<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-idr-bgp-savnet-03" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="BGP Extensions for SAVNET">BGP Extensions for Source Address Validation Networks (BGP SAVNET)</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-idr-bgp-savnet-03"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="Z." surname="Li" fullname="Zhenbin Li">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lizhenbin@huawei.com</email>
      </address>
    </author>
    <author initials="Z." surname="Tan" fullname="Zhen Tan">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tanzhen6@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Liu" fullname="Mingxing Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liumingxing7@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="F." surname="Gao" fullname="Fang Gao">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gaofang@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2023" month="November" day="23"/>
    <area>Routing</area>
    <workgroup>IDR</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 84?>

<t>Many source address validation (SAV) mechanisms have been proposed for preventing source address spoofing. However, existing SAV mechanisms are faced with the problems of inaccurate validation or high operational overhead in some scenarios. This document proposes BGP SAVNET by extending BGP protocol for SAV. This protocol can propagate SAV-related information through BGP messages. The propagated information will help edge/border routers automatically generate accurate SAV rules. These rules construct a validation boundary for the network and help check the validity of source addresses of arrival data packets.</t>
    </abstract>
  </front>
  <middle>
    <?line 88?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source address validation (SAV) is essential for preventing source address spoofing attacks (<xref target="RFC6959"/>) and helps trace back network attackers. For a network, SAV mechanisms can be deployed on edge routers or border routers for validating the packets from the connected subnets or neighboring ASes <xref target="manrs-antispoofing"/>.</t>
      <t>ACL-based ingress filtering (<xref target="RFC2827"/>, <xref target="RFC3704"/>) and Source-based RTBH ([RFC5635]) can be used for source address filtering. However, the two mechanisms are not specific for SAV. High operational overhead may be induced if they are managed mostly by manual configurations <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/><xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. Many SAV mechanisms, such as strict uRPF, loose uRPF, FP-uRPF, VRF-uRPF, and EFP-uRPF (<xref target="RFC3704"/>, <xref target="RFC8704"/>), leverage local routing information (FIB/RIB) to automatically generate SAV rules. The rules indicate the wanted incoming interfaces of source addresses and deny source addresses coming from unwanted interfaces <xref target="I-D.huang-savnet-sav-table"/>. The uRPF mechanisms can achieve good automation but may have inaccurate validation problems under asymmetric routing <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/><xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. This is because these uRPF mechanisms are "single-point" designs. They leverage the local FIB or local RIB table to determine the valid incoming interfaces for source addresses, which may not match the real incoming interfaces. That is, purely relying on local routing information for SAV is not enough for achieving both good automation and high accuracy</t>
      <t>This document proposes extensions of BGP protocol for SAV networks, named as BGP SAVNET. Unlike existing "single-point" mechanisms, BGP SAVNET allows coordination between the routers within a network or in different ASes by propagating SAV-specific information through extended BGP messages <xref target="I-D.li-savnet-intra-domain-architecture"/><xref target="I-D.wu-savnet-inter-domain-architecture"/>. SAV-specific information supplements the missing part of the local route information and assists routers to generate accurate SAV rules. The following figure shows a comparison of existing uRPF mechanisms and BGP SAVNET.</t>
      <artwork><![CDATA[
+-------------+  Normal BGP  +------------+ (Good automation
| Routing     |--------------> uRPF       | but inaccurate
| Information |\             | Mechanisms | under asymmetric
+-------------+ \            +------------+ routing)
                 \ Normal BGP
                  +-------------+
                                |
+-------------+              +--\/--------+ (Accurate SAV
| SAV-specific| Extended BGP | BGP        | rules and adaptive to
| Information |--------------> SAVNET     | various scenarios)
+-------------+              +------------+
]]></artwork>
      <t>The BGP SAVNET protocol is suitable to generating SAV rules for both IPv4 and IPv6 addresses. The SAV rules can be used for validating any native IP packets or IP-encapsulated packets.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV: Source address validation, an approach to preventing source address spoofing.</t>
        <t>SAV Rule: The rule that indicates the valid incoming interfaces for a specific source prefix.</t>
        <t>SAV Table: The table or data structure that implements the SAV rules and is used for source address validation in the data plane.</t>
        <t>Internal (or Local) Source Address: The source addresses owned by the subnets of local AS. The source addresses of the connection link between subnets and local AS can also be considered as internal source addresses.</t>
        <t>External (or Remote) Source Address: The source addresses owned by other ASes. Some source addresses like anycast addresses can be both internal and external source addresses.</t>
        <t>Local Routing Information: The information in a router's local RIB or FIB that can be used to infer SAV rules.</t>
        <t>SAV-specific Information: The information specialized for SAV rule generation, which is exchanged among routers.</t>
        <t>Edge Router: An intra-domain router for an AS that is directly connected to a subnet of the AS.</t>
        <t>Border Router: An intra-domain router for an AS that is connected to other ASes. A router in an AS can be both an edge router and a border router, if it is connected to both the AS's subnets and other ASes.</t>
        <t>Source AS: The AS whose source prefixes need to be validated at Validation AS.</t>
        <t>Validation AS: The AS that conducts SAV for the source prefixes of Source AS.</t>
        <t>SPA: Source prefix advertisement, i.e., the process for advertising the origin source addresses/prefixes of a router or an AS.</t>
        <t>SPD: Source path discovery, i.e., the process for discovering the real incoming directions of particular source addresses/prefixes.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-relat">
      <name>BGP Protocol Relationship</name>
      <t>The BGP extensions for BGP SAVNET follow a backward compatible manner without impacting existing BGP functions. New BGP SAVNET subsequent address families will be introduced under the IPv4 address family and the IPv6 address family, respectively. The BGP UPDATE message (specifically the MP_REACH_NLRI and the MP_UNREACH_NLRI attributes) and the BGP Refresh message will be extended. AFI and SAFI will be used for distinguishing the BGP SAVNET messages from other messages.</t>
      <t>A few existing path attributes such as Originator_ID and Clister_list or newly defined path attributes <bcp14>MAY</bcp14> be used for BGP SAVNET. Actually, most existing path attributes are not necessarily required for BGP SAVNET. However, if the unnecessary path attributes are carried in BGP updates, they will be accepted, validated, and propagated consistent with the BGP protocol.</t>
    </section>
    <section anchor="sec-solution">
      <name>BGP SAVNET Solution</name>
      <section anchor="goals">
        <name>Goals</name>
        <t>For an AS, the goal of BGP SAVNET is to construct a validation boundary for the AS. SAV-specific information propagated by extended BGP messages can assist edge and border routers on the network boundary to generate SAV rules. Edge routers connected to subnets generate rules for validating packets from users, while border routers connected to other ASes generate rules for validating packets from other ASes. <xref target="fig-goal"/> shows the example of validation boundary for an AS</t>
        <figure anchor="fig-goal">
          <name>An example of validation boundary for an AS</name>
          <artwork><![CDATA[
        +-----+           +-----+
        | AS3 |           | AS4 |
        +-----+           +-----+
             \             /
+-------------\-----------/-------------+
| AS2        +-#--+   +--#-+            |
|            | R7 |---| R8 |            |
|            +----+   +----+            |
|              |         |              |
|            +----+   +----+            |
|      ------| R5 |---| R6 |------      |
|      |     +----+   +----+     |      |
|      |       |         |       |      |
|   +----+   +----+   +----+   +----+   |
|   | R1 |   | R2 |---| R3 |   | R4 |   |
|   +--*-+   +-*--+   +--#-+   +-#--+   |
+-------\-----/-----------\-----/-------+
       +-------+          +-----+
       |Subnet1|          | AS1 |
       +-------+          +-----+
]]></artwork>
        </figure>
        <t>From a perspective of an AS, source addresses can be largely classified into two categories: internal (or local) source address and external (or remote) source address. The BGP SAVNET solution consists two parts: intra-domain BGP SAVNET and inter-domain BGP SAVNET. The parts of solution focus on the validation of internal and external source address, respectively.</t>
        <ul spacing="normal">
          <li>
            <t>Intra-domain BGP SAVNET: SAV for protecting internal source addresses. In <xref target="fig-goal"/>, it can be deployed at '*' or '#' to restrict a subnet to use only its own internal source addresses and to block external packets from other ASes with any internal source addresses. SAV rules are generated without any cooperation or interactions (such as prefix advertisements) between the local AS and subnets/other ASes.</t>
          </li>
          <li>
            <t>Inter-domain BGP SAVNET: SAV for protecting external source addresses. In <xref target="fig-goal"/>, it can be deployed at '#' for blocking the source addresses of packets coming from unwanted directions (i.e., coming from unwanted neighbor ASes). Cooperation or interactions between the local AS and other ASes are required.</t>
          </li>
        </ul>
      </section>
      <section anchor="intra-domain-bgp-savnet">
        <name>Intra-domain BGP SAVNET</name>
        <t><xref target="fig-intra-savnet"/> shows an example of intra-domain BGP SAVNET. Router 1 and Router 2 are edge routers that enable SAV at the interfaces connected to subnets. Router 3 is a border router that conducts SAV at the interfaces connected to other ASes.</t>
        <t>In general, there are four types of interfaces:</t>
        <ul spacing="normal">
          <li>
            <t>Single-homing interface. When a subnet has only one uplink connected to the upper-layer network, the connected interface at the edge router of upper-layer network can be defined as a "Sigle-homing interface", e.g., Intf.1 in <xref target="fig-intra-savnet"/>.</t>
          </li>
          <li>
            <t>Complete multi-homing interface. When a subnet has dual or multiple uplinks that connect to a single upper-layer network with BGP SAVNET deployed, the connected interfaces at the edge routers of upper-layer network are called "Complete multi-homing interfaces", which corresponds to Intf.2 and Intf.3 in <xref target="fig-intra-savnet"/>.</t>
          </li>
          <li>
            <t>Incomplete multi-homing interface. When a subnet has dual or multiple uplinks that are connected to multiple upper-layer networks, the interfaces at the edge routers of upper-layer network are called the "Incomplete multi-homing interfaces", which corresponds to Intf.4 in <xref target="fig-intra-savnet"/>.</t>
          </li>
          <li>
            <t>Internet interface. It's the external interfaces that are connected to the Internet on border routers. Typically, a network usually has multiple Internet interfaces for load balancing or backup, which corresponds to Intf.5 and Intf.6 in <xref target="fig-intra-savnet"/>.</t>
          </li>
        </ul>
        <figure anchor="fig-intra-savnet">
          <name>An example of intra-domain BGP SAVNET</name>
          <artwork><![CDATA[
+-----------------------------------------+
|               Other ASes                |
+-----------------------------------------+
              |      |                |
              |      |                |
+-------------|------|----------------|---+
| AS          |      |                |   |
|       Intf.5|      |Intf.6          |   |
|           +-*------*-+              |   |
|           | Router 3 |              |   |
|           +----------+              |   |
|              /     \                |   |
|             /       \               |   |
|            /         \              |   |
|   +----------+     +----------+     |   |
|   | Router 1 |     | Router 2 |     |   |
|   +--#-----#-+     +-#-----*--+     |   |
|Intf.1|Intf.2\ Intf.3/       \Intf.4 |   |
|      |       \     /         \      |   |
|      |        \   /           \     |   |
|   Subnet1    Subnet2           Subnet3  |
|                                         |
+-----------------------------------------+

Intf '#' enables prefix allowlist
Intf '*' enables prefix blocklist

]]></artwork>
        </figure>
        <t>The goal of intra-domain BGP SAVNET is to generate source prefix allowlist or blocklist for the interfaces on edge or border routers. For the "Single-homing interface" and "Complete multi-homing interface", prefix allowlist is applied (i.e., "Interface-based prefix allowlist" mode in <xref target="I-D.huang-savnet-sav-table"/>). The prefix allowlist of an interface should only include all the source prefixes of the connected subnet and denys any source addresses not covered by the prefixes in the list. In <xref target="fig-intra-savnet"/>, the prefix allowlist of Intf. 1 should only include all the source prefixes of Subnet1, and the prefix allowlists of Intf. 2 and Intf. 3 should only include all the source prefixes of Subnet2.</t>
        <t>For "Incomplete multi-homing interface" and "Internet interface", prefix blocklist is enabled (i.e., "Interface-based prefix blocklist" mode in <xref target="I-D.huang-savnet-sav-table"/>). For a specific interface, its prefix blocklist should include the internal prefixes that are owned by the subnets connected to "Single-homing interfaces" and "Complete multi-homing interfaces". In <xref target="fig-intra-savnet"/>, the prefix blocklist of Intf. 4, Intf. 5, and Intf. 6 should include all the source prefixes of Subnet1 and Subnet2. The reason why "Incomplete multi-homing interface" like Intf. 4 not using prefix allowlist is that the local AS itself can hardly learn the complete set of source prefixes of Subnet3 if the subnet advertises asymmetric prefixes to the multi-homed up-layer networks (i.e., the local AS is one of the up-layer networks).</t>
        <t>The above goal should be achieved while meeting two requirements of high accuracy (even under asymmetric routing) and good automation. To this end, Source Prefix Advertisement (SPA) process is designed in intra-domain BGP SAVNET solution. During the SPA process, edge routers will proactively announce all the source prefixes learned by local "Single-homing interfaces" and local "Complete multi-homing interfaces" from the connected subnets via SPA messages. Some related information of each announced source prefix will also be propagated together with the source prefix. The related information of each announced source prefix can be:</t>
        <ul spacing="normal">
          <li>
            <t>Multi-homing Interface Group Type (MIIG-Type): It indicates the type of the interface that learns the prefix. MIIG-Type <bcp14>MUST</bcp14> be one of the four types mentioned above.</t>
          </li>
          <li>
            <t>Multi-homing Interface Group Tag (MIIG-Tag): It is to identify the subnet of the prefix. The prefixes belonging to the same subnet <bcp14>MUST</bcp14> have the identical MIIG-Tag value. Different subnets <bcp14>MUST</bcp14> have different MIIG-tag values.</t>
          </li>
          <li>
            <t>(Only) Source Flag: It indicates whether the prefix is owned by one subnet. By default, the flag is set because most of the prefixes are owned by one network. For anycast addresses/prefixes or direct server return (DSR) addresses/prefixes <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>, the flag should be unset (possibly manually).</t>
          </li>
        </ul>
        <t>It can be seen that the SPA message of a source prefix includes four parts: source prefix, MIIG-Type, MIIG-Tag, and Source Flag. Next, how to use the SPA messages to generate SAV rules will be introduced.</t>
        <ul spacing="normal">
          <li>
            <t>In the case of "Single-homing interface", the prefix allowlist can be generated only through local routing information (i.e., local RIB), without the engagement of SPA messages. The method building the allowlist is, each Dest Prefix in RIB that records this interface as an outgoing interface will be added to the prefix allowlist.</t>
          </li>
          <li>
            <t>In the case of "Complete multi-homing interface", in addition to collecting prefixes of the target interface itself in local RIB, routers also need merge prefixes from the received SPA messages and other local interfaces into the allowlist to construct a complete list. First, the prefixes in received SPA, which take the same "MIIG-Type" and "MIIG-Tag" values as the target interface, are added to the allowlist. Second, if there are local interfaces having the same "MIIG-Type" and "MIIG-Tag" values, they will share prefixes collected from local RIB into each other's allowlist.</t>
          </li>
          <li>
            <t>Routers with "Incomplete multi-homing interface" or "Internet interface" will generate prefix blocklist for the target interface. First, the prefixes of local "Single-homing interfaces" or "Complete Multi-homing interfaces" on the local router will be put into the blocklist. Second, the prefixes in the received SPA messages which have the MIIG-Types of either "Single-homing interface" or "Complete Multi-homing interface" but with Source Flag being set, will also be added into the blocklist. The prefix with Source Flag being unset will not be included into the blocklist because the prefix is multi-source and the "Incomplete multi-homing interface" or "Internet interface" may be the legitimate incoming interface of the multi-source prefix.</t>
          </li>
        </ul>
        <t>Note that, intra-domain BGP SAVNET solution can also work if the subnet is a stub AS (e.g., the subnets are replaced with stub ASes in <xref target="fig-intra-savnet"/>). The source prefixes of the stub AS can be considered as the internal prefixes of the local AS when conducting the solution.</t>
      </section>
      <section anchor="inter-domain-bgp-savnet">
        <name>Inter-domain BGP SAVNET</name>
        <t>As described previously, inter-domain BGP SAVNET is for protecting external source addresses that are owned by other ASes (usually remote ASes). Cooperation or interactions between the local AS and other ASes are required.</t>
        <t>The local AS that deploys inter-domain BGP SAVNET and conducts validation on the external source addresses is defined as Validation AS. Source AS is defined as the AS whose source prefixes need to be validated at Validation AS. For any AS, it can be configured as Source AS or Validation AS, or it can also act as both Source AS and Validation AS.</t>
        <t>The goal of inter-domain BGP SAVNET is to help Validation AS generate prefix blocklist for the source prefixes of Source AS at the proper external interfaces of Validation AS. Which source prefixes that need to be validated and which external interfaces should block these prefixes depend on the indication of Source AS. Inter-domain BGP SAVNET provides the communication channel for Source AS and Validation AS.</t>
        <t><xref target="fig-inter-savnet"/> shows an example of inter-domain BGP SAVNET. AS 1 and AS 4 have deployed SAVNET on the border routers (i.e., ASBRs) connected to other ASes. 
Suppose AS 1 is configured as Source AS and AS 4 acts as Validation AS. In the example, AS 4 can help block P1 of AS 1 at the interfaces connected to specific neighbor ASes.</t>
        <figure anchor="fig-inter-savnet">
          <name>An example of inter-domain BGP SAVNET</name>
          <artwork><![CDATA[
       +----------------+    +----------------+
       |   AS 5 (P5)    |    |   AS 6 (P6)    |
       +-----------+/\+-+    +-+/\+-------+/\++
                     \          /          |
                      \        /           |
                       \      /            |
                        \    /             |
                   +----------------+      |
                   |   AS 4 (P4)    |      |
                   | SAVNET deployed|      |
                   ++/\+---+----+/\++      |
                     /     ^      \        |
                    /      ^       \       |
                   /       ^        \      |
                  /        ^         \     |
  +----------------+       ^       +----------------+
  |   AS 2 (P2)    |       ^       |   AS 3 (P3)    |
  +----------+/\+--+       ^       +--+/\+----------+
               \           ^           /
                \          ^          /
                 \         ^         /
                  \        ^        /
                  +--------+-------+
                  |    AS 1 (P1)   |
                  | SAVNET deployed|
                  +----------------+
RIB in AS 1:
To P2, preferred AS_PATH = [AS 2]
To P3, preferred AS_PATH = [AS 3]
To P4, preferred AS_PATH = [AS 2, AS 4]
To P5, preferred AS_PATH = [AS 3, AS 4, AS 5]
To P6, preferred AS_PATH = [AS 3, AS 4, AS 6]
]]></artwork>
        </figure>
        <t>When Source AS and Validation AS enable BGP SAVNET, a BGP SAVNET session between the two ASes will be established. <xref target="fig-inter-savnet"/> shows the session between AS 1 and AS 4 by "&gt;&gt;&gt;&gt;&gt;". 
The solution of inter-domain BGP SAVNET consists of two processes: SPA and Source Path Discovery (SPD).</t>
        <ul spacing="normal">
          <li>
            <t>SPA process: Source AS advertises its own AS number and its own source prefixes to Validation AS through SPA messages. SPA messages contain the complete set of source prefixes of Source AS or only the source prefixes that want to be protected. Some hidden source prefixes that do not appear can also be advertised to Validation AS through SPA messages. The advertised source prefixes <bcp14>MUST</bcp14> be authorized to Source AS by RPKI ROAs. When Validation AS receives the messages, it <bcp14>MUST</bcp14> conduct ROV on the messages and only stores the target source prefixes with the "valid" ROV state. The "Unknown" and "Invalid" target source prefixes will be ignored. In <xref target="fig-inter-savnet"/>, P1 <bcp14>MUST</bcp14> be authorized to AS 1, and then AS 1 advertises its own AS number and P1 to AS 4 through an SPA message.
            </t>
            <ul spacing="normal">
              <li>
                <t>Validation AS can also obtain the target source prefixes directly from RPKI ROAs or other RPKI data.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>SPD process: After SPA process, Source AS can send SPD messages to Validation AS for notifying the wanted incoming directions of target source prefixes. 
That is, Source AS can specify from which neighbor ASes of Validation AS the target source prefixes will arrive. Validation AS will learn the specified incoming directions of target source prefixes and will use prefix blocklist for denying the target source prefixes coming from unwanted directions (neighbor ASes). The wanted incoming directions of target source prefixes can be obtained via the following methods for different purposes:  </t>
            <ul spacing="normal">
              <li>
                <t>Automatically obtained from the RIB of Source AS. In <xref target="fig-inter-savnet"/>, AS 1 can specify that AS 2 and AS 3 are the wanted incoming directions of P1. AS 4 will block the packets with source addresses of P1 coming from neighbor ASes of AS 5 and AS 6. The use cases can be 1) proactive SAV for customer's prefixes or 2) key source address's forwarding path protection (i.e., keeping control plane path and data plane path consistent).</t>
              </li>
              <li>
                <t>Obtained from security center of Source AS or Validation AS. Security center can detect source address-spoofed DDoS attacks and disseminates rules through BGP SAVNET to reactively filter source address at specific interfaces for mitigating DDoS suffered by customers.</t>
              </li>
              <li>
                <t>Obtained from RPKI ASPA records or other RPKI data.</t>
              </li>
            </ul>
          </li>
        </ul>
        <!-- Note that, the backup paths should be considered by Source AS when it advertises SPD messages. Otherwise, the backup paths may break due to the SAV rules on Validation AS.  -->

</section>
    </section>
    <section anchor="sec-peering">
      <name>BGP SAVNET Peering Models</name>
      <section anchor="full-mesh-ibgp-peering">
        <name>Full-mesh IBGP Peering</name>
        <t>This peering model is for both intra- and inter-domain BGP SAVNET. In this model, Edge or border routers enabling BGP SAVNET <bcp14>MUST</bcp14> establish full-mesh iBGP sessions either through direct iBGP sessions or route-reflectors. SAVNET messages within an AS can be advertised through the full-mesh BGP SAVNET sessions. The extensions of BGP messages for carrying SAVNET messages will be introduced in <xref target="sec-extension"/>.</t>
      </section>
      <section anchor="ebgp-peering-between-ases">
        <name>EBGP Peering between ASes</name>
        <t>Inter-domain BGP SAVNET requires eBGP sessions which can be single-hop or multi-hop. In this peering model, for the AS enabling BGP SAVNET, at least one border router in Source AS <bcp14>MUST</bcp14> establish the BGP SAVNET sessions with the border routers in Validation AS. SAVNET messages between ASes will be advertised through these sessions. The extensions of BGP messages for carrying SAVNET messages will be introduced in <xref target="sec-extension"/>.</t>
      </section>
    </section>
    <section anchor="sec-extension">
      <name>BGP SAVNET Protocol Extension</name>
      <section anchor="bgp-savnet-safi">
        <name>BGP SAVNET SAFI</name>
        <t>To make good isolation with existing BGP services, this section defines BGP SAVNET SAFIs under the IPv4 address family and the IPv6 address family, respectively.  The values require IANA registration as specified in <xref target="sec-iana"/>. Two BGP SAVNET speakers <bcp14>MUST</bcp14> establish a BGP SAVNET peer and <bcp14>MUST</bcp14> exchange the Multiprotocol Extensions Capability <xref target="RFC5492"/> to ensure that they are both capable of processing BGP SAVNET messages properly.</t>
      </section>
      <section anchor="bgp-savnet-nlri">
        <name>BGP SAVNET NLRI</name>
        <t>The BGP SAVNET NLRI is used to transmit SPA messages (either IPv4 or IPv6). The BGP SAVNET NLRI TLVs are carried in BGP UPDATE messages as (1) route advertisement carried within Multiprotocol Reachable NLRI (MP_REACH_NLRI) <xref target="RFC4760"/>, and (2) route withdraw carried within Multiprotocol Unreachable NLRI (MP_UNREACH_NLRI).</t>
        <t>While encoding an MP_REACH_NLRI attribute containing BGP SAVNET NLRI TLVs, the "Length of Next Hop Network Address" field <bcp14>SHOULD</bcp14> be set to 0 upon the sender. The "Network Address of Next Hop" field <bcp14>SHOULD</bcp14> not be encoded upon the sender, because it has a 0 length and <bcp14>MUST</bcp14> be ignored upon the receiver.</t>
        <section anchor="spa-tlvs-for-intra-domain-bgp-savnet">
          <name>SPA TLVs for Intra-domain BGP SAVNET</name>
          <t>The BGP SAVNET NLRI TLV each carries a SPA message including a source prefix and related information. Therefore, the NLRI TLV is called SPA TLV. This type of TLVs are used in SPA process within an AS. The format is shown below:</t>
          <figure>
            <name>SPA TLV format</name>
            <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RouteType (1) |   Length (1)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Origin router-id (4)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  MaskLen (1)  |        IP Prefix (variable)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MIIG-Type (1) | Flags (1)   |S|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                         MIIG-Tag (4)                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>The meaning of these fields are as follows:</t>
          <ul spacing="normal">
            <li>
              <t>RouteType (key): Type of the BGP SAVNET NLRI TLV, the value is 1 for SPA TLV within an AS.</t>
            </li>
            <li>
              <t>Length: The length of the BGP SAVNET NLRI value, the RouteType and Length fields are excluded.</t>
            </li>
            <li>
              <t>Origin router-id (key): The router ID of the originating node of the source prefix in the deployment domain.</t>
            </li>
            <li>
              <t>MaskLen (key): The mask length in bits, which also indicates the valid bits of the IP Prefix field.</t>
            </li>
            <li>
              <t>IP Prefix (key): IP address. The length ranges from 1 to 4 bytes for IPv4 and ranges from 1 to 16 bytes for IPv6. Format is consistent with BGP IPv4/IPv6 unicast address.</t>
            </li>
            <li>
              <t>MIIG-Type (non-key): Multi-homing Ingress Interface Group Type.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Type value 0: Unknown. Indicates that this prefix does not come from any subnets. It can be a local prefix or a local domain prefix.</t>
                </li>
                <li>
                  <t>Type value 1: Single-homing interface. Indicates that this prefix comes from a subnet that is single-homed to the local domain.</t>
                </li>
                <li>
                  <t>Type value 2: Complete multi-homing interface. Indicates that this prefix comes from a subnet that is multi-homed to the local domain, and is connected only to the local domain.</t>
                </li>
                <li>
                  <t>Type value 3: Incomplete multi-homing interface. Indicates that this prefix comes from a subnet that is multi-homed to the local domain and other domains.</t>
                </li>
                <li>
                  <t>Type value 4: Internet interface. Indicates that this prefix comes from a interface that is connected to the Internet.</t>
                </li>
                <li>
                  <t>Type value 5~255: Reserved for future use.</t>
                </li>
                <li>
                  <t>Notes: The type values of 3 and 4 are pre-defined for future use, and they should not appear in SPA TLVs (i.e., no need to advertise the prefixes from the interfaces of Type 3 and Type 4).</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Flags (non-key): Bitmap, indicating the attribute flag of the SPA prefix, currently taken:
              </t>
              <ul spacing="normal">
                <li>
                  <t>bit 0 (S bit) : Source Flag. The value of 1 indicates that the SPA prefix is owned by one subnet. The value of 0 indicates that the SPA prefix is not owned by only one subnet.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>MIIG-Tag (non-key): Multi-homing Ingress Interface Group Tag. The value ranges from 1 to 0xFFFFFFFF. The value 0 is invalid and the value 0xFFFFFFFF is reserved.</t>
            </li>
          </ul>
        </section>
        <section anchor="spa-tlvs-for-inter-domain-bgp-savnet">
          <name>SPA TLVs for Inter-domain BGP SAVNET</name>
          <t>This type of TLVs are used in SPA process between ASes.</t>
          <figure>
            <name>SPA TLV format</name>
            <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RouteType (1) |   Length (1)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Source AS Number (4)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  MaskLen (1)  |        IP Prefix (variable)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Flags (1)    |
+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>The meaning of these fields are as follows:</t>
          <ul spacing="normal">
            <li>
              <t>RouteType (key): Type of the BGP SAVNET NLRI TLV, the value is 2 for SPA TLV between ASes.</t>
            </li>
            <li>
              <t>Length: The length of the BGP SAVNET NLRI value, the RouteType and Length fields are excluded.</t>
            </li>
            <li>
              <t>Source AS Number (key): The AS number of the originating AS of this advertised source prefix.</t>
            </li>
            <li>
              <t>MaskLen (key): The mask length in bits, which also indicates the valid bits of the IP Prefix field.</t>
            </li>
            <li>
              <t>IP Prefix (key): IP address. The length ranges from 1 to 4 bytes for IPv4 and ranges from 1 to 16 bytes for IPv6. Format is consistent with BGP IPv4/IPv6 unicast address.</t>
            </li>
            <li>
              <t>Flags (non-key): Reserved for future use.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="bgp-savnet-refresh">
        <name>BGP SAVNET Refresh</name>
        <t>Two BGP SAVNET speakers <bcp14>MUST</bcp14> exchange Route Refresh Capability <xref target="RFC2918"/> to ensure that they are both capable of processing the SPD message carried in the BGP Refresh message.</t>
        <t>The SPD TLV is carried in a BGP Refresh message after the BGP Refresh message body, as follows:</t>
        <figure>
          <name>BGP-REFRESH with SPD TLV format</name>
          <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              AFI (2)          |  Subtype (1)  |     SAFI (1)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                       SPD TLV (variable)                      |
~                                                               ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The AFI field is either 1 (IPv4) or 2 (IPv6). The SAFI field is the newly defined SAVNET SAFI. The Subtype field should be a new value assigned to SAVNET <xref target="RFC7313"/>. 
By carrying an SPD TLV, a BGP SAVNET Refresh message <bcp14>MUST NOT</bcp14> be processed as a Route-Refresh (as a re-advertisement request) and <bcp14>SHOULD</bcp14> only be used in the SPD process. A BGP SAVNET Refresh message without an SPD TLV <bcp14>SHOULD</bcp14> be processed as a Route-Refresh as defined in Route Refresh Capability <xref target="RFC2918"/>.</t>
        <section anchor="the-spd-tlvs-for-inter-domain-bgp-savnet">
          <name>The SPD TLVs for Inter-domain BGP SAVNET</name>
          <t>This type of TLVs are used in SPD process between ASes.</t>
          <figure>
            <name>SPD TLV format</name>
            <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Type (1)   |   SubType (1)  |            Length (2)         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Sequence Number (4)                    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Origin router-id (4)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Source AS Number (4)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      Validation AS Number (4)                 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Optional Data Length (2)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Optional Data (variable)               |
~                                                               ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                     Neighbor AS Number List (variable)        |
~                                                               ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>The meaning of these fields are as follows:</t>
          <ul spacing="normal">
            <li>
              <t>Type: TLV Type, the value is 2 for SPD TLV.</t>
            </li>
            <li>
              <t>SubType: TLV Sub-Type, value is 2 for SPD TLV between an AS.</t>
            </li>
            <li>
              <t>Length: The length of the SPD TLV value, the Type, SubType and Length fields are excluded.</t>
            </li>
            <li>
              <t>Sequence Number: Indicates the sequence of Source Path Discovery process. The initial value is 0 and the value increases monotonically.</t>
            </li>
            <li>
              <t>Origin router-id: The router ID of the originating node of the Source Path Discovery process.</t>
            </li>
            <li>
              <t>Source AS Number (key): The AS number of the source AS whose source prefixes need to be validated in the validation AS.</t>
            </li>
            <li>
              <t>Validation AS Number (key): The AS number of the validation AS who conducts validation for the source prefixes of source AS.</t>
            </li>
            <li>
              <t>Optional Data Length: The length of the optional data field in bytes. The value can be 0 when there is no optional data.</t>
            </li>
            <li>
              <t>Optional Data: Reserved for future use.</t>
            </li>
            <li>
              <t>Neighbor AS Number List: List of neighbor AS, from which the validation AS will receive the data packets with the source prefixes of the source AS.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="sec-dp">
      <name>Decision Process with BGP SAVNET</name>
      <t>The Decision Process described in <xref target="RFC4271"/> works to determines a degree of preference among routes with the same prefix. The Decision Process involves many BGP Path attributes, which are not necessary for BGP SAVNET SPA and SPD process, such as next-hop attributes and IGP-metric attributes. Therefore, this document introduces a simplified Decision Process for SAVNET SAFI.</t>
      <t>The purpose of SPA is to maintain a uniform Source Prefix list, which is the mapping from original router-id to IP addresses, across all routers in the deploy domain. To ensure this, it is <bcp14>RECOMMENDED</bcp14> that all routers deploy no ingress or egress route-policies for BGP SAVNET.</t>
      <section anchor="bgp-savnet-nlri-selection">
        <name>BGP SAVNET NLRI Selection</name>
        <t>The Decision Process described in <xref target="RFC4271"/> no longer apply, and the Decision Process for BGP SAVNET NLRI are as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>The locally imported route is preferred over the route received from a peer.</t>
          </li>
          <li>
            <t>The route received from a peer with the numerically larger originator is preferred.</t>
          </li>
          <li>
            <t>The route received from a peer with the numerically larger Peer IP Address is preferred.</t>
          </li>
        </ol>
        <section anchor="self-originated-nlri">
          <name>Self-Originated NLRI</name>
          <t>BGP SAVNET NLRI with origin router-id matching the local router-id is considered self-originated. All locally imported routes should be considered self-originated by default.</t>
          <t>Since the origin router-id is part of the NLRI key, it is very unlikely that a self-originated NLRI would be received from a peer. Unless a router-id conflict occurs due to incorrect configuration. In this case, the self-originated NLRI <bcp14>MUST</bcp14> be discarded upon the receiver, and appropriate error logging is <bcp14>RECOMMENDED</bcp14>.</t>
          <t>On the other hand, besides the route learn from peers, a BGP SAVNET speaker <bcp14>MUST NOT</bcp14> advertise NLRI which is not self-originated.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-error">
      <name>Error Handling</name>
      <section anchor="process-of-bgp-savnet-nlris">
        <name>Process of BGP SAVNET NLRIs</name>
        <t>When a BGP SAVNET speaker receives a BGP Update containing a malformed MP_REACH_NLRI or MP_UNREACH_NLRI, it <bcp14>MUST</bcp14> ignore the received TLV and <bcp14>MUST NOT</bcp14> pass it to other BGP peers. When discarding a malformed TLV, a BGP SAVNET speaker <bcp14>MAY</bcp14> log a specific error.</t>
        <t>If duplicate NLRIs exist in a MP_REACH_NLRI or MP_UNREACH_NLRI attribute, only the last one <bcp14>SHOULD</bcp14> be used.</t>
      </section>
      <section anchor="process-of-bgp-savnet-spa-tlvs">
        <name>Process of BGP SAVNET SPA TLVs</name>
        <t>When a BGP SAVNET speaker receives an SPA TLV with an undefined type, it <bcp14>SHOULD</bcp14> be ignored or stored without parsing.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with a 0 origin router-id, or the origin router-id is the same as the local router-id, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with an invalid MaskLen field, which is out of the range 1~32 for IPv4 and 1~128 for IPv6, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with an address field, whose length in bytes do not match with the remaining data, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with an unsupported MIIG-Type, it <bcp14>SHOULD</bcp14> be ignored or stored without parsing.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with a MIIG-Type 0 (Unkonwn), its MIIG-Tag <bcp14>MUST</bcp14> also be 0, vice versa. Otherwise this SPA TLV <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives a malformed SPA TLV, it <bcp14>MUST</bcp14> ignore the received TLV and <bcp14>MUST NOT</bcp14> pass it to other BGP peers. When discarding a malformed TLV, a BGP SAVNET speaker <bcp14>MAY</bcp14> log a specific error.</t>
        <t>When a BGP SAVNET speaker processes Flags in an SPA TLV, the defined bits <bcp14>MUST</bcp14> be processed and the undefined bits <bcp14>MUST</bcp14> be ignored.</t>
      </section>
      <section anchor="process-of-bgp-savnet-refresh">
        <name>Process of BGP SAVNET Refresh</name>
        <t>Each BGP Refresh message <bcp14>MUST</bcp14> contain at most one SPD TLV. When a BGP SAVNET speaker receives a BGP Refresh packet with multiple SPD TLVs, only the first one <bcp14>SHOULD</bcp14> be processed.</t>
      </section>
      <section anchor="process-of-bgp-savnet-spd-tlvs">
        <name>Process of BGP SAVNET SPD TLVs</name>
        <t>When a BGP SAVNET speaker receives an SPD TLV with an undefined type or subtype, it <bcp14>SHOULD</bcp14> be ignored.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with a 0 origin router-id, or the origin router-id is the same as the local router-id, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with a validation AS number, 0 source AS number, AS_TRANS number (23456), or the source AS number equals the validation AS number, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with an optional data sub-TLV that is an undefined type, it <bcp14>SHOULD</bcp14> be ignored.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with a DestList field that is not a multiple of 4 in length, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives a Refresh message with a malformed SPD TLV, it <bcp14>MUST</bcp14> ignore the received message. When discarding a malformed message, a BGP SAVNET speaker <bcp14>MAY</bcp14> log a specific error.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with a sequence number that does not match the local recorded sequence number:</t>
        <ul spacing="normal">
          <li>
            <t>If the newly received sequence number is numerically larger, the local recorded sequence number <bcp14>SHOULD</bcp14> be updated to the newly received sequence number.</t>
          </li>
          <li>
            <t>If the newly received sequence number is numerically smaller, the local recorded sequence number <bcp14>SHOULD NOT</bcp14> be updated, and the BGP SAVNET speaker <bcp14>SHOULD</bcp14> log a specific error.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-converge">
      <name>Convergence Considerations</name>
      <t>The convergence process of BGP SAVNET is relatively simple. First, the convergence process is mainly the message propagation process. BGP SAVNET messages should have similar propagation speed to normal routes. Second, BGP SAVNET supports independent and incremental update. Routers enable SAVNET can update local SAV rules immediately and there is no need to wait for complete information updates.</t>
    </section>
    <section anchor="sec-deploy">
      <name>Deployment Considerations</name>
      <t>Both intra- and inter-domain BGP SAVNET have good deployability. For intra-domain BGP SAVNET, upgrading part of routers can also work well. For example, only upgrade the routers (two or more) multi-homed by the same subnet, or upgrade one edge router and one border router. With more routers getting deployed, the network can get more protection. For inter-domain BGP SAVNET, any pair of ASes can upgrade and work well. There is no dependence on other ASes.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>Security problems are mainly in inter-domain scenarios.</t>
      <ul spacing="normal">
        <li>
          <t>For communication security, inter-domain BGP SAVNET takes a point-to-point communication model and thus has a simple trust model. The communication between source AS and validation AS can be protected by TLS.</t>
        </li>
        <li>
          <t>For content security, the advertised source prefixes of Source AS <bcp14>MUST</bcp14> be authorized to Source AS by RPKI ROAs. When Validation AS receives the messages, it <bcp14>MUST</bcp14> conduct ROV on the messages.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>The BGP SAVNET SAFIs under the IPv4 address family and the IPv6 address family need to be allocated by IANA.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the comments from Jeff Haas, Antoin Verschuren, Zhibin Dai, Keyur Patel, Shunwan Zhuang, David Lamparter, etc.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2918" target="https://www.rfc-editor.org/info/rfc2918" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2918.xml">
          <front>
            <title>Route Refresh Capability for BGP-4</title>
            <author fullname="E. Chen" initials="E." surname="Chen"/>
            <date month="September" year="2000"/>
            <abstract>
              <t>This document defines a new Border Gateway Protocol (BGP) capability termed 'Route Refresh Capability', which would allow the dynamic exchange of route refresh request between BGP speakers and subsequent re-advertisement of the respective Adj-RIB-Out. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2918"/>
          <seriesInfo name="DOI" value="10.17487/RFC2918"/>
        </reference>
        <reference anchor="RFC4760" target="https://www.rfc-editor.org/info/rfc4760" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4760.xml">
          <front>
            <title>Multiprotocol Extensions for BGP-4</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="D. Katz" initials="D." surname="Katz"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, L3VPN, etc.). The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4760"/>
          <seriesInfo name="DOI" value="10.17487/RFC4760"/>
        </reference>
        <reference anchor="RFC5492" target="https://www.rfc-editor.org/info/rfc5492" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5492.xml">
          <front>
            <title>Capabilities Advertisement with BGP-4</title>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <date month="February" year="2009"/>
            <abstract>
              <t>This document defines an Optional Parameter, called Capabilities, that is expected to facilitate the introduction of new capabilities in the Border Gateway Protocol (BGP) by providing graceful capability advertisement without requiring that BGP peering be terminated.</t>
              <t>This document obsoletes RFC 3392. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5492"/>
          <seriesInfo name="DOI" value="10.17487/RFC5492"/>
        </reference>
        <reference anchor="I-D.li-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-intra-domain-architecture-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Fang Gao" initials="F." surname="Gao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL rules that require manual efforts to accommodate to network dynamics, SAVNET routers learn the SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-05"/>
        </reference>
        <reference anchor="I-D.wu-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-wu-savnet-inter-domain-architecture-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.wu-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture, providing a comprehensive framework for guiding the design of inter- domain SAV mechanisms. The proposed architecture empowers ASes to establish SAV rules by sharing SAV-specific Information between themselves. During the incremental or partial deployment of SAV- specific Information, it can rely on general information, such as routing information from the RIB, to construct the SAV table when SAV-specific Information for an AS's prefixes is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. It also defines the architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-05"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4271" target="https://www.rfc-editor.org/info/rfc4271" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4271.xml">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC6959" target="https://www.rfc-editor.org/info/rfc6959" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6959.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Threat Scope</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="J. Halpern" initials="J." surname="Halpern"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>The Source Address Validation Improvement (SAVI) effort aims to complement ingress filtering with finer-grained, standardized IP source address validation. This document describes threats enabled by IP source address spoofing both in the global and finer-grained context, describes currently available solutions and challenges, and provides a starting point analysis for finer-grained (host granularity) anti-spoofing work.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6959"/>
          <seriesInfo name="DOI" value="10.17487/RFC6959"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC7313" target="https://www.rfc-editor.org/info/rfc7313" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7313.xml">
          <front>
            <title>Enhanced Route Refresh Capability for BGP-4</title>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="E. Chen" initials="E." surname="Chen"/>
            <author fullname="B. Venkatachalapathy" initials="B." surname="Venkatachalapathy"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>In this document, we enhance the existing BGP route refresh mechanisms to provide for the demarcation of the beginning and the ending of a route refresh. The enhancement can be used to facilitate correction of BGP Routing Information Base (RIB) inconsistencies in a non-disruptive manner. This document updates RFC 2918.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7313"/>
          <seriesInfo name="DOI" value="10.17487/RFC7313"/>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-problem-statement-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="17" month="August" year="2023"/>
            <abstract>
              <t>This document provides the gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-02"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="22" month="August" year="2023"/>
            <abstract>
              <t>This document provides the gap analysis of existing inter-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-02"/>
        </reference>
        <reference anchor="I-D.huang-savnet-sav-table" target="https://datatracker.ietf.org/doc/html/draft-huang-savnet-sav-table-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.huang-savnet-sav-table.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <date day="5" month="November" year="2023"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilitiies from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-03"/>
        </reference>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 577?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
