<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-idr-bgp-savnet-05" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="BGP Extensions for SAVNET">BGP Extensions for Source Address Validation Networks (BGP SAVNET)</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-idr-bgp-savnet-05"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="Z." surname="Li" fullname="Zhenbin Li">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lizhenbin@huawei.com</email>
      </address>
    </author>
    <author initials="Z." surname="Tan" fullname="Zhen Tan">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tanzhen6@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Liu" fullname="Mingxing Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liumingxing7@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="September" day="18"/>
    <area>Routing</area>
    <workgroup>IDR</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 77?>

<t>Many source address validation (SAV) mechanisms have been proposed for preventing source address spoofing. However, existing SAV mechanisms are faced with the problems of inaccurate validation or high operational overhead in some scenarios. This document proposes BGP SAVNET by extending BGP protocol for SAV. This protocol can propagate SAV-related information through BGP messages. The propagated information will help edge/border routers automatically generate accurate SAV rules. These rules construct a validation boundary for the network and help check the validity of source addresses of arrival data packets.</t>
    </abstract>
  </front>
  <middle>
    <?line 81?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source address validation (SAV) is essential for preventing source address spoofing attacks (<xref target="RFC6959"/>) and helps trace back network attackers. For a network, SAV mechanisms can be deployed on edge routers or border routers for validating the packets from the connected subnets or neighboring ASes <xref target="manrs-antispoofing"/>.</t>
      <t>ACL-based ingress filtering (<xref target="RFC2827"/>, <xref target="RFC3704"/>) and Source-based RTBH ([RFC5635]) can be used for source address filtering. However, the two mechanisms are not specific for SAV. High operational overhead may be induced if they are managed mostly by manual configurations <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/><xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. Many SAV mechanisms, such as strict uRPF, loose uRPF, FP-uRPF, VRF-uRPF, and EFP-uRPF (<xref target="RFC3704"/>, <xref target="RFC8704"/>), leverage local routing information (FIB/RIB) to automatically generate SAV rules. The rules indicate the wanted incoming interfaces of source addresses and deny source addresses coming from unwanted interfaces <xref target="I-D.huang-savnet-sav-table"/>. The uRPF mechanisms can achieve good automation but may have inaccurate validation problems under asymmetric routing <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/><xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. This is because these uRPF mechanisms are "single-point" designs. They leverage the local FIB or local RIB table to determine the valid incoming interfaces for source addresses, which may not match the real incoming interfaces. That is, purely relying on local routing information for SAV is not enough for achieving both good automation and high accuracy</t>
      <t>This document proposes extensions of BGP protocol for SAV networks, named as BGP SAVNET. Unlike existing "single-point" mechanisms, BGP SAVNET allows coordination between the routers within a network or in different ASes by propagating SAV-specific information through extended BGP messages <xref target="I-D.li-savnet-intra-domain-architecture"/><xref target="I-D.wu-savnet-inter-domain-architecture"/>. SAV-specific information supplements the missing part of the local route information and assists routers to generate accurate SAV rules. The following figure shows a comparison of existing uRPF mechanisms and BGP SAVNET.</t>
      <artwork><![CDATA[
+-------------+  Normal BGP  +------------+ (Good automation
| Routing     |--------------> uRPF       | but inaccurate
| Information |\             | Mechanisms | under asymmetric
+-------------+ \            +------------+ routing)
                 \ Normal BGP
                  +-------------+
                                |
+-------------+              +--\/--------+ (Accurate SAV
| SAV-specific| Extended BGP | BGP        | rules and adaptive to
| Information |--------------> SAVNET     | various scenarios)
+-------------+              +------------+
]]></artwork>
      <t>The BGP SAVNET protocol is suitable to generating SAV rules for both IPv4 and IPv6 addresses. The SAV rules can be used for validating any native IP packets or IP-encapsulated packets.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV: Source address validation, an approach to preventing source address spoofing.</t>
        <t>SAV Rule: The rule that indicates the valid incoming interfaces for a specific source prefix.</t>
        <t>SAV Table: The table or data structure that implements the SAV rules and is used for source address validation in the data plane.</t>
        <t>Internal (or Local) Source Address: The source addresses owned by the subnets of local AS. The source addresses of the connection link between subnets and local AS can also be considered as internal source addresses.</t>
        <t>External (or Remote) Source Address: The source addresses owned by other ASes. Some source addresses like anycast addresses can be both internal and external source addresses.</t>
        <t>Local Routing Information: The information in a router's local RIB or FIB that can be used to infer SAV rules.</t>
        <t>SAV-specific Information: The information specialized for SAV rule generation, which is exchanged among routers.</t>
        <t>Edge Router: An intra-domain router for an AS that is directly connected to a subnet of the AS.</t>
        <t>Border Router: An intra-domain router for an AS that is connected to other ASes. A router in an AS can be both an edge router and a border router, if it is connected to both the AS's subnets and other ASes.</t>
        <t>Source AS: The AS whose source prefixes need to be validated at Validation AS.</t>
        <t>Validation AS: The AS that conducts SAV for the source prefixes of Source AS.</t>
        <t>SPA: Source prefix advertisement, i.e., the process for advertising the origin source addresses/prefixes of a router or an AS.</t>
        <t>SPD: Source path discovery, i.e., the process for discovering the real incoming directions of particular source addresses/prefixes.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-relat">
      <name>BGP Protocol Relationship</name>
      <t>The BGP extensions for BGP SAVNET follow a backward compatible manner without impacting existing BGP functions. New BGP SAVNET subsequent address families will be introduced under the IPv4 address family and the IPv6 address family, respectively. The BGP UPDATE message (specifically the MP_REACH_NLRI and the MP_UNREACH_NLRI attributes) and the BGP Refresh message will be extended. AFI and SAFI will be used for distinguishing the BGP SAVNET messages from other messages.</t>
      <t>A few existing path attributes such as Originator_ID and Clister_list or newly defined path attributes <bcp14>MAY</bcp14> be used for BGP SAVNET. Actually, most existing path attributes are not necessarily required for BGP SAVNET. However, if the unnecessary path attributes are carried in BGP updates, they will be accepted, validated, and propagated consistent with the BGP protocol.</t>
    </section>
    <section anchor="sec-solution">
      <name>BGP SAVNET Solution</name>
      <section anchor="goals">
        <name>Goals</name>
        <t>For an AS, the goal of BGP SAVNET is to construct a validation boundary for the AS. SAV-specific information propagated by extended BGP messages can assist edge and border routers on the network boundary to generate SAV rules. Edge routers connected to subnets generate rules for validating packets from users, while border routers connected to other ASes generate rules for validating packets from other ASes. <xref target="fig-goal"/> shows the example of validation boundary for an AS</t>
        <figure anchor="fig-goal">
          <name>An example of validation boundary for an AS</name>
          <artwork><![CDATA[
        +-----+           +-----+
        | AS3 |           | AS4 |
        +-----+           +-----+
             \             /
+-------------\-----------/-------------+
| AS2        +-#--+   +--#-+            |
|            | R7 |---| R8 |            |
|            +----+   +----+            |
|              |         |              |
|            +----+   +----+            |
|      ------| R5 |---| R6 |------      |
|      |     +----+   +----+     |      |
|      |       |         |       |      |
|   +----+   +----+   +----+   +----+   |
|   | R1 |   | R2 |---| R3 |   | R4 |   |
|   +--*-+   +-*--+   +--#-+   +-#--+   |
+-------\-----/-----------\-----/-------+
       +-------+          +-----+
       |Subnet1|          | AS1 |
       +-------+          +-----+
]]></artwork>
        </figure>
        <t>From a perspective of an AS, source addresses can be largely classified into two categories: internal (or local) source address and external (or remote) source address. The BGP SAVNET solution consists two parts: intra-domain BGP SAVNET and inter-domain BGP SAVNET. The parts of solution focus on the validation of internal and external source address, respectively.</t>
        <ul spacing="normal">
          <li>
            <t>Intra-domain BGP SAVNET: SAV for protecting internal source addresses. In <xref target="fig-goal"/>, it can be deployed at '*' or '#' to restrict a subnet to use only its own internal source addresses and to block external packets from other ASes with any internal source addresses. SAV rules are generated without any cooperation or interactions (such as prefix advertisements) between the local AS and subnets/other ASes.</t>
          </li>
          <li>
            <t>Inter-domain BGP SAVNET: SAV for protecting external source addresses. In <xref target="fig-goal"/>, it can be deployed at '#' for blocking the source addresses of packets coming from unwanted directions (i.e., coming from unwanted neighbor ASes). Cooperation or interactions between the local AS and other ASes are required.</t>
          </li>
        </ul>
      </section>
      <section anchor="intra-domain-bgp-savnet">
        <name>Intra-domain BGP SAVNET</name>
        <t><xref target="fig-intra-savnet"/> shows an example of intra-domain BGP SAVNET. Router 1 and Router 2 are edge routers that enable SAV at the interfaces connected to subnets. Router 3 is a border router that conducts SAV at the interfaces connected to other ASes.</t>
        <t>In general, there are four types of interfaces:</t>
        <ul spacing="normal">
          <li>
            <t>Single-homing interface. When a subnet has only one uplink connected to the upper-layer network, the connected interface at the edge router of upper-layer network can be defined as a "Sigle-homing interface", e.g., Intf.1 in <xref target="fig-intra-savnet"/>.</t>
          </li>
          <li>
            <t>Complete multi-homing interface. When a subnet has dual or multiple uplinks that connect to a single upper-layer network with BGP SAVNET deployed, the connected interfaces at the edge routers of upper-layer network are called "Complete multi-homing interfaces", which corresponds to Intf.2 and Intf.3 in <xref target="fig-intra-savnet"/>.</t>
          </li>
          <li>
            <t>Incomplete multi-homing interface. When a subnet has dual or multiple uplinks that are connected to multiple upper-layer networks, the interfaces at the edge routers of upper-layer network are called the "Incomplete multi-homing interfaces", which corresponds to Intf.4 in <xref target="fig-intra-savnet"/>.</t>
          </li>
          <li>
            <t>Internet interface. It's the external interfaces that are connected to the Internet on border routers. Typically, a network usually has multiple Internet interfaces for load balancing or backup, which corresponds to Intf.5 and Intf.6 in <xref target="fig-intra-savnet"/>.</t>
          </li>
        </ul>
        <figure anchor="fig-intra-savnet">
          <name>An example of intra-domain BGP SAVNET</name>
          <artwork><![CDATA[
+-----------------------------------------+
|               Other ASes                |
+-----------------------------------------+
              |      |                |
              |      |                |
+-------------|------|----------------|---+
| AS          |      |                |   |
|       Intf.5|      |Intf.6          |   |
|           +-*------*-+              |   |
|           | Router 3 |              |   |
|           +----------+              |   |
|              /     \                |   |
|             /       \               |   |
|            /         \              |   |
|   +----------+     +----------+     |   |
|   | Router 1 |     | Router 2 |     |   |
|   +--#-----#-+     +-#-----*--+     |   |
|Intf.1|Intf.2\ Intf.3/       \Intf.4 |   |
|      |       \     /         \      |   |
|      |        \   /           \     |   |
|   Subnet1    Subnet2           Subnet3  |
|                                         |
+-----------------------------------------+

Intf '#' enables prefix allowlist
Intf '*' enables prefix blocklist

]]></artwork>
        </figure>
        <t>The goal of intra-domain BGP SAVNET is to generate source prefix allowlist or blocklist for the interfaces on edge or border routers. For the "Single-homing interface" and "Complete multi-homing interface", prefix allowlist is applied (i.e., "Interface-based prefix allowlist" mode in <xref target="I-D.huang-savnet-sav-table"/>). The prefix allowlist of an interface should only include all the source prefixes of the connected subnet and denys any source addresses not covered by the prefixes in the list. In <xref target="fig-intra-savnet"/>, the prefix allowlist of Intf. 1 should only include all the source prefixes of Subnet1, and the prefix allowlists of Intf. 2 and Intf. 3 should only include all the source prefixes of Subnet2.</t>
        <t>For "Incomplete multi-homing interface" and "Internet interface", prefix blocklist is enabled (i.e., "Interface-based prefix blocklist" mode in <xref target="I-D.huang-savnet-sav-table"/>). For a specific interface, its prefix blocklist should include the internal prefixes that are owned by the subnets connected to "Single-homing interfaces" and "Complete multi-homing interfaces". In <xref target="fig-intra-savnet"/>, the prefix blocklist of Intf. 4, Intf. 5, and Intf. 6 should include all the source prefixes of Subnet1 and Subnet2. The reason why "Incomplete multi-homing interface" like Intf. 4 not using prefix allowlist is that the local AS itself can hardly learn the complete set of source prefixes of Subnet3 if the subnet advertises asymmetric prefixes to the multi-homed up-layer networks (i.e., the local AS is one of the up-layer networks).</t>
        <t>The above goal should be achieved while meeting two requirements of high accuracy (even under asymmetric routing) and good automation. To this end, Source Prefix Advertisement (SPA) process is designed in intra-domain BGP SAVNET solution. During the SPA process, edge routers will proactively announce all the source prefixes learned by local "Single-homing interfaces" and local "Complete multi-homing interfaces" from the connected subnets via SPA messages. Some related information of each announced source prefix will also be propagated together with the source prefix. The related information of each announced source prefix can be:</t>
        <ul spacing="normal">
          <li>
            <t>Multi-homing Interface Group Type (MIIG-Type): It indicates the type of the interface that learns the prefix. MIIG-Type <bcp14>MUST</bcp14> be one of the four types mentioned above.</t>
          </li>
          <li>
            <t>Multi-homing Interface Group Tag (MIIG-Tag): It is to identify the subnet of the prefix. The prefixes belonging to the same subnet <bcp14>MUST</bcp14> have the identical MIIG-Tag value. Different subnets <bcp14>MUST</bcp14> have different MIIG-tag values.</t>
          </li>
          <li>
            <t>(Only) Source Flag: It indicates whether the prefix is owned by one subnet. By default, the flag is set because most of the prefixes are owned by one network. For anycast addresses/prefixes or direct server return (DSR) addresses/prefixes <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>, the flag should be unset (possibly manually).</t>
          </li>
        </ul>
        <t>It can be seen that the SPA message of a source prefix includes four parts: source prefix, MIIG-Type, MIIG-Tag, and Source Flag. Next, how to use the SPA messages to generate SAV rules will be introduced.</t>
        <ul spacing="normal">
          <li>
            <t>In the case of "Single-homing interface", the prefix allowlist can be generated only through local routing information (i.e., local RIB), without the engagement of SPA messages. The method building the allowlist is, each Dest Prefix in RIB that records this interface as an outgoing interface will be added to the prefix allowlist.</t>
          </li>
          <li>
            <t>In the case of "Complete multi-homing interface", in addition to collecting prefixes of the target interface itself in local RIB, routers also need merge prefixes from the received SPA messages and other local interfaces into the allowlist to construct a complete list. First, the prefixes in received SPA, which take the same "MIIG-Type" and "MIIG-Tag" values as the target interface, are added to the allowlist. Second, if there are local interfaces having the same "MIIG-Type" and "MIIG-Tag" values, they will share prefixes collected from local RIB into each other's allowlist.</t>
          </li>
          <li>
            <t>Routers with "Incomplete multi-homing interface" or "Internet interface" will generate prefix blocklist for the target interface. First, the prefixes of local "Single-homing interfaces" or "Complete Multi-homing interfaces" on the local router will be put into the blocklist. Second, the prefixes in the received SPA messages which have the MIIG-Types of either "Single-homing interface" or "Complete Multi-homing interface" but with Source Flag being set, will also be added into the blocklist. The prefix with Source Flag being unset will not be included into the blocklist because the prefix is multi-source and the "Incomplete multi-homing interface" or "Internet interface" may be the legitimate incoming interface of the multi-source prefix.</t>
          </li>
        </ul>
        <t>Note that, intra-domain BGP SAVNET solution can also work if the subnet is a stub AS (e.g., the subnets are replaced with stub ASes in <xref target="fig-intra-savnet"/>). The source prefixes of the stub AS can be considered as the internal prefixes of the local AS when conducting the solution.</t>
      </section>
      <section anchor="inter-domain-bgp-savnet">
        <name>Inter-domain BGP SAVNET</name>
        <t>As described previously, inter-domain BGP SAVNET is for protecting external source addresses that are owned by other ASes (usually remote ASes). Cooperation or interactions between the local AS and other ASes are required.</t>
        <t>The local AS that deploys inter-domain BGP SAVNET and conducts validation on the external source addresses is defined as Validation AS. Source AS is defined as the AS whose source prefixes need to be validated at Validation AS. For any AS, it can be configured as Source AS or Validation AS, or it can also act as both Source AS and Validation AS.</t>
        <t>The goal of inter-domain BGP SAVNET is to help Validation AS generate prefix blocklist for the source prefixes of Source AS at the proper external interfaces of Validation AS. Which source prefixes that need to be validated and which external interfaces should block these prefixes depend on the indication of Source AS. Inter-domain BGP SAVNET provides the communication channel for Source AS and Validation AS.</t>
        <t><xref target="fig-inter-savnet"/> shows an example of inter-domain BGP SAVNET. AS 1 and AS 4 have deployed SAVNET on the border routers (i.e., ASBRs) connected to other ASes. 
Suppose AS 1 is configured as Source AS and AS 4 acts as Validation AS. In the example, AS 4 can help block P1 of AS 1 at the interfaces connected to specific neighbor ASes.</t>
        <figure anchor="fig-inter-savnet">
          <name>An example of inter-domain BGP SAVNET</name>
          <artwork><![CDATA[
       +----------------+    +----------------+
       |   AS 5 (P5)    |    |   AS 6 (P6)    |
       +-----------+/\+-+    +-+/\+-------+/\++
                     \          /          |
                      \        /           |
                       \      /            |
                        \    /             |
                   +----------------+      |
                   |   AS 4 (P4)    |      |
                   | SAVNET deployed|      |
                   ++/\+---+----+/\++      |
                     /     ^      \        |
                    /      ^       \       |
                   /       ^        \      |
                  /        ^         \     |
  +----------------+       ^       +----------------+
  |   AS 2 (P2)    |       ^       |   AS 3 (P3)    |
  +----------+/\+--+       ^       +--+/\+----------+
               \           ^           /
                \          ^          /
                 \         ^         /
                  \        ^        /
                  +--------+-------+
                  |    AS 1 (P1)   |
                  | SAVNET deployed|
                  +----------------+
RIB in AS 1:
To P2, preferred AS_PATH = [AS 2]
To P3, preferred AS_PATH = [AS 3]
To P4, preferred AS_PATH = [AS 2, AS 4]
To P5, preferred AS_PATH = [AS 3, AS 4, AS 5]
To P6, preferred AS_PATH = [AS 3, AS 4, AS 6]
]]></artwork>
        </figure>
        <t>When Source AS and Validation AS enable BGP SAVNET, a BGP SAVNET session between the two ASes will be established. <xref target="fig-inter-savnet"/> shows the session between AS 1 and AS 4 by "&gt;&gt;&gt;&gt;&gt;". 
The solution of inter-domain BGP SAVNET consists of two processes: SPA and Source Path Discovery (SPD).</t>
        <ul spacing="normal">
          <li>
            <t>SPA process: Source AS advertises its own AS number and its own source prefixes to Validation AS through SPA messages. SPA messages contain the complete set of source prefixes of Source AS or only the source prefixes that want to be protected. Some hidden source prefixes that do not appear can also be advertised to Validation AS through SPA messages. The advertised source prefixes <bcp14>MUST</bcp14> be authorized to Source AS by RPKI ROAs. When Validation AS receives the messages, it <bcp14>MUST</bcp14> conduct ROV on the messages and only stores the target source prefixes with the "valid" ROV state. The "Unknown" and "Invalid" target source prefixes will be ignored. In <xref target="fig-inter-savnet"/>, P1 <bcp14>MUST</bcp14> be authorized to AS 1, and then AS 1 advertises its own AS number and P1 to AS 4 through an SPA message.
            </t>
            <ul spacing="normal">
              <li>
                <t>Validation AS can also obtain the target source prefixes directly from RPKI ROAs or other RPKI data.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>SPD process: After SPA process, Source AS can send SPD messages to Validation AS for notifying the wanted incoming directions of target source prefixes. 
That is, Source AS can specify from which neighbor ASes of Validation AS the target source prefixes will arrive. Validation AS will learn the specified incoming directions of target source prefixes and will use prefix blocklist for denying the target source prefixes coming from unwanted directions (neighbor ASes). The wanted incoming directions of target source prefixes can be obtained via the following methods for different purposes:  </t>
            <ul spacing="normal">
              <li>
                <t>Automatically obtained from the RIB of Source AS. In <xref target="fig-inter-savnet"/>, AS 1 can specify that AS 2 and AS 3 are the wanted incoming directions of P1. AS 4 will block the packets with source addresses of P1 coming from neighbor ASes of AS 5 and AS 6. The use cases can be 1) proactive SAV for customer's prefixes or 2) key source address's forwarding path protection (i.e., keeping control plane path and data plane path consistent).</t>
              </li>
              <li>
                <t>Obtained from security center of Source AS or Validation AS. Security center can detect source address-spoofed DDoS attacks and disseminates rules through BGP SAVNET to reactively filter source address at specific interfaces for mitigating DDoS suffered by customers.</t>
              </li>
              <li>
                <t>Obtained from RPKI ASPA records or other RPKI data.</t>
              </li>
            </ul>
          </li>
        </ul>
        <!-- Note that, the backup paths should be considered by Source AS when it advertises SPD messages. Otherwise, the backup paths may break due to the SAV rules on Validation AS.  -->

</section>
    </section>
    <section anchor="sec-peering">
      <name>BGP SAVNET Peering Models</name>
      <section anchor="full-mesh-ibgp-peering">
        <name>Full-mesh IBGP Peering</name>
        <t>This peering model is for both intra- and inter-domain BGP SAVNET. In this model, Edge or border routers enabling BGP SAVNET <bcp14>MUST</bcp14> establish full-mesh iBGP sessions either through direct iBGP sessions or route-reflectors. SAVNET messages within an AS can be advertised through the full-mesh BGP SAVNET sessions. The extensions of BGP messages for carrying SAVNET messages will be introduced in <xref target="sec-extension"/>.</t>
      </section>
      <section anchor="ebgp-peering-between-ases">
        <name>EBGP Peering between ASes</name>
        <t>Inter-domain BGP SAVNET requires eBGP sessions which can be single-hop or multi-hop. In this peering model, for the AS enabling BGP SAVNET, at least one border router in Source AS <bcp14>MUST</bcp14> establish the BGP SAVNET sessions with the border routers in Validation AS. SAVNET messages between ASes will be advertised through these sessions. The extensions of BGP messages for carrying SAVNET messages will be introduced in <xref target="sec-extension"/>.</t>
      </section>
    </section>
    <section anchor="sec-extension">
      <name>BGP SAVNET Protocol Extension</name>
      <section anchor="bgp-savnet-safi">
        <name>BGP SAVNET SAFI</name>
        <t>To make good isolation with existing BGP services, this section defines BGP SAVNET SAFIs under the IPv4 address family and the IPv6 address family, respectively.  The values require IANA registration as specified in <xref target="sec-iana"/>. Two BGP SAVNET speakers <bcp14>MUST</bcp14> establish a BGP SAVNET peer and <bcp14>MUST</bcp14> exchange the Multiprotocol Extensions Capability <xref target="RFC5492"/> to ensure that they are both capable of processing BGP SAVNET messages properly.</t>
      </section>
      <section anchor="bgp-savnet-nlri">
        <name>BGP SAVNET NLRI</name>
        <t>The BGP SAVNET NLRI is used to transmit SPA messages (either IPv4 or IPv6). The BGP SAVNET NLRI TLVs are carried in BGP UPDATE messages as (1) route advertisement carried within Multiprotocol Reachable NLRI (MP_REACH_NLRI) <xref target="RFC4760"/>, and (2) route withdraw carried within Multiprotocol Unreachable NLRI (MP_UNREACH_NLRI).</t>
        <t>While encoding an MP_REACH_NLRI attribute containing BGP SAVNET NLRI TLVs, the "Length of Next Hop Network Address" field <bcp14>SHOULD</bcp14> be set to 0 upon the sender. The "Network Address of Next Hop" field <bcp14>SHOULD</bcp14> not be encoded upon the sender, because it has a 0 length and <bcp14>MUST</bcp14> be ignored upon the receiver.</t>
        <section anchor="spa-tlvs-for-intra-domain-bgp-savnet">
          <name>SPA TLVs for Intra-domain BGP SAVNET</name>
          <t>The BGP SAVNET NLRI TLV each carries a SPA message including a source prefix and related information. Therefore, the NLRI TLV is called SPA TLV. This type of TLVs are used in SPA process within an AS. The format is shown below:</t>
          <figure>
            <name>SPA TLV format</name>
            <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RouteType (1) |   Length (1)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Origin router-id (4)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  MaskLen (1)  |        IP Prefix (variable)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MIIG-Type (1) | Flags (1)   |S|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                         MIIG-Tag (4)                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>The meaning of these fields are as follows:</t>
          <ul spacing="normal">
            <li>
              <t>RouteType (key): Type of the BGP SAVNET NLRI TLV, the value is 1 for SPA TLV within an AS.</t>
            </li>
            <li>
              <t>Length: The length of the BGP SAVNET NLRI value, the RouteType and Length fields are excluded.</t>
            </li>
            <li>
              <t>Origin router-id (key): The router ID of the originating node of the source prefix in the deployment domain.</t>
            </li>
            <li>
              <t>MaskLen (key): The mask length in bits, which also indicates the valid bits of the IP Prefix field.</t>
            </li>
            <li>
              <t>IP Prefix (key): IP address. The length ranges from 1 to 4 bytes for IPv4 and ranges from 1 to 16 bytes for IPv6. Format is consistent with BGP IPv4/IPv6 unicast address.</t>
            </li>
            <li>
              <t>MIIG-Type (non-key): Multi-homing Ingress Interface Group Type.
              </t>
              <ul spacing="normal">
                <li>
                  <t>Type value 0: Unknown. Indicates that this prefix does not come from any subnets. It can be a local prefix or a local domain prefix.</t>
                </li>
                <li>
                  <t>Type value 1: Single-homing interface. Indicates that this prefix comes from a subnet that is single-homed to the local domain.</t>
                </li>
                <li>
                  <t>Type value 2: Complete multi-homing interface. Indicates that this prefix comes from a subnet that is multi-homed to the local domain, and is connected only to the local domain.</t>
                </li>
                <li>
                  <t>Type value 3: Incomplete multi-homing interface. Indicates that this prefix comes from a subnet that is multi-homed to the local domain and other domains.</t>
                </li>
                <li>
                  <t>Type value 4: Internet interface. Indicates that this prefix comes from a interface that is connected to the Internet.</t>
                </li>
                <li>
                  <t>Type value 5~255: Reserved for future use.</t>
                </li>
                <li>
                  <t>Notes: The type values of 3 and 4 are pre-defined for future use, and they should not appear in SPA TLVs (i.e., no need to advertise the prefixes from the interfaces of Type 3 and Type 4).</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Flags (non-key): Bitmap, indicating the attribute flag of the SPA prefix, currently taken:
              </t>
              <ul spacing="normal">
                <li>
                  <t>bit 0 (S bit) : Source Flag. The value of 1 indicates that the SPA prefix is owned by one subnet. The value of 0 indicates that the SPA prefix is not owned by only one subnet.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>MIIG-Tag (non-key): Multi-homing Ingress Interface Group Tag. The value ranges from 1 to 0xFFFFFFFE. The value 0 is invalid and the value 0xFFFFFFFF is reserved.</t>
            </li>
          </ul>
        </section>
        <section anchor="spa-tlvs-for-inter-domain-bgp-savnet">
          <name>SPA TLVs for Inter-domain BGP SAVNET</name>
          <t>This type of TLVs are used in SPA process between ASes.</t>
          <figure>
            <name>SPA TLV format</name>
            <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RouteType (1) |   Length (1)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Source AS Number (4)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  MaskLen (1)  |        IP Prefix (variable)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Flags (1)    |
+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>The meaning of these fields are as follows:</t>
          <ul spacing="normal">
            <li>
              <t>RouteType (key): Type of the BGP SAVNET NLRI TLV, the value is 2 for SPA TLV between ASes.</t>
            </li>
            <li>
              <t>Length: The length of the BGP SAVNET NLRI value, the RouteType and Length fields are excluded.</t>
            </li>
            <li>
              <t>Source AS Number (key): The AS number of the originating AS of this advertised source prefix.</t>
            </li>
            <li>
              <t>MaskLen (key): The mask length in bits, which also indicates the valid bits of the IP Prefix field.</t>
            </li>
            <li>
              <t>IP Prefix (key): IP address. The length ranges from 1 to 4 bytes for IPv4 and ranges from 1 to 16 bytes for IPv6. Format is consistent with BGP IPv4/IPv6 unicast address.</t>
            </li>
            <li>
              <t>Flags (non-key): Reserved for future use.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="bgp-savnet-refresh">
        <name>BGP SAVNET Refresh</name>
        <t>Two BGP SAVNET speakers <bcp14>MUST</bcp14> exchange Route Refresh Capability <xref target="RFC2918"/> to ensure that they are both capable of processing the SPD message carried in the BGP Refresh message.</t>
        <t>The SPD TLV is carried in a BGP Refresh message after the BGP Refresh message body, as follows:</t>
        <figure>
          <name>BGP-REFRESH with SPD TLV format</name>
          <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              AFI (2)          |  Subtype (1)  |     SAFI (1)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                       SPD TLV (variable)                      |
~                                                               ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The AFI field is either 1 (IPv4) or 2 (IPv6). The SAFI field is the newly defined SAVNET SAFI. The Subtype field should be a new value assigned to SAVNET <xref target="RFC7313"/>. 
By carrying an SPD TLV, a BGP SAVNET Refresh message <bcp14>MUST NOT</bcp14> be processed as a Route-Refresh (as a re-advertisement request) and <bcp14>SHOULD</bcp14> only be used in the SPD process. A BGP SAVNET Refresh message without an SPD TLV <bcp14>SHOULD</bcp14> be processed as a Route-Refresh as defined in Route Refresh Capability <xref target="RFC2918"/>.</t>
        <section anchor="the-spd-tlvs-for-inter-domain-bgp-savnet">
          <name>The SPD TLVs for Inter-domain BGP SAVNET</name>
          <t>This type of TLVs are used in SPD process between ASes.</t>
          <figure>
            <name>SPD TLV format</name>
            <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Type (1)   |   SubType (1)  |            Length (2)         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Sequence Number (4)                    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Origin router-id (4)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Source AS Number (4)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      Validation AS Number (4)                 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Optional Data Length (2)  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                        Optional Data (variable)               |
~                                                               ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                     Neighbor AS Number List (variable)        |
~                                                               ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          </figure>
          <t>The meaning of these fields are as follows:</t>
          <ul spacing="normal">
            <li>
              <t>Type: TLV Type, the value is 2 for SPD TLV.</t>
            </li>
            <li>
              <t>SubType: TLV Sub-Type, value is 2 for SPD TLV between an AS.</t>
            </li>
            <li>
              <t>Length: The length of the SPD TLV value, the Type, SubType and Length fields are excluded.</t>
            </li>
            <li>
              <t>Sequence Number: Indicates the sequence of Source Path Discovery process. The initial value is 0 and the value increases monotonically.</t>
            </li>
            <li>
              <t>Origin router-id: The router ID of the originating node of the Source Path Discovery process.</t>
            </li>
            <li>
              <t>Source AS Number (key): The AS number of the source AS whose source prefixes need to be validated in the validation AS.</t>
            </li>
            <li>
              <t>Validation AS Number (key): The AS number of the validation AS who conducts validation for the source prefixes of source AS.</t>
            </li>
            <li>
              <t>Optional Data Length: The length of the optional data field in bytes. The value can be 0 when there is no optional data.</t>
            </li>
            <li>
              <t>Optional Data: Reserved for future use.</t>
            </li>
            <li>
              <t>Neighbor AS Number List: List of neighbor AS, from which the validation AS will receive the data packets with the source prefixes of the source AS.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="sec-dp">
      <name>Decision Process with BGP SAVNET</name>
      <t>The Decision Process described in <xref target="RFC4271"/> works to determines a degree of preference among routes with the same prefix. The Decision Process involves many BGP Path attributes, which are not necessary for BGP SAVNET SPA and SPD process, such as next-hop attributes and IGP-metric attributes. Therefore, this document introduces a simplified Decision Process for SAVNET SAFI.</t>
      <t>The purpose of SPA is to maintain a uniform Source Prefix list, which is the mapping from original router-id to IP addresses, across all routers in the deploy domain. To ensure this, it is <bcp14>RECOMMENDED</bcp14> that all routers deploy no ingress or egress route-policies for BGP SAVNET.</t>
      <section anchor="bgp-savnet-nlri-selection">
        <name>BGP SAVNET NLRI Selection</name>
        <t>The Decision Process described in <xref target="RFC4271"/> no longer apply, and the Decision Process for BGP SAVNET NLRI are as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>The locally imported route is preferred over the route received from a peer.</t>
          </li>
          <li>
            <t>The route received from a peer with the numerically larger originator is preferred.</t>
          </li>
          <li>
            <t>The route received from a peer with the numerically larger Peer IP Address is preferred.</t>
          </li>
        </ol>
        <section anchor="self-originated-nlri">
          <name>Self-Originated NLRI</name>
          <t>BGP SAVNET NLRI with origin router-id matching the local router-id is considered self-originated. All locally imported routes should be considered self-originated by default.</t>
          <t>Since the origin router-id is part of the NLRI key, it is very unlikely that a self-originated NLRI would be received from a peer. Unless a router-id conflict occurs due to incorrect configuration. In this case, the self-originated NLRI <bcp14>MUST</bcp14> be discarded upon the receiver, and appropriate error logging is <bcp14>RECOMMENDED</bcp14>.</t>
          <t>On the other hand, besides the route learn from peers, a BGP SAVNET speaker <bcp14>MUST NOT</bcp14> advertise NLRI which is not self-originated.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-error">
      <name>Error Handling</name>
      <section anchor="process-of-bgp-savnet-nlris">
        <name>Process of BGP SAVNET NLRIs</name>
        <t>When a BGP SAVNET speaker receives a BGP Update containing a malformed MP_REACH_NLRI or MP_UNREACH_NLRI, it <bcp14>MUST</bcp14> ignore the received TLV and <bcp14>MUST NOT</bcp14> pass it to other BGP peers. When discarding a malformed TLV, a BGP SAVNET speaker <bcp14>MAY</bcp14> log a specific error.</t>
        <t>If duplicate NLRIs exist in a MP_REACH_NLRI or MP_UNREACH_NLRI attribute, only the last one <bcp14>SHOULD</bcp14> be used.</t>
      </section>
      <section anchor="process-of-bgp-savnet-spa-tlvs">
        <name>Process of BGP SAVNET SPA TLVs</name>
        <t>When a BGP SAVNET speaker receives an SPA TLV with an undefined type, it <bcp14>SHOULD</bcp14> be ignored or stored without parsing.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with a 0 origin router-id, or the origin router-id is the same as the local router-id, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with an invalid MaskLen field, which is out of the range 1~32 for IPv4 and 1~128 for IPv6, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with an address field, whose length in bytes do not match with the remaining data, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with an unsupported MIIG-Type, it <bcp14>SHOULD</bcp14> be ignored or stored without parsing.</t>
        <t>When a BGP SAVNET speaker receives an SPA TLV with a MIIG-Type 0 (Unkonwn), its MIIG-Tag <bcp14>MUST</bcp14> also be 0, vice versa. Otherwise this SPA TLV <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives a malformed SPA TLV, it <bcp14>MUST</bcp14> ignore the received TLV and <bcp14>MUST NOT</bcp14> pass it to other BGP peers. When discarding a malformed TLV, a BGP SAVNET speaker <bcp14>MAY</bcp14> log a specific error.</t>
        <t>When a BGP SAVNET speaker processes Flags in an SPA TLV, the defined bits <bcp14>MUST</bcp14> be processed and the undefined bits <bcp14>MUST</bcp14> be ignored.</t>
      </section>
      <section anchor="process-of-bgp-savnet-refresh">
        <name>Process of BGP SAVNET Refresh</name>
        <t>Each BGP Refresh message <bcp14>MUST</bcp14> contain at most one SPD TLV. When a BGP SAVNET speaker receives a BGP Refresh packet with multiple SPD TLVs, only the first one <bcp14>SHOULD</bcp14> be processed.</t>
      </section>
      <section anchor="process-of-bgp-savnet-spd-tlvs">
        <name>Process of BGP SAVNET SPD TLVs</name>
        <t>When a BGP SAVNET speaker receives an SPD TLV with an undefined type or subtype, it <bcp14>SHOULD</bcp14> be ignored.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with a 0 origin router-id, or the origin router-id is the same as the local router-id, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with a validation AS number, 0 source AS number, AS_TRANS number (23456), or the source AS number equals the validation AS number, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with an optional data sub-TLV that is an undefined type, it <bcp14>SHOULD</bcp14> be ignored.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with a DestList field that is not a multiple of 4 in length, it <bcp14>MUST</bcp14> be considered malformed.</t>
        <t>When a BGP SAVNET speaker receives a Refresh message with a malformed SPD TLV, it <bcp14>MUST</bcp14> ignore the received message. When discarding a malformed message, a BGP SAVNET speaker <bcp14>MAY</bcp14> log a specific error.</t>
        <t>When a BGP SAVNET speaker receives an SPD TLV with a sequence number that does not match the local recorded sequence number:</t>
        <ul spacing="normal">
          <li>
            <t>If the newly received sequence number is numerically larger, the local recorded sequence number <bcp14>SHOULD</bcp14> be updated to the newly received sequence number.</t>
          </li>
          <li>
            <t>If the newly received sequence number is numerically smaller, the local recorded sequence number <bcp14>SHOULD NOT</bcp14> be updated, and the BGP SAVNET speaker <bcp14>SHOULD</bcp14> log a specific error.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-converge">
      <name>Convergence Considerations</name>
      <t>The convergence process of BGP SAVNET is relatively simple. First, the convergence process is mainly the message propagation process. BGP SAVNET messages should have similar propagation speed to normal routes. Second, BGP SAVNET supports independent and incremental update. Routers enable SAVNET can update local SAV rules immediately and there is no need to wait for complete information updates.</t>
    </section>
    <section anchor="sec-deploy">
      <name>Deployment Considerations</name>
      <t>Both intra- and inter-domain BGP SAVNET have good deployability. For intra-domain BGP SAVNET, upgrading part of routers can also work well. For example, only upgrade the routers (two or more) multi-homed by the same subnet, or upgrade one edge router and one border router. With more routers getting deployed, the network can get more protection. For inter-domain BGP SAVNET, any pair of ASes can upgrade and work well. There is no dependence on other ASes.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>Security problems are mainly in inter-domain scenarios.</t>
      <ul spacing="normal">
        <li>
          <t>For communication security, inter-domain BGP SAVNET takes a point-to-point communication model and thus has a simple trust model. The communication between source AS and validation AS can be protected by TLS.</t>
        </li>
        <li>
          <t>For content security, the advertised source prefixes of Source AS <bcp14>MUST</bcp14> be authorized to Source AS by RPKI ROAs. When Validation AS receives the messages, it <bcp14>MUST</bcp14> conduct ROV on the messages.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>The BGP SAVNET SAFIs under the IPv4 address family and the IPv6 address family need to be allocated by IANA.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the contributions from Fang Gao. Also thanks for the comments from Jeff Haas, Antoin Verschuren, Zhibin Dai, Keyur Patel, Shunwan Zhuang, David Lamparter, etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2918" target="https://www.rfc-editor.org/info/rfc2918" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2918.xml">
          <front>
            <title>Route Refresh Capability for BGP-4</title>
            <author fullname="E. Chen" initials="E." surname="Chen"/>
            <date month="September" year="2000"/>
            <abstract>
              <t>This document defines a new Border Gateway Protocol (BGP) capability termed 'Route Refresh Capability', which would allow the dynamic exchange of route refresh request between BGP speakers and subsequent re-advertisement of the respective Adj-RIB-Out. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2918"/>
          <seriesInfo name="DOI" value="10.17487/RFC2918"/>
        </reference>
        <reference anchor="RFC4760" target="https://www.rfc-editor.org/info/rfc4760" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4760.xml">
          <front>
            <title>Multiprotocol Extensions for BGP-4</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="D. Katz" initials="D." surname="Katz"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, L3VPN, etc.). The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4760"/>
          <seriesInfo name="DOI" value="10.17487/RFC4760"/>
        </reference>
        <reference anchor="RFC5492" target="https://www.rfc-editor.org/info/rfc5492" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5492.xml">
          <front>
            <title>Capabilities Advertisement with BGP-4</title>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <date month="February" year="2009"/>
            <abstract>
              <t>This document defines an Optional Parameter, called Capabilities, that is expected to facilitate the introduction of new capabilities in the Border Gateway Protocol (BGP) by providing graceful capability advertisement without requiring that BGP peering be terminated.</t>
              <t>This document obsoletes RFC 3392. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5492"/>
          <seriesInfo name="DOI" value="10.17487/RFC5492"/>
        </reference>
        <reference anchor="I-D.li-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-intra-domain-architecture-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Fang Gao" initials="F." surname="Gao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL rules that require manual efforts to accommodate to network dynamics, SAVNET routers learn the SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-07"/>
        </reference>
        <reference anchor="I-D.wu-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-wu-savnet-inter-domain-architecture-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.wu-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-12"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4271" target="https://www.rfc-editor.org/info/rfc4271" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4271.xml">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC6959" target="https://www.rfc-editor.org/info/rfc6959" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6959.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Threat Scope</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="J. Halpern" initials="J." surname="Halpern"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>The Source Address Validation Improvement (SAVI) effort aims to complement ingress filtering with finer-grained, standardized IP source address validation. This document describes threats enabled by IP source address spoofing both in the global and finer-grained context, describes currently available solutions and challenges, and provides a starting point analysis for finer-grained (host granularity) anti-spoofing work.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6959"/>
          <seriesInfo name="DOI" value="10.17487/RFC6959"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC7313" target="https://www.rfc-editor.org/info/rfc7313" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7313.xml">
          <front>
            <title>Enhanced Route Refresh Capability for BGP-4</title>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="E. Chen" initials="E." surname="Chen"/>
            <author fullname="B. Venkatachalapathy" initials="B." surname="Venkatachalapathy"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>In this document, we enhance the existing BGP route refresh mechanisms to provide for the demarcation of the beginning and the ending of a route refresh. The enhancement can be used to facilitate correction of BGP Routing Information Base (RIB) inconsistencies in a non-disruptive manner. This document updates RFC 2918.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7313"/>
          <seriesInfo name="DOI" value="10.17487/RFC7313"/>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-problem-statement-18" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="26" month="August" year="2025"/>
            <abstract>
              <t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the basic requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-18"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-11" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="27" month="August" year="2025"/>
            <abstract>
              <t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-11"/>
        </reference>
        <reference anchor="I-D.huang-savnet-sav-table" target="https://datatracker.ietf.org/doc/html/draft-huang-savnet-sav-table-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.huang-savnet-sav-table.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <date day="10" month="December" year="2024"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-08"/>
        </reference>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 570?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
