a technique that relies on ACL rules to filter packets based on their source addresses. It can be applied at provider interfaces, lateral peer interfaces, or customer interfaces of an AS, and is recommended for deployment at provider interfaces <xref target="manrs"/>. At the provider interfaces, ACL-based ingress SAV filtering can block source prefixes that are clearly invalid in the inter-domain routing context, such as IANA special purpose or unallocated IPv4/IPv6 prefixes and the AS's internal-only prefixes. However, ACL-based ingress SAV filtering introduces significant operational overhead, as ACL rules need to be updated in a timely manner to reflect prefix or routing changes in the inter-domain routing system. It is also impractical to store a very large and dynamically varying unallocated IPv6 prefixes. At the customer interfaces, ACL-based ingress filtering is less desirable. Other techniques (as described below) are more effective for ingress SAV filtering on customer interfaces. ACL-based ingress SAV filtering has applicability for broadband cable or digital subscriber access loop (DSL) access networks where the service provider has clear knowledge of IP address prefixes it has allocated to manage those services.</t>
        </li>
        <li>
          <t>uRPF-based mechanisms: A class of SAV mechanisms are based on Unicast Reverse Path Forwarding (uRPF) <xref target="RFC3704"/>. The core idea of uRPF for SAV is to exploit the symmetry of inter-domain routing: in many cases, the best next hop for a destination is also the best previous hop for the source. In other words, if a packet arrives from a certain interface, the source address of that packet should be reachable via the same interface, according to the FIB. However, symmetry in routing does not always holds in practice, and to address cases where it does not hold, many enhancements and modes of uRPF are proposed. Different modes of uRPF have different levels of strictness and flexibility, and network operators can choose from them to suit particular network scenarios. We describe these modes as follows:
          </t>
          <ul spacing="normal">
            <li>
              <t>Strict uRPF <xref target="RFC3704"/>: Strict uRPF is the most stringent mode, and it only permits packets that have a source address that is covered by a prefix in the FIB, and that the next hop for that prefix is the same as the incoming interface. This mode is recommended for deployment at customer interfaces that directly connect to an AS with suballocated address space, as it can prevent spoofing attacks from that AS or its downstream ASes <xref target="nist"/>.</t>
            </li>
            <li>
              <t>Loose uRPF <xref target="RFC3704"/>: Loose uRPF verifies that the source address of the packet is routable in the Internet by matching it with one or more prefixes in the FIB, regardless of which interface the packet arrives at. If the source address is not routable, Loose uRPF discards the packet. Loose uRPF is typically deployed at the provider interfaces of an AS to block packets with source addresses in prefixes that are not routed in the global Internet (e.g., IANA allocated private-use addresses, multicast addresses, etc.) <xref target="nist"/>.</t>
            </li>
            <li>
              <t>Feasible Path uRPF (FP-uRPF) <xref target="RFC3704"/>: maintains a reverse path forwarding (RPF) list, which contains the prefixes and all their permissible routes including the optimal and alternative ones. It permits an incoming packet only if the packet's source address is encompassed in the prefixes of the RPF list and its incoming interface is included in the permissible routes of the corresponding prefix. FP-uRPF is recommended to be deployed at customer interfaces or lateral peer interfaces, especially those that are connected to multi-homed customer ASes <xref target="nist"/>.</t>
            </li>
            <li>
              <t>Virtual routing and forwarding (VRF) uRPF <xref target="RFC4364"/> <xref target="urpf"/> <xref target="manrs"/>: VRF uRPF uses a separate VRF table for each external BGP peer and is only a way of implementation for a SAV table.</t>
            </li>
            <li>
              <t>Enhanced Feasible Path uRPF (EFP-uRPF) <xref target="RFC8704"/>: EFP-uRPF is based on the principle that if BGP updates for multiple prefixes with the same origin AS were received on different interfaces (at border routers), then incoming data packets with source addresses in any of those prefixes should be accepted on any of those interfaces. The EFP-uRPF specification provides two alternate algorithms: Algorithm A which is stricter with a greater sense of directionality and Algorithm B which is more permissive with a lesser sense of directionality. EFP-uRPF can more effectively accommodate asymmetric routing scenarios than FP-uRPF. EFP-uRPF is a part of BCP84. EFP-uRPF can be used at customer as well as lateral peer interfaces of an AS. It is not deployed yet in the Internet.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Carrier Grade NAT (CGN): CGN is a network technology used by service providers to translate between private and public IPv4 addresses within their network. CGN enables service providers to assign private IPv4 addresses to their customer ASes instead of public, globally unique IPv4 addresses. The private side of the CGN faces the customer ASes, and when an incoming packet is received from a customer AS, CGN checks its source address. If the source address is included in the address list of the CGN's private side, CGN performs address translation. Otherwise, it forwards the packet without translation. However, since CGN cannot determine whether the source address of an incoming packet is spoofed or not, additional SAV mechanisms need to be implemented to prevent source address spoofing <xref target="manrs"/>.</t>
        </li>
      </ul>
    </section>
    <section anchor="gap">
      <name>Gap Analysis</name>
      <t>Inter-domain SAV is essential in preventing source address spoofing traffic across all AS interfaces, including those of customers, providers, and lateral peers. An ideal inter-domain SAV mechanism <bcp14>MUST</bcp14> block all spoofing traffic while permitting legitimate traffic in all scenarios. However, in some cases, existing SAV mechanisms may unintentionally block legitimate traffic or permit spoofing traffic. This section aims to conduct a gap analysis of existing SAV mechanisms used in the corresponding interfaces of these scenarios to identify their technical limitations.</t>
      <section anchor="sav-at-customer-interfaces">
        <name>SAV at Customer Interfaces</name>
        <t>SAV is used at customer interfaces to validate traffic from the customer cone, including both legitimate traffic and spoofing traffic. To prevent the source address spoofing, operators can enable ACL-based ingress filtering and/or uRPF-based mechanisms at customer interfaces, namely Strict uRPF, FP-uRPF, or EFP-uRPF. However, uRPF-based mechanisms may cause improper block problems in two inter-domain scenarios: limited propagation of prefixes and hidden prefixes, or may cause improper permit problems in the scenarios of source address spoofing within a customer cone, while ACL-based SAV ingress filtering needs to update SAV rules in a timely manner and lead to high operational overhead.</t>
        <figure anchor="customer_gap">
          <name>The gaps of ACL-based ingress filtering, Strict uRPF, FP-uRPF, and EFP-uRPF in the scenarios of interest.</name>
          <artwork><![CDATA[
+--------------------+------------+-----------+-------+--------+
|Traffic & Scenarios |     ACL    |Strict uRPF|FP-uRPF|EFP-uRPF|
+----------+---------+------------+-----------+-------+--------+
|Legitimate|   LPP   |            |                            |
|Traffic   +---------+            |       Improper Block       |
|          |   HP    |    High    |                            |
+----------+---------+Operational-+-------------------+--------+
|          |         |  Overhead  |                   |Improper|
|Spoofed   |  no SCC |            |                   |Permit  |
|Traffic   |         |            |   Functions as    |only for|
|          |         |            |      Expected     |EFP-uRPF|
|          |         |            |                   |Alg. B  |
|+---------+---------+            +-------------------+--------|
|Spoofed   |   SCC   |            |                            |
|Traffic   |         |            |       Improper Permit      |
|          |         |            |                            |
+----------+---------+------------+----------------------------+

"LPP" is a scenario with limited propagation of a prefix
(e.g., due to NO_EXPORT Community {{noexp}}).
"HP" is a scenario with hidden prefixes (e.g., Direct Server  
Return (DSR) {{dsrp}} anycast prefix.)
"SCC" refers to Spoofing within a CC. It is a scenario where
in the customer cone (CC) of the interface in consideration, 
source address spoofing occurs from within the CC, 
i.e., a prefix at one AS in the CC is spoofed from 
another AS in the CC.
"Functions as Expected" can be used to connote that the
inter-domain SAV mechanism does not cause improper permit for 
spoofed traffic in the scenario under consideration. 
It can also be used to connote that the SAV mechanism 
does not cause improper block for legitimate traffic in the 
scenario under consideration. In both cases, it also means that 
the SAV mechanism has low operational overhead. 
]]></artwork>
        </figure>
        <t><xref target="customer_gap"/> provides an overview of the gaps associated with ACL-based ingress filtering, Strict uRPF, FP-uRPF, and EFP-uRPF for SAV at customer interfaces in the corresponding scenarios. ACL-based ingress filtering has high operational overhead as performing SAV at customer interfaces. Strict uRPF, FP-uRPF, and EFP-uRPF, on the other hand, may incorrectly block legitimate traffic in the scenarios of limited propagation of prefixes or hidden prefixes. Furthermore, in the scenarios of source address spoofing within a customer cone, EFP-uRPF with algorithm B may inadvertently permit the spoofing traffic.</t>
        <t>In the following, we analyze the gaps of Strict uRPF, FP-uRPF, and EFP-uRPF for SAV at customer interfaces in scenarios of limited propagation of prefixes, hidden prefixes, and source address spoofing within a customer cone, respectively.</t>
        <section anchor="noexp">
          <name>Limited Propagation of Prefixes</name>
          <t>In inter-domain networks, some prefixes may not be propagated to all domains due to various factors, such as NO_EXPORT or NO_ADVERTISE communities or other route filtering policies. This may cause asymmetric routing in the inter-domain context, which may lead to improper block when performing SAV with existing mechanisms. These mechanisms include EFP-uRPF, which we focus on in the following analysis, as well as Strict uRPF and FP-uRPF. All these mechanisms suffer from the same problem of improper block in this scenario.</t>
          <figure anchor="no-export">
            <name>Limited propagation of prefixes caused by NO_EXPORT.</name>
            <artwork><![CDATA[
                          +----------------+
                          |    AS 3(P3)    |
                          +-+/\------+/\+--+
                             /         \
                            /           \ 
                           /             \
                          / (C2P)         \
                 +------------------+      \
                 |     AS 4(P4)     |       \
                 ++/\+--+/\+----+/\++        \
                   /     |        \           \
         P2[AS 2] /      |         \           \
                 /       |          \           \
                / (C2P)  |           \ P5[AS 5]  \ P5[AS 5]
+----------------+       |            \           \    
|    AS 2(P2)    |       | P1[AS 1]    \           \
+----------+/\+--+       | P6[AS 1]     \           \
             \           |               \           \
     P1[AS 1] \          |                \           \
     NO_EXPORT \         |                 \           \
                \ (C2P)  | (C2P/P2P)  (C2P) \     (C2P) \
              +----------------+          +----------------+
              |  AS 1(P1, P6)  |          |    AS 5(P5)    |
              +----------------+          +----------------+
]]></artwork>
          </figure>
          <t><xref target="no-export"/> presents a scenario where the limited propagation of prefixes occurs due to the NO_EXPORT community attribute. In this scenario, AS 1 is a customer of AS 2, AS 2 is a customer of AS 4, AS 4 is a customer of AS 3, and AS 5 is a customer of both AS 3 and AS 4. The relationship between AS 1 and AS 4 can be either customer-to-provider (C2P) or peer-to-peer (P2P). AS 1 advertises prefixes P1 to AS 2 and adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 2, preventing AS 2 from further propagating the route for prefix P1 to AS 4. Consequently, AS 4 only learns the route for prefix P1 from AS 1 in this scenario. Suppose AS 1 and AS 4 have deployed inter-domain SAV while other ASes have not, and AS 4 has deployed EFP-uRPF at its customer interfaces.</t>
          <t>Assuming that AS 1 is the customer of AS 4, if AS 4 deploys EFP-uRPF with algorithm A at customer interfaces, it will require packets with source addresses in P1 or P6 to only arrive from AS 1. When AS 1 sends legitimate packets with source addresses in P1 or P6 to AS 4 through AS 2, AS 4 improperly blocks these packets. The same problem applies to Strict uRPF and FP-uRPF. EFP-uRPF with algorithm B can avoid improper block in this case in principle.</t>
        </section>
        <section anchor="dsrp">
          <name>Hidden Prefixes</name>
          <t>Some servers' source addresses are not advertised through BGP to other ASes. These addresses are unknown to the inter-domain routing system and are called hidden prefixes. Legitimate traffic using these hidden prefixes as source addresses would be dropped by existing inter-domain SAV mechanisms, such as Strict uRPF, FP-uRPF, or EFP-uRPF, because they do not match any known prefix.</t>
          <t>For example, Content Delivery Networks (CDN) use anycast <xref target="RFC4786"/> <xref target="RFC7094"/> to improve the quality of service by bringing content closer to users. An anycast IP address is assigned to devices in different locations, and incoming requests are routed to the closest location. Usually, only locations with multiple connectivity announce the anycast IP address through BGP. The CDN server receives requests from users and creates tunnels to the edge locations, where content is sent directly to users using direct server return (DSR). DSR requires servers in the edge locations to use the anycast IP address as the source address in response packets. However, these edge locations do not announce the anycast prefixes through BGP, so an intermediate AS with existing inter-domain SAV mechanisms may improperly block these response packets.</t>
          <figure anchor="dsr">
            <name>A Direct Server Return (DSR) scenario.</name>
            <artwork><![CDATA[
                                +----------------+
                Anycast Server+-+    AS 3(P3)    |
                                +-+/\----+/\+----+
                                   /       \
                         P3[AS 3] /         \ 
                                 /           \
                                / (C2P)       \
                       +----------------+      \
                       |    AS 4(P4)    |       \
                       ++/\+--+/\+--+/\++        \
          P6[AS 2, AS 1] /     |      \           \
         P1[AS 2, AS 1] /      |       \           \
              P2[AS 2] /       |        \           \
                      / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
      +----------------+       |          \           \    
User+-+    AS 2(P2)    |       | P1[AS 1]  \           \
      +----------+/\+--+       | P6[AS 1]   \           \
                   \           |             \           \
           P6[AS 1] \          |              \           \
            P1[AS 1] \         |               \           \
                      \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                    +----------------+        +----------------+
       Edge Server+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                    +----------------+        +----------------+
P3 is the anycast prefix and is only advertised by AS 3 through BGP.
]]></artwork>
          </figure>
          <t><xref target="dsr"/> illustrates a DSR scenario where the anycast IP prefix P3 is only advertised by AS 3 through BGP. In this example, AS 3 is the provider of AS 4 and AS 5, AS 4 is the provider of AS 1, AS 2, and AS 5, and AS 2 is the provider of AS 1. AS 4 has deployed inter-domain SAV. When users in AS 2 send requests to the anycast destination IP, the forwarding path is AS 2-&gt;AS 4-&gt;AS 3. The anycast servers in AS 3 receive the requests and tunnel them to the edge servers in AS 1. Finally, the edge servers send the content to the users with source addresses in prefix P3. The reverse forwarding path is AS 1-&gt;AS 4-&gt;AS 2. Since AS 4 does not receive routing information for prefix P3 from AS 1, EFP-uRPF with algorithm A/B, and all other existing uRPF-based mechanisms at the customer interface of AS 4 facing AS 1 will improperly block the legitimate response packets from AS 1.</t>
          <t>Further, in some network scenarios, such as multicast and satellite networks, specific prefixes may be exclusively used as source addresses without being advertised via BGP by any AS. While different from DSR scenarios, these cases similarly result in existing inter-domain SAV mechanisms improperly blocking legitimate traffic originating from such prefixes.</t>
        </section>
        <section anchor="spoofing_within_cc">
          <name>Source Address Spoofing within a Customer Cone</name>
          <t>EFP-uRPF with algorithm B may also permit spoofing traffic improperly in scenarios where source address spoofing within a customer cone occur. We provide illustrations of these scenarios using an example in the following. The source address spoofing within a customer cone represents a class of scenario where spoofing traffic comes from a customer AS within a customer cone and the spoofed source addresses belong to this customer cone.
<xref target="customer-spoofing"/> portrays a scenario of source address spoofing within a customer cone and is used to analyze the gaps of uRPF-based mechanisms.</t>
          <figure anchor="customer-spoofing">
            <name>A scenario of source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                       +----------------+
                                       |    AS 3(P3)    |
                                       +-+/\----+/\+----+
                                          /       \
                                         /         \ 
                                        /           \
                                       / (C2P)       \
                              +----------------+      \
                              |    AS 4(P4)    |       \
                              ++/\+--+/\+--+/\++        \
                 P6[AS 2, AS 1] /     |      \           \
                P1[AS 2, AS 1] /      |       \           \
                     P2[AS 2] /       |        \           \
                             / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
             +----------------+       |          \           \    
Spoofer(P5')-+    AS 2(P2)    |       | P1[AS 1]  \           \
             +----------+/\+--+       | P6[AS 1]   \           \
                          \           |             \           \
                  P6[AS 1] \          |              \           \
                   P1[AS 1] \         |               \           \
                             \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                           +----------------+        +----------------+
                           |  AS 1(P1, P6)  |        |    AS 5(P5)    |
                           +----------------+        +----------------+
P5' is the spoofed source prefix P5 by the spoofer which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t>In <xref target="customer-spoofing"/>, the source address spoofing takes place within AS 4's customer cone, where the spoofer, which is inside of AS 2 or connected to AS 2 through other ASes, sends spoofing traffic with spoofed source addresses in P5 to AS 3 along the path AS 2-&gt;AS 4-&gt; AS 3. The arrows in <xref target="customer-spoofing"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>If AS 4 deploys EFP-uRPF with algorithm B at its customer interfaces, it will allow packets with source addresses in P5 to originate from AS 1, AS 2, and AS 5. Consequently, when the spoofer which is inside of AS 2 or connected to AS 2 through other ASes sends spoofing packets with spoofed source addresses in P5 to AS 3, AS 4 will improperly permit these packets, thus enabling the spoofing traffic to propagate.</t>
          <t>In scenarios like these, Strict uRPF, FP-uRPF, VRF uRPF, and EFP-uRPF with algorithm A do not suffer from improper permit problems. This is because these mechanisms enforce strict filtering rules that ensure packets with source addresses in P5 are only permitted to arrive at AS 4's customer interfaces facing AS 5.</t>
        </section>
      </section>
      <section anchor="sav_at_p">
        <name>SAV at Provider/Peer Interfaces</name>
        <t>SAV is used at provider/peer interfaces to validate traffic entering the customer cone, including both legitimate and spoofing traffic. To prevent packets with spoofed source addresses from the provider/peer AS, ACL-based ingress filtering and/or Loose uRPF can be deployed <xref target="nist"/>.</t>
        <figure anchor="provider_peer_gap">
          <name>The gaps of ACL-based ingress filtering and Loose uRPF at Provider/Peer Interfaces in the scenarios of interest.</name>
          <artwork><![CDATA[
+------------------------+------------+---------------+
|   Traffic & Scenarios  |     ACL    |   Loose uRPF  |
+----------+-------------+------------+---------------+
|Legitimate|      Any    |            |  Functions    |
|Traffic   |  Scenarios  |    High    |  as Expected  |
+----------+-------------+Operational +---------------+
|Spoofed   |   Spoofed   |  Overhead  |               |
|Traffic   |     from    |            |Improper Permit|
|          |provider/peer|            |               |
|          |      AS     |            |               |
+----------+-------------+------------+---------------+
"Spoofed from provider/peer AS" is a scenario where the 
spoofed traffic comes from a provider/peer AS and the spoofed 
prefix belongs to the customer cone of the AS that
is performing SAV.
"Functions as Expected" can be used to connote that the
inter-domain SAV mechanism does not cause improper permit for 
spoofed traffic in the scenario under consideration. 
It can also be used to connote that the SAV mechanism 
does not cause improper block for legitimate traffic in the 
scenario under consideration. In both cases, it also means that 
the SAV mechanism has low operational overhead.
]]></artwork>
        </figure>
        <t><xref target="provider_peer_gap"/> summarizes the gaps of ACL-based ingress filtering and Loose uRPF for SAV at provider/peer interfaces in the corresponding scenarios. ACL-based ingress filtering effectively blocks spoofing traffic from provider/peer AS, while appropriately allowing legitimate traffic. However, these methods may come with high operational overhead. On the other hand, Loose uRPF correctly permits legitimate traffic, but it can also mistakenly allow spoofing traffic to pass through.</t>
        <t>In the following, we expose the limitations of ACL-based ingress filtering and Loose uRPF for SAV at provider/peer interfaces in scenarios of source address spoofing from provider/peer AS. The source address spoofing from provider/peer AS represents a class of scenario where spoofing traffic comes from a provider/peer AS and the spoofed source addresses belong to the customer cone which the spoofing traffic enters.</t>
        <t><xref target="provider-spoofing"/> depicts the scenario of source address spoofing from provider/peer AS and is used to analyze the gaps of ACL-based ingress filtering and Loose uRPF below.</t>
        <figure anchor="provider-spoofing">
          <name>A scenario of source address spoofing from provider/peer AS.</name>
          <artwork><![CDATA[
                          +----------------+
            Spoofer(P1')+-+    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P/P2P)   \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
    P6[AS 2, AS 1] /     |      \           \
   P1[AS 2, AS 1] /      |       \           \
        P2[AS 2] /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
             \           |             \           \
     P6[AS 1] \          |              \           \
      P1[AS 1] \         |               \           \
                \ (C2P)  | (C2P)    (C2P) \     (C2P) \
               +----------------+        +----------------+
               |  AS 1(P1, P6)  |        |    AS 5(P5)    |
               +----------------+        +----------------+
P1' is the spoofed source prefix P1 by the spoofer which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
        </figure>
        <t>In the case of <xref target="provider-spoofing"/>, the spoofer which is inside of AS 3 or connected to AS 3 through other ASes forges the source addresses in P1 and sends the spoofing traffic to the destination addresses in P2. The arrows in <xref target="provider-spoofing"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
        <t>By applying ACL-based ingress filtering at the provider/peer interface of AS 4, the ACL rules can block any packets with spoofed source addresses from AS 3 in P1. However, this approach incurs heavy operational overhead, as it requires network operators to update the ACL rules promptly based on changes in prefixes or topology of AS 4's customer cone. Otherwise, it may cause improper block of legitimate traffic or improper permit of spoofing traffic.</t>
        <t>Loose uRPF can greatly reduce the operational overhead because it uses the local FIB as information source, and can adapt to changes in the network. However, it would improperly permit spoofed packets. In <xref target="provider-spoofing"/>, Loose uRPF is enabled at AS 4's provider/peer interface, while EFP-uRPF is enabled at AS 4's customer interfaces. A spoofer inside AS 3 or connected to it through other ASes may send packets with source addresses spoofing P1 to AS 2. As AS 3 lacks deployment of inter-domain SAV, the spoofing packets will reach AS 4's provider/peer interface. With Loose uRPF, AS 4 cannot block them at its provider/peer interface facing AS 3, and thus resulting in improper permit.</t>
      </section>
    </section>
    <section anchor="problem">
      <name>Problem Statement</name>
      <figure anchor="problem_sum">
        <name>The scenarios where existing inter-domain SAV mechanisms may have improper block problem for legitimate traffic, improper permit problem for spoofing traffic, or high operational overhead.</name>
        <artwork><![CDATA[
+--------+----------+-----------+----------+-------+--------+
|Problems|    ACL   |   Strict  |  Loose   |FP-uRPF|EFP-uRPF|
|        |          |   uRPF    |  uRPF    |       |        |
+--------+----------+-----------+----------+-------+--------+
|Improper|    NO    |    YES    |    NO    |      YES       |
|Block   |(manual   | (LPP, HP) |          |    (LPP, HP)   |
|        |operator  |           |          |                |
|        |diligence)|           |          |                |
+--------+----------+-----------+----------+-------+--------+
|Improper|    NO    |NO (no SCC)|   YES    |   NO (no SCC)  |
|Permit  |          |YES (SCC)  |  (SPP)   |   YES (SCC)    |
+--------+----------+-----------+----------+-------+--------+
|        |   YES    |                                       |
|  HOO   |  (Any    |                  NO                   |
|        |Scenarios)|                                       |
+--------+----------+---------------------------------------+
"HOO" refers to High Operational Overhead.
"LPP" is a scenario with limited propagation of a prefix
(e.g., due to NO_EXPORT Community {{noexp}}).
"HP" is a scenario with hidden prefixes (e.g., Direct Server  
Return (DSR) {{dsrp}} anycast prefix.)
"SPP" refers to Spoofing from Provider/Peer AS. It is a 
scenario where the spoofed traffic comes from a 
provider/peer AS and the spoofed prefix belongs to the 
customer cone of the AS that is performing SAV.
"SCC" refers to Spoofing within a CC. It is a scenario where
in the customer cone (CC) of the interface in consideration, 
source address spoofing occurs from within the CC, 
i.e., a prefix at one AS in the CC is spoofed from 
another AS in the CC.
]]></artwork>
      </figure>
      <t>Based on the analysis above, we conclude that existing inter-domain SAV mechanisms exhibit limitations in asymmetric routing scenarios, leading to potential issues of improper block or improper permit. Additionally, these mechanisms can result in high operational overhead, especially when network routing undergoes dynamic changes. <xref target="problem_sum"/> provides a comprehensive summary of scenarios where existing inter-domain SAV mechanisms may encounter issues, including instances of improper blocking of legitimate traffic, improper permitting of spoofing traffic, or high operational overhead.</t>
      <t>For ACL-based ingress filtering, network operators need to manually update ACL rules to adapt to network changes. Otherwise, they may cause improper block or improper permit issues. Manual updates induce high operational overhead, especially in networks with frequent policy and route changes.</t>
      <t>Strict uRPF and Loose uRPF are automatic SAV mechanisms, and thus they do not need any manual effort to adapt to network changes. However, they have issues in scenarios with asymmetric routing. Strict uRPF may cause improper block problems when an AS is multi-homed and routes are not symmetrically announced to all its providers. This is because the local FIB may not include the asymmetric routes of the legitimate packets, and Strict uRPF only uses the local FIB to check the source addresses and incoming interfaces of packets. Loose uRPF may cause improper permit problems and fail to prevent source address spoofing. This is because it is oblivious to the incoming interfaces of packets.</t>
      <t>FP-uRPF improves Strict uRPF in multi-homing scenarios. However, they still have improper block issues in asymmetric routing scenarios. For example, they may not handle the cases of limited propagation of prefixes. These mechanisms use the local RIB to learn the source prefixes and their valid incoming interfaces. But the RIB may not have all the prefixes with limited propagation and their permissible incoming interfaces.</t>
      <t>EFP-uRPF allows the prefixes from the same customer cone at all customer interfaces. This solves the improper block problems of FP-uRPF in multi-homing scenarios. However, this approach also compromises partial protection against spoofing from the customer cone. EFP-uRPF may still have improper block problems when it does not learn legitimate source prefixes. For example, hidden prefixes are not learned by EFP-uRPF.</t>
      <t>Finally, existing inter-domain SAV mechanisms cannot work in all directions (i.e., interfaces) of ASes to achieve effective SAV. Network operators need to carefully analyze the network environment and choose appropriate SAV mechanism for each interface. This leads to additional operational and cognitive overhead, which hinders the rate of adoption of inter-domain SAV.</t>
    </section>
    <section anchor="req">
      <name>Requirements for New Inter-domain SAV Mechanisms</name>
      <t>This section lists the requirements which can help bridge the technical gaps of existing inter-domain SAV mechanisms. These requirements serve as the practical guidelines that can be met, in part or in full, by proposing new techniques.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new inter-domain SAV mechanism <bcp14>MUST</bcp14> improve the validation accuracy in all directions of ASes over existing inter-domain SAV mechanisms, while working in incremental/partial deployment and providing necessary security guarantee.</t>
        <section anchor="improving-validation-accuracy-over-existing-mechanisms">
          <name>Improving Validation Accuracy over Existing Mechanisms</name>
          <t>The new inter-domain SAV mechanism <bcp14>MUST</bcp14> avoid improper blocking and reject more spoofed traffic than existing inter-domain SAV mechanisms.
To achieve this, for an AS performing inter-domain SAV on an interface connected to a neighboring AS, it <bcp14>MUST</bcp14> permit all prefixes whose legitimate traffic (using them as source addresses) can reach that interface, while blocking all other prefixes that cannot.
This general principle applies to customer, lateral peer, and provider interfaces.
Multiple sources of SAV-related information, such as ROA and ASPA objects, BGP Update data, SAV-specific information, and management information can be leveraged to meet this requirement.</t>
          <figure anchor="wider-deployment">
            <name>An example where both spoofing and legitimate traffic arrive from the same direction.</name>
            <artwork><![CDATA[
                      +-----------------+
                      |       AS 4      |
                      +------+/\+-------+
              Spoofing traffic | Legitimate traffic
              with SA in P1'   | with SA in P1
                               | (C2P)
                      +-----------------+
                      |       AS 3      |
                      +--+/\+-----+/\+--+
        Spoofing traffic  /         \ Legitimate traffic
        with SA in P1'   /           \ with SA in P1
                        / (C2P) (C2P) \
             +----------------+   +----------------+
Spoofer(P1')-+    AS 2(P2)    |   |    AS 1(P1)    |    
             +----------------+   +----------------+
P1' is the spoofed source prefix P1 by the spoofer which is inside of 
AS 2 or connected to AS 2 through other ASes.
AS 4 performs SAV at its interface facing AS 3.
The legitimate traffic with SA in P1 arrives at AS 4 along the path
AS 1->AS 3->AS 4.
The spoofing traffic with SA in P1' arrives at AS 4 along the path
AS 2->AS 3->AS 4.
]]></artwork>
          </figure>
          <t>The path taken by the traffic with spoofed source address (i.e., spoofed traffic) may overlap with a path for the legitimate traffic. Such scenarios could result in improper permit of the spoofed traffic at the AS doing SAV unless an AS located at or prior to the merging point of the overlap is also performing inter-domain SAV.
As illustrated in <xref target="wider-deployment"/>, both spoofed and legitimate traffic traverse the same link between AS 3 and AS 4. In this case, SAV filtering at AS 4's interface facing AS 3 cannot differentiate between the two.
The spoofed traffic in such scenarios is incrementally mitigated (i.e., blocked) with the wider deployment of SAV. For example, AS 3 can deploy SAV on its interfaces facing AS 1 and AS 2 to facilitate blocking of the spoofed traffic while admitting and propagating the legitimate traffic.</t>
        </section>
        <section anchor="working-in-incrementalpartial-deployment">
          <name>Working in Incremental/Partial Deployment</name>
          <t>The new inter-domain SAV mechanism <bcp14>MUST NOT</bcp14> assume pervasive adoption (including the adoption of both SAV and SAV-related information) and <bcp14>SHOULD</bcp14> benefit early adopters by providing effective protection from spoofing of source addresses even when it is partially deployed in the Internet. Not all AS border routers can support the new SAV mechanism at once, due to various constraints such as capabilities, versions, or vendors. The new SAV mechanism <bcp14>SHOULD NOT</bcp14> be less effective than existing mechanisms in its capability of protection from source address spoofing for any type of peering interface (customer, lateral peer, and provider) even under partial deployment.</t>
        </section>
        <section anchor="providing-necessary-security-guarantee">
          <name>Providing Necessary Security Guarantee</name>
          <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> secure the communicated SAV-related information between ASes. It <bcp14>SHOULD</bcp14> prevent malicious ASes from generating forged information or detect and filter the forged information from malicious ASes.</t>
        </section>
      </section>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> update SAV rules and detect the changes of SAV-specific information automatically while guaranteeing convergence.</t>
        <section anchor="reducing-operational-overhead">
          <name>Reducing Operational Overhead</name>
          <t>The new inter-domain SAV mechanism <bcp14>MUST</bcp14> be able to adapt to dynamic networks and asymmetric routing scenarios automatically, instead of relying on manual update. At least, it <bcp14>MUST</bcp14> have less operational overhead than ACL-based ingress filtering.</t>
        </section>
        <section anchor="guaranteeing-convergence">
          <name>Guaranteeing Convergence</name>
          <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> promptly detect the network changes and finish the convergence process quickly. It is essential that the new inter-domain SAV mechanism converges towards accurate SAV rules in a proper manner, effectively reducing improper block and improper permit throughout the whole convergence process.</t>
        </section>
      </section>
    </section>
    <section anchor="inter-domain-sav-scope">
      <name>Inter-domain SAV Scope</name>
      <t>The new inter-domain SAV mechanisms should work in the same scenarios as existing ones. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: This includes both global routing table forwarding and CE site forwarding of VPN.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): In this scenario, we focus on the validation of the outer layer IP address.</t>
        </li>
        <li>
          <t>Both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>
          <t>Non-IP packets: This includes MPLS label-based forwarding and other non-IP-based forwarding.</t>
        </li>
      </ul>
      <t>In addition, the new inter-domain SAV mechanisms should not modify data plane packets. Existing architectures or protocols or mechanisms can be inherited by the new SAV mechanism to achieve better SAV effectiveness.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>SAV rules can be generated based on route information (FIB/RIB) or non-route information. If the information is poisoned by attackers, the SAV rules will be false. Legitimate packets may be dropped improperly or malicious traffic with spoofed source addresses may be permitted improperly. Route security should be considered by routing protocols. Non-route information, such as RPKI ASPA objects, should also be protected by corresponding mechanisms or infrastructure. If SAV mechanisms or protocols require exchanging specific information between ASes, some considerations on the avoidance of message alteration or message injection are needed to propose.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Nan Geng<br/>
  Huawei<br/>
  Beijing,
  China <br/>
  Email: gengnan@huawei.com</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC6811">
          <front>
            <title>BGP Prefix Origin Validation</title>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="D. Ward" initials="D." surname="Ward"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes. More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so. This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6811"/>
          <seriesInfo name="DOI" value="10.17487/RFC6811"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="RFC7094">
          <front>
            <title>Architectural Considerations of IP Anycast</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="D. Oran" initials="D." surname="Oran"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo discusses architectural implications of IP anycast and provides some historical analysis of anycast use by various IETF protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7094"/>
          <seriesInfo name="DOI" value="10.17487/RFC7094"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5210">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC7908">
          <front>
            <title>Problem Definition and Classification of BGP Route Leaks</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="B. Dickson" initials="B." surname="Dickson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>A systemic vulnerability of the Border Gateway Protocol routing system, known as "route leaks", has received significant attention in recent years. Frequent incidents that result in significant disruptions to Internet routing are labeled route leaks, but to date a common definition of the term has been lacking. This document provides a working definition of route leaks while keeping in mind the real occurrences that have received significant attention. Further, this document attempts to enumerate (though not exhaustively) different types of route leaks based on observed events on the Internet. The aim is to provide a taxonomy that covers several forms of route leaks that have been observed and are of concern to the Internet user community as well as the network operator community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7908"/>
          <seriesInfo name="DOI" value="10.17487/RFC7908"/>
        </reference>
        <reference anchor="RFC9234">
          <front>
            <title>Route Leak Prevention and Detection Using Roles in UPDATE and OPEN Messages</title>
            <author fullname="A. Azimov" initials="A." surname="Azimov"/>
            <author fullname="E. Bogomazov" initials="E." surname="Bogomazov"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>Route leaks are the propagation of BGP prefixes that violate assumptions of BGP topology relationships, e.g., announcing a route learned from one transit provider to another transit provider or a lateral (i.e., non-transit) peer or announcing a route learned from one lateral peer to another lateral peer or a transit provider. These are usually the result of misconfigured or absent BGP route filtering or lack of coordination between autonomous systems (ASes). Existing approaches to leak prevention rely on marking routes by operator configuration, with no check that the configuration corresponds to that of the External BGP (eBGP) neighbor, or enforcement of the two eBGP speakers agreeing on the peering relationship. This document enhances the BGP OPEN message to establish an agreement of the peering relationship on each eBGP session between autonomous systems in order to enforce appropriate configuration on both sides. Propagated routes are then marked according to the agreed relationship, allowing both prevention and detection of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9234"/>
          <seriesInfo name="DOI" value="10.17487/RFC9234"/>
        </reference>
        <reference anchor="manrs" target="https://www.manrs.org/netops/guide/antispoofing/">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="isoc" target="https://www.internetsociety.org/resources/doc/2015/addressing-the-challenge-of-ip-spoofing/">
          <front>
            <title>Addressing the challenge of IP spoofing</title>
            <author>
              <organization>Internet Society</organization>
            </author>
            <date year="2015"/>
          </front>
        </reference>
        <reference anchor="nist" target="https://doi.org/10.6028/NIST.SP.800-189r1.ipd">
          <front>
            <title>Border Gateway Protocol Security and Resilience</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="urpf" target="https://www.cisco.com/c/dam/en_us/about/security/intelligence/urpf.pdf">
          <front>
            <title>Unicast Reverse Path Forwarding Enhancements for the Internet Service Provider-Internet Service Provider Network Edge</title>
            <author>
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
        <reference anchor="bar-sav" target="https://datatracker.ietf.org/doc/draft-ietf-sidrops-bar-sav/">
          <front>
            <title>Source Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-SAV)</title>
            <author>
              <organization>NIST, Akamai</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 564?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Jared Mauch, Barry Greene, Fang Gao, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, John O'Brien, and Roland Dobbins, for their valuable comments on this document. 
Apologies to any others whose names the authors may have missed mentioning.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
