<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-18" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.1 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-18"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="August" day="26"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 88?>

<t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the basic requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 92?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) defends against source address spoofing. Network operators can enforce SAV at the following levels (see <xref target="RFC5210"/>):</t>
      <ul spacing="normal">
        <li>
          <t>Within in the access network</t>
        </li>
        <li>
          <t>Within in the domain (i.e., the autonomous system)</t>
        </li>
        <li>
          <t>Between domains (i.e., autonomous systems)</t>
        </li>
      </ul>
      <t>Access networks have already deployed SAV mechanisms. These mechanisms typically are deployed on switches and prevent hosts from using the source address of another host on the Internet. Mechanisms include:</t>
      <ul spacing="normal">
        <li>
          <t>Source Address Validation Improvement (SAVI) Solution for DHCP <xref target="RFC7513"/></t>
        </li>
        <li>
          <t>IP Source Guard (IPSG) based on DHCP snooping <xref target="IPSG"/></t>
        </li>
        <li>
          <t>Cable Source-Verify <xref target="cable-verify"/></t>
        </li>
      </ul>
      <t>A domain can trust a sub network or an access network if that network reliably enforces SAV. Sadly, SAV mechanisms are not universally deployed and many domains cannot trust the sub networks or hosts to which they are attached. Therefore, intra-domain SAV mechanisms are required.</t>
      <t>This document analyzes intra-domain (i.e., intra-AS) SAV. As illustrated in <xref target="intra-domain"/>, intra-domain SAV has the following goals:</t>
      <ul spacing="normal">
        <li>
          <t>To prevent sub-networks from injecting packets with spoofed source addresses outside their own sub-network, and to prevent hosts from injecting packets with spoofed source addresses outside their own network segment into the domain</t>
        </li>
        <li>
          <t>To prevent other domains (i.e., autonomous systems) from injecting packets with spoofed internal-use-only source addresses into the domain</t>
        </li>
      </ul>
      <figure anchor="intra-domain">
        <name>Two Goals of intra-domain SAV</name>
        <artwork><![CDATA[
Goal i: To prevent sub-networks from injecting packets with 
spoofed source addresses outside their own sub-network, 
and to prevent hosts from injecting packets with spoofed 
source addresses outside their own network segment into the domain               
                                                                   
+----------------------------------------------------+ 
| AS                Spoofed data packets using       | 
|                   a source address out of          | 
|+---------------+  the sub network        +--------+| 
|| A sub network |------------------------>| Router || 
|+---------------+                         +--------+| 
+----------------------------------------------------+ 

+--------------------------------------------+ 
| AS        Spoofed data packets using       | 
|           a source address out of          | 
|+-------+  the network segment    +--------+| 
|| Hosts |------------------------>| Router || 
|+-------+                         +--------+| 
+--------------------------------------------+                                                                                                                                

Goal ii: To prevent other domains (i.e., autonomous systems) 
from injecting packets with spoofed internal-use-only 
source addresses into the domain             
                                                                   
      Spoofed data packets using                                         
      an internal-use-only source
      address of the local AS                                 
+----+                      +--------------------------+                          
| AS |<---------------------| The rest of the Internet |                          
+----+                      +--------------------------+                          
]]></artwork>
      </figure>
      <t>Building on the second goal of intra-domain SAV, inter-domain (i.e., inter-AS) SAV further prevents other domains from injecting packets with other spoofed source addresses into the domain.</t>
      <t>This document provides a gap analysis of the current operational intra-domain SAV mechanisms, identifies key problems to solve, and proposes basic requirements for solutions.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Sub Network: A sub network may operate its own internal routing protocols (e.g., a separate IGP), but it is considered part of the AS in the global routing system. It is connected to one or more routers of the AS for Internet connectivity. It originates traffic but does not transit traffic for other networks.</t>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        <t>SAV-specific Information: The information specialized for SAV rule generation.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Current Operational Intra-domain SAV Mechanisms</name>
      <t>Although BCP38 <xref target="RFC2827"/> and BCP84 <xref target="RFC3704"/> provides multiple ingress filtering methods which are typically used for inter-domain SAV, some of them have also been used for intra-domain SAV in practice. This section introduces the current operational mechanisms used to implement intra-domain SAV.</t>
      <ul spacing="normal">
        <li>
          <t>Access Control List (ACL) <xref target="RFC2827"/> is a SAV filter that checks the source address of every data packet against a list of acceptable or unacceptable prefixes. By performing the ACL rule at a router interface, every data packet received at this interface that does not match the ACL rule will be blocked. It can be used at router interfaces facing a sub network or a set of hosts, only allowing data packets using an acceptable source address. It is also usually used on router interfaces facing the rest of the Internet, blocking data packets using an unacceptable source address, such as internal source addresses owned by the local AS <xref target="nist-rec"/>. The ACL rule is typically configured and updated manually, so it is critical to update ACL rules in time when the set of prefixes changes.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> implements a SAV filter in an automatic way by checking the source address of every data packet against the router's local Forwarding Information Base (FIB). The router deploying strict uRPF accepts a data packet only when i) the local FIB contains a prefix covering the packet's source address and ii) the corresponding outgoing interface for the prefix in the FIB matches the packet's incoming interface. Otherwise, the packet will be blocked. Strict uRPF is often used to block spoofed data packets originated from a sub network or a directly-connected host.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> also uses the local FIB to implement SAV but checks only for the existence of the prefix. Loose uRPF accepts a data packet if the router's local FIB contains a prefix covering the packet's source address regardless of the interface from which the packet is received. Routers can use loose uRPF to block spoofed data packets using a non-global or non-routed source address <xref target="nist-rec"/>.</t>
        </li>
      </ul>
      <t>EFP-uRPF <xref target="RFC8704"/> is another advanced SAV mechanism but it is specifically designed for inter-domain SAV. It implements a SAV filter on router interfaces facing a customer AS by using BGP data provided by other ASes. This document does not analyze EFP-uRPF because it is out of the scope.</t>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>This section elaborates the gap scenarios and key problems of the current operational intra-domain SAV mechanisms.</t>
      <section anchor="subsec-gap-1">
        <name>Intra-domain SAV for Traffic from Sub Networks or Directly-Connected Hosts</name>
        <t>Towards Goal i described in <xref target="sec-intro"/> and shown in <xref target="intra-domain"/>, the AS operator can use ACL rules or strict uRPF on appropriate routers to implement intra-domain SAV for traffic originated from a sub network or a directly-connected host.</t>
        <t>For example, the AS operator can configure an ACL rule on router interfaces facing a sub network or a directly-connected host, containing a set of prefixes which can be used as the source address. By using this ACL rule, the router will block any data packet using a source address out of the set of prefixes. However, the key problem of ACL-based SAV is the high operational overhead. Since the ACL rule is typically maintained manually, the AS operator must update the ACL rule according to prefix changes or topology changes timely. If the AS operator forgets to update the ACL rule when the set of prefixes changes, the outdated ACL rule may improperly block legitimate data packets.</t>
        <t>Strict uRPF can generate and update SAV rules in an automatic way but it will improperly block legitimate data packets in the scenario of asymmetric routing or hidden prefix. In the following, this section introduces two gap scenarios when using strict uRPF to implement intra-domain SAV.</t>
        <section anchor="asymmetric-routing">
          <name>Asymmetric Routing</name>
          <t>Asymmetric routing means a packet traverses from a source to a destination in one path and takes a different path when it returns to the source. Asymmetric routing can occur within an AS due to routing policy, traffic engineering, etc. For example, a sub network connected to multiple routers of the AS may need to perform load balancing on incoming traffic, thereby resulting in asymmetric routing.</t>
          <t><xref target="multi-home"/> shows an example of asymmetric routing. The sub network owns prefix 2001:db8::/55 <xref target="RFC6890"/> and is connected to two routers of the AS, i.e., Router 1 and Router 2. Router 1, Router 2, and Router 3 exchange routing information through the intra-domain routing protocol. For load balancing of traffic flowing to the sub network, the sub network expects the incoming traffic destined for prefix 2001:db8:0::/56 to come from Router 1 and the incoming traffic destined for prefix 2001:db8:0:100::/56 to come from Router 2. To this end, it requires that Router 1 advertises the route information of prefix 2001:db8:0::/56 and Router 2 advertises the routing information of prefix 2001:db8:0:100::/56 through the intra-domain routing protocol. <xref target="multi-home"/> shows the FIB entries of Router 1 and Router 2 associated with the two prefixes.</t>
          <figure anchor="multi-home">
            <name>An example of asymmetric routing</name>
            <artwork><![CDATA[
 +----------------------------------------------------------+
 |                                                       AS |
 |                      +----------+                        |
 |                      | Router 3 |                        |
 |                      +----------+                        |
 |                       /       \                          |
 |                      /         \                         |
 |                     /           \                        |
 |            +----------+       +----------+               |
 |            | Router 1 |       | Router 2 |               |
 |            +-------#--+       +----------+               |
 |                    /\           /                        |
 |Traffic with         \          / Traffic with            |
 |source IP addresses   \        /  destination IP addresses|
 |of 2001:db8:0:100::/56 \      \/  of 2001:db8:0:100::/56  |
 |                   +----------------+                     |
 |                   |     Sub        |                     |
 |                   |    Network     |                     |
 |                   |(2001:db8::/55) |                     |
 |                   +----------------+                     |
 |                                                          |
 +----------------------------------------------------------+

 FIB of Router 1                FIB of Router 2
 Dest                Next_hop   Dest                Next_hop
 2001:db8:0::/56     Sub        2001:db8:0:100::/56 Sub
                     Nestwork                       Network
 2001:db8:0:100::/56 Router 3   2001:db8:0::/56     Router 3

 The legitimate traffic originated from sub network with 
 source addresses in 2001:db8:0:100::/56 will be improperly blocked 
 by strict uRPF on Router 1.
]]></artwork>
          </figure>
          <t>While the sub network does not expect traffic destined for prefix 2001:db8:0:100::/56 to come from Router 1, it can send traffic with source addresses of prefix 2001:db8:0:100::/56 to Router 1. As a result, there is asymmetric routing of data packets between the sub network and Router 1. Arrows in the figure indicate the flowing direction of traffic. If Router 1 adopts strict uRPF, by checking the FIB entry that matches prefix 2001:db8:0:100::/56, the SAV rule is that Router 1 only accepts data packets with a source address of 2001:db8:0:100::/56 from Router 3. Therefore, when the sub network sends data packets with a source address of 2001:db8:0:100::/56 to Router 1, strict uRPF on Router 1 will improperly block these legitimate data packets. Similarly, if Router 2 adopts strict uRPF, it will improperly block legitimate data packets from the sub network that use a source address of prefix 2001:db8:0::/56.</t>
        </section>
        <section anchor="hidden-prefix">
          <name>Hidden Prefix</name>
          <t>In the hidden prefix scenario, a host originates data packets using a source address that is hidden or invisible to the intra-domain routing protocol and intra-domain routers. The Content Delivery Networks (CDN) and Direct Server Return (DSR) technology is a representative example of hidden prefix scenario.</t>
          <figure anchor="hidden">
            <name>Hidden prefix in CDN and DSR scenario</name>
            <artwork><![CDATA[
          +-------------------------+                             
          |          AS Y           | AS Y announces the route    
          |   (where the anycast    | for anycast prefix P3
          |    server is located)   | in BGP                            
          +-----------+-------------+                             
                      |                                           
                      |                                           
          +-----------+-------------+                             
          |       Other ASes        |                             
          +-------------------------+                             
             /                    \                               
            /                      \                              
           /                        \                             
+------------------+   +---------------------------------------+   
|      AS Z        |   |         +----------+             AS X |   
| (where the user  |   |         | Router 4 |                  |   
|    is located)   |   |         +----------+                  |   
+------------------+   |              |                        |   
                       |              |                        |   
                       |         +----+-----+                  |   
                       |         | Router 5 |                  |   
                       |         +----#-----+                  |   
                       |              /\    DSR responses with |   
                       |              |     source IP addresses|   
                       |              |     of P3              |   
                       |       +---------------+               |   
                       |       |     Hosts     |               |    
                       |       |     (P2)      |               |   
                       |       +---------------+               |   
                       | (where the edge server is located)    |   
                       +---------------------------------------+   
DSR response packets from edge server with source IP addresses 
of P3 (i.e., the anycast prefix) will be improperly blocked by 
Router 5 if Router 5 uses strict uRPF.
]]></artwork>
          </figure>
          <t>For example, in <xref target="hidden"/>, the anycast server in AS Y is reachable via prefix P3, while the edge server in AS X is reachable only via prefix P2. When a user in AS Z sends a request to the anycast server in AS Y, the request is received by the anycast server and then tunneled to the edge server in AS X. The edge server subsequently generates a DSR response packet, but uses the anycast server’s address (i.e., a P3 address) as the source. Since Router 5 does not learn the route to prefix P3 from the interface facing the edge server, the response packets from the edge server would be improperly dropped if Router 5 applies strict uRPF for intra-domain SAV.</t>
          <t>Specifically, if Router 5 adopts strict uRPF, the SAV rule is that Router 5 only accepts packets with a source address of prefix P2 from the edge server. As a result, when the edge server returns DSR response packets using the source address of prefix P3, DSR response packets will be improperly blocked. In addition, even if Router 5 adopts loose uRPF, it will also improperly block these DSR response packets because prefix P3 does not exist in the FIB of Router 5.</t>
        </section>
      </section>
      <section anchor="subsec-gap-2">
        <name>Intra-domain SAV for Traffic from the Rest of the Internet</name>
        <t>Towards Goal ii described in <xref target="sec-intro"/> and shown in <xref target="intra-domain"/>, intra-domain SAV is typically deployed on router interfaces facing the rest of the Internet to block data packets using an internal source address (see <xref target="inbound-SAV"/>). ACL-based SAV is often used for this purpose. The AS operator can configure an ACL rule which contains a set of unacceptable prefixes (e.g., internal prefixes) to block any data packet using a source address of these prefixes. However, the operational overhead of maintaining ACL rules will be extremely high, especially when there are multiple router interfaces that need to configure the ACL rule as shown in <xref target="inbound-SAV"/>.</t>
        <figure anchor="inbound-SAV">
          <name>Intra-domain SAV for Traffic from the Rest of the Internet</name>
          <artwork><![CDATA[
+---------------------------------------------------+ 
|             The rest of the Internet              | 
+---------------------------------------------------+ 
              |  Data packets using an    |           
              |  internal source address  |           
              |  (e.g., P1 or P2)         |
+-------------|---------------------------|---------+ 
|   AS        \/                          \/        | 
|         +---#------+               +----#-----+   | 
|         | Router 3 +---------------+ Router 4 |   | 
|         +----------+               +----------+   | 
|          /        \                     |         | 
|         /          \                    |         | 
|        /            \                   |         | 
| +----------+     +----------+      +----------+   | 
| | Router 1 |     | Router 2 +------+ Router 5 |   | 
| +----------+     +----------+      +----------+   | 
|        \             /                  |         | 
|         \           /                   |         | 
|          \         /                    |         | 
|       +---------------+         +-------+-------+ | 
|       |    Sub        |         |     Hosts     | | 
|       |   Network     |         |               | | 
|       |     (P1)      |         |     (P2)      | | 
|       +---------------+         +---------------+ | 
|                                                   | 
+---------------------------------------------------+ 
]]></artwork>
        </figure>
        <t>In addition, loose uRPF can be used in this case to block data packets from the rest of the Internet using a non-global or non-routed source address. But it will improperly permit spoofed data packets using an internal source address because internal prefixes/addresses exist in the router's local FIB.</t>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>As analyzed above, the current operational intra-domain SAV mechanisms have significant limitations in terms of automatic update or accurate validation.</t>
      <t>ACL-based SAV entirely relies on manual maintenance and thus requires high operational overhead in dynamic networks. To guarantee accuracy of ACL-based SAV, AS operators have to manually update the ACL rule in time when the prefix or topology changes. Otherwise, improper block or improper permit problems may appear.</t>
      <t>Strict uRPF can automatically update SAV rules, but may improperly block legitimate traffic under asymmetric routing scenario or hidden prefix scenario. As analyzed in <xref target="subsec-gap-1"/>, it may mistakenly consider a valid incoming interface as invalid, resulting in legitimate data packets being blocked (i.e., improper block problem).</t>
      <t>Loose uRPF is also an automated SAV mechanism but its SAV rules are overly loose. As analyzed in <xref target="subsec-gap-2"/>, any spoofed data packet using a source address covered by the FIB will be accepted by loose uRPF (i.e., improper permit problem).</t>
      <t>In summary, the AS operator has a comprehensive perspective, so it can configure the correct ACL rules. However, manual maintenance can lead to high operational overhead and improper blocks may occur due to the negligence of the AS operator. uRPF cannot guarantee the accuracy of SAV because it solely uses the router’s local FIB information to determine SAV rules, which may not match the incoming interfaces of legitimate data packets from the source. As a result, strict uRPF will improperly block legitimate data packets in the case of asymmetric routing and hidden prefix, while loose uRPF has limited effect on preventing source address spoofing because it only blocks non-global or non-routed addresses.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section lists five general requirements for technical improvements that should be considered when designing the future intra-domain SAV architecture and solution. These informational requirements can not be used to initiate standards-track protocol changes. Any protocol changes would require a standards-track requirements document, not a non-normative reference to this informational document.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> improve the accuracy upon existing intra-domain SAV mechanisms. It <bcp14>MUST</bcp14> achieve the two goals described in <xref target="sec-intro"/> to block those spoofing traffic from sub networks, hosts, and the rest of the Internet. Meanwhile, it <bcp14>MUST</bcp14> avoid blocking legitimate data packets, especially when there are prefix changes, asymmetric routes, or hidden prefixes. To overcome the improper block problems, routers may need to use more information (e.g., SAV-specific information) besides the local FIB information to determine SAV decisions. By integrating SAV-specific information, routers may learn asymmetric routes or hidden prefixes, resulting in more accurate SAV rules.</t>
      </section>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be able to automatically generate and update SAV rules on routers, rather than relying entirely on manual updates like ACL-based SAV. Even if some necessary initial configurations may be needed to improve the accuracy of SAV, automation helps reduce subsequent maintenance overhead of the AS operator.</t>
      </section>
      <section anchor="working-in-incremental-deployment">
        <name>Working in Incremental Deployment</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> specify the deployment scope (i.e., which routers the mechanism is used on) and <bcp14>MUST</bcp14> provide incremental benefits when incrementally deployed within the specified deployment scope. That is, it <bcp14>MUST NOT</bcp14> be effective only when fully deployed within the deployment scope. In the incremental deployment scenario, it <bcp14>MUST</bcp14> be able to fulfill or partially fulfill the goals described in <xref target="sec-intro"/> and <bcp14>MUST</bcp14> avoid improper blocks.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be able to update SAV rules in time when prefix changes, route changes, or topology changes occur in an AS. Two considerations must be taken into account if SAV-specific information is communicated through a protocol. First, the mechanism <bcp14>MUST</bcp14> allow routers to learn the updated SAV-specific information in a timely manner. Second, the mechanism <bcp14>MUST NOT</bcp14> communicate too much SAV-specific information for the SAV function, because this may greatly increase the burden on the control plane of routers and even compromise the performance of the current protocols.</t>
      </section>
      <section anchor="security">
        <name>Security</name>
        <t>The new intra-domain SAV mechanisms <bcp14>MUST NOT</bcp14> introduce additional security vulnerabilities or confusion to the existing intra-domain architectures or protocols. <xref target="sec-security"/> details the security scope and security considerations for the new intra-domain SAV mechanism.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanisms can ensure integrity and authentication of protocol messages that deliver the required SAV-specific information, and consider avoiding unintentional misconfiguration. It is not necessary to provide protection against compromised or malicious intra-domain routers which poison existing control or management plane protocols. Compromised or malicious intra-domain routers may not only affect SAV, but also disrupt the whole intra-domain routing domain. Security mechanisms to prevent these attacks are beyond the capability of intra-domain SAV.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Barry Greene, Fang Gao, Kotikalapudi Sriram, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, Libin Liu, John O'Brien, Roland Dobbins, Xiangqing Chang, Tony Przygienda, Yingzhen Qu, Changwang Lin, James Guichard, Linda Dunbar, Robert Sparks, Yu Fu, Stephen Farrel etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC9256" target="https://www.rfc-editor.org/info/rfc9256" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9256.xml">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC2784" target="https://www.rfc-editor.org/info/rfc2784" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2784.xml">
          <front>
            <title>Generic Routing Encapsulation (GRE)</title>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="S. Hanks" initials="S." surname="Hanks"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <date month="March" year="2000"/>
            <abstract>
              <t>This document specifies a protocol for encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2784"/>
          <seriesInfo name="DOI" value="10.17487/RFC2784"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC6890" target="https://www.rfc-editor.org/info/rfc6890" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6890.xml">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
        <reference anchor="nist-rec" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation&quot;">
          <front>
            <title>Resilient Interdomain Traffic Exchange - BGP Security and DDoS Mitigation</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 395?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
