<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-savnet-source-prefix-advertisement-04" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="SPA-based SAVNET">Source Prefix Advertisement for Intra-domain SAVNET</title>
    <seriesInfo name="Internet-Draft" value="draft-li-savnet-source-prefix-advertisement-04"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="April" day="08"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 50?>

<t>The new intra-domain source address validation (SAV) mechanism requires improving the accuracy (especially avoiding blocking legitimate traffic) and supporting automatic update (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>). To this end, this document proposes an intra-domain SAV mechanism, called source prefix advertisement (SPA) for intra-domain SAVNET (SPA-based SAVNET for short), to advance the technology for intra-domain SAV. SPA-based SAVNET allows routers in an intra-domain network to exchange SPA information. By using SPA information and routing information, intra-domain routers can determine more accurate SAV rules in an automatic manner.</t>
    </abstract>
  </front>
  <middle>
    <?line 54?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>The main purpose of intra-domain SAV for an AS is blocking spoofing data packets from host networks and customer networks that use a source address of other networks and blocking spoofing data packets from external ASes that use a source address of the local AS (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>). However, existing uRPF mechanisms <xref target="RFC3704"/> will improperly block legitimate data packets in the case of asymmetric forwarding or asymmetric routing, while ACL-based ingress filtering relies entirely on manual update (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>).</t>
      <t>To improve the accuracy and enable automatic update, this document proposes an intra-domain SAV mechanism, called source prefix advertisement (SPA) for intra-domain SAVNET (SPA-based SAVNET for short), to advance the technology for intra-domain SAV. SPA-based SAVNET allows routers in an intra-domain network to exchange SPA information. By using SPA information and routing information, intra-domain routers can determine more accurate SAV rules in an automatic manner. It is a general intra-domain SAV mechanism that apply to different network topologies (e.g., mesh topology or tree topology) or routing scenarios (e.g., asymmetric routing or symmetric routing).</t>
      <t>The reader is encouraged to be familiar with <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/> and <xref target="I-D.ietf-savnet-intra-domain-architecture"/>.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule that describes the mapping relationship between a source address (prefix) and its valid incoming router interface(s).</t>
        <t>SAVNET Router: An intra-domain router that deploys SPA-based SAVNET.</t>
        <t>Host Network: An intra-domain stub network consists of hosts.</t>
        <t>Customer Network: An intra-domain stub network consists of hosts and routers.</t>
        <t>Host-facing Router: An intra-domain router facing an intra-domain host network.</t>
        <t>Customer-facing Router: An intra-domain router facing an intra-domain customer network.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="deployment-scope">
      <name>Deployment Scope</name>
      <t>The deployment scope of SPA-based SAVNET for an AS includes host-facing routers, customer-facing routers, and AS border routers. SPA-based SAVNET allows these routers to exchange SPA information through the existing internal gateway protocol (IGP). By learning SPA information from other SAVNET routers, each SAVNET router can generate an allowlist SAV rule (i.e., "Interface-based prefix allowlist" mode in <xref target="I-D.huang-savnet-sav-table"/>) or a blocklist SAV rule (i.e., "Interface-based prefix blocklist" mode in <xref target="I-D.huang-savnet-sav-table"/>) on the specific router interface:</t>
      <ul spacing="normal">
        <li>
          <t>For host-facing routers, they generate an allowlist SAV rule on interfaces facing a host network. The allowlist SAV rule exactly covers the space of source IP addresses that are used by data packets of the host network.</t>
        </li>
        <li>
          <t>For customer-facing routers, they generate an allowlist SAV rule on interfaces facing a customer network. The allowlist SAV rule exactly covers the space of source IP addresses that are used by data packets of the customer network.</t>
        </li>
        <li>
          <t>For AS border routers, they generate a blocklist SAV rule on interfaces facing an external AS. The allowlist SAV rule exactly covers the space of source IP addresses that are used by data packets of the local AS.</t>
        </li>
      </ul>
      <t>By using the generated allowlist SAV rules or blocklist SAV rules, SPA-based SAVNET effectively blocks spoofing data packets from host networks and customer networks that use a source address of other networks and blocks spoofing data packets from external ASes that use a source address of the local AS, while avoiding blocking legitimate data packets.</t>
      <section anchor="incremental-deployment">
        <name>Incremental Deployment</name>
        <t>SPA-based SAVNET provides incremental benefits when incrementally deployed within the deployment scope. Every SAVNET router that adopts SPA-based SAVNET can identify spoofing data packets coming from a host network, customer network, or an AS. By using allowlist SAV rules, host-facing routers and customer-facing routers that adopt SPA-based SAVNET will block spoofing data packets from host networks and customer networks that use a source address of other networks. By using blocklist SAV rules, AS border routers that adopt SPA-based SAVNET will block spoofing data packets from external ASes that use a source address of the local AS. The network operator can incrementally deploy SPA-based SAVNET in its AS to gradually improve the defense against source address spoofing attacks.</t>
      </section>
    </section>
    <section anchor="sav-using-routing-information">
      <name>SAV Using Routing Information</name>
      <t>This document first describes how to use routing information to generate more accurate SAV rules than the existing intra-domain SAV mechanisms (e.g., strict uRPF and loose uRPF).</t>
      <t>Each SAVNET router connected to an intra-domain stub network (e.g., a host network or a customer network) generates an allowlist SAV rule. The detailed procedure for allowlist generation is as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>Extract unique prefixes in the router's routing information base (RIB) that has an outgoing interface towards the stub network.</t>
        </li>
        <li>
          <t>Include these prefixes into the allowlist SAV rule at router interfaces facing the stub network.</t>
        </li>
      </ol>
      <t>Each SAVNET router connected to an external AS generates a blocklist SAV rule. The detailed procedure for blocklist generation is as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>Extract unique prefixes from routing information learned from the IGP.</t>
        </li>
        <li>
          <t>Include these prefixes into the blocklist SAV rule at router interfaces facing an external AS.</t>
        </li>
      </ol>
      <t>In some asymmetric routing scenario, the allowlist SAV rule generated by using routing information may not cover the whole source IP address space of the stub network. To improve SAV accuracy and avoid improper block, this document further describes using SPA information and routing information to generate the allowlist SAV rules.</t>
    </section>
    <section anchor="sav-using-spa-and-routing-information">
      <name>SAV Using SPA and Routing Information</name>
      <t>Each SAVNET router connected to an intra-domain stub network (e.g., a host network or a customer network) generates SPA information:</t>
      <ul spacing="normal">
        <li>
          <t>Stub Network Identifier (SNI): This identifier indicates the identity of a stub network. Every intra-domain stub network must have a unique SNI value. When advertising the IP information of the stub network, the router carries the SNI value with the IP information.</t>
        </li>
      </ul>
      <t>After generating SPA information, each SAVNET router will provide its SPA information to other SAVNET routers when advertising the IP information of the stub network. SPA information communication can be implemented by using IGP or iBGP. During the propagation of IGP or iBGP messages, SAVNET routers can learn both routing information and SPA information. Specific protocol designs for SPA information communication are not in the scope of this document.</t>
      <t>After receiving SPA information from other SAVNET routers, SAVNET routers connected to an intra-domain stub network (e.g., a host network or a customer network) generate allowlist SAV rules as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>Considering all stub networks connected to the router, create a set of SNI values of these stub network. Call it Set A.</t>
        </li>
        <li>
          <t>Considering all SPA information, for each SNI value in Set A, create a set of unique source prefixes that have the same SNI value. Include these prefixes into the allowlist SAV rule at router interfaces facing the stub network which has the same SNI value.</t>
        </li>
      </ol>
    </section>
    <section anchor="sec-usecases">
      <name>Use Case</name>
      <section anchor="sav-on-host-facing-routers-customer-facing-routers-and-as-border-routers">
        <name>SAV on Host-facing Routers, Customer-facing Routers, and AS Border Routers</name>
        <t>SPA-based SAVNET is used on host-facing Routers, customer-facing Routers, and AS border routers in an intra-domain network. <xref target="fig-use-case1"/> shows an example. Customer Network is multi-homed to Routers A and B. Host Network is single-homed to Router C. Routers D and E are connected to external ASes. Data packets from Customer Network can use source addresses in prefixes P1 and P2. Data packets from Host Network can use source addresses in prefix P3. P' is the source IP address space for intra-domain router IPs and link IPs. Assume there is an asymmetric forwarding behavior or an asymmetric route among Router A, Router B, and Customer Network due to traffic engineering and load balance. For example, Router A forwards only data packets with destination addresses in prefix P1 to Customer Network while Router B forwards only data packets with destination addresses in prefix P2 to Customer Network. However, Customer Network will sends data packets with source addresses in prefixes P1 and P2 to both routers. In this case, as described in <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>, strict uRPF on Router A's Interface # will improperly block data packets with source addresses in prefix P2 and strict uRPF on Router B's Interface # will improperly block data packets with source addresses in prefix P1.</t>
        <figure anchor="fig-use-case1">
          <name>An example of the most recommended use case of SPA-based SAVNET</name>
          <artwork><![CDATA[
            +----------------------------------+                    
            |            Other ASes            |                    
            +----------------------------------+                    
               |                             |                      
+--------------|-----------------------------|--------+             
|   AS         |                             |        |             
|        +-----#----+                  +-----#----+   |             
|        | Router D | -----------------| Router E |   |             
|        +----------+                  +----------+   |             
|              |                             |        |             
|              |                             |        |             
|              |                             |        |             
|        +----------+                  +----------+   |             
|        | Router F |                  | Router G |   |             
|        +----------+                  +----------+   |             
|         /         \                        |        |             
|        /           \                       |        |             
|       /             \                      |        |             
| +----------+   +----------+          +----------+   |             
| | Router A |---| Router B +----------+ Router C |   |             
| +----#-----+   +-------#--+          +-----#----+   |             
|       \               /                    |        |             
|        \             /                     |        |             
|         \           /                      |        |             
|        +--------------+            +--------------+ |             
|        |   Customer   |            |    Host      | |             
|        |   Network    |            |   Network    | |             
|        |  (P1 and P2) |            |    (P3)      | |             
|        +--------------+            +--------------+ |             
+-----------------------------------------------------+                                   
 FIB of Router A:              FIB of Router B:
 Dest   Next_hop               Dest   Next_hop
 P1     Customer Network       P2     Customer Network
 P2     Router B               P1     Router A

SAV Rules generated by SPA-based SAVNET:
- Allowlist at Router A's Interface #: [P1, P2]
- Allowlist at Router B's Interface #: [P1, P2]
- Allowlist at Router C's Interface #: [P3]
- Blocklist at Router D's Interface #: [P1, P2, P3, P']
- Blocklist at Router E's Interface #: [P1, P2, P3, P']
]]></artwork>
        </figure>
        <t>When deploying SPA-based SAVNET in this AS, SAVNET Routers A, B, and C will provide SPA information to other SAVNET routers. By using the SPA and routing information, Routers A and B will include both prefixes P1 and P2 in the allowlist at the Interface #, because both prefixes have the SNI value of Customer Network, even if the prefix that routers A and B learn from the local route to Customer Network may be different. Router C will include prefix P3 in the allowlist at its Interface #. Routers D and E will include all internal prefixes in the blocklist at their Interfaces #.</t>
      </section>
      <section anchor="a-special-scenario-direct-server-return-dsr">
        <name>A Special Scenario: Direct Server Return (DSR)</name>
        <t>In the case of DSR, the content server in a stub network will send data packets using source addresses of the anycast server in another AS (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>). To avoid blocking these special data packets, these specially used source addresses must be added into the allowlist SAV rule at interfaces facing a stub network where the content server locates. Since routers as well as current routing architecture do not have this information, this may requires manual configuration.</t>
      </section>
    </section>
    <section anchor="considerations-of-sav-on-inner-routers">
      <name>Considerations of SAV on Inner Routers</name>
      <t>Host-facing routers, customer-facing routers, and AS border routers serve as key vantage points for performing intra-domain SAV. These routers can effectively prevent spoofing traffic from entering the intra-domain router network, ensuring a more secure and reliable routing environment. In addition to these routers, inner routers (such as Routers F and G in <xref target="fig-use-case1"/>) may also be able to use SPA information to perform SAV. They can use SPA information together with topology information learned from the IGP to infer the possible incoming directions for a source prefix. However, performing SAV on inner routers may be inefficient in certain network topologies, such as mesh networks. This is because every inner router may receive legitimate data packets with the same source IP address from multiple or even all directions. As a result, the use case of SAV on inner routers is limited.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations described in <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/> and <xref target="I-D.ietf-savnet-intra-domain-architecture"/> also applies to this document.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="I-D.huang-savnet-sav-table" target="https://datatracker.ietf.org/doc/html/draft-huang-savnet-sav-table-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.huang-savnet-sav-table.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <date day="10" month="December" year="2024"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-08"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-problem-statement-15" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="7" month="April" year="2025"/>
            <abstract>
              <t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the basic requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-15"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-architecture-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="14" month="October" year="2024"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms [RFC3704] that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL-based ingress filtering [RFC2827] that entirely requires manual efforts to accommodate to network dynamics, SAVNET routers learn SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-architecture-01"/>
        </reference>
      </references>
    </references>
    <?line 219?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
