<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-idr-flowspec-sav-00" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="BGP FlowSpec for SAV">BGP Flow Specification for Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-idr-flowspec-sav-00"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="W." surname="Gao" fullname="Wei Gao">
      <organization>CAICT</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gaowei@caict.ac.cn</email>
      </address>
    </author>
    <date year="2023" month="October" day="19"/>
    <area>Routing</area>
    <workgroup>IDR</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 71?>

<t>BGP FlowSpec reuses BGP route to distribute infrastructure and propogates traffic flow information with filtering actions. 
This document specifies a new BGP extended community named Source Address Validation (SAV) Interface-set to disseminate SAV rules through BGP FlowSpec.</t>
    </abstract>
  </front>
  <middle>
    <?line 76?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is an efficient method for preventing source address spoofed-based attacks. SAV rules indicate the valid/invalid incoming interfaces of a specific source IP address or source IP prefix. The rules can be deployed on edge routers, border routers, or aggregation routers for checking the validity of intra-domain and inter-domain packets. For invalid packets, filtering actions can be taken such as block, rate-limit, and redirect. There are many mechanisms that can generate SAV rules on routers (<xref target="RFC2827"/>, <xref target="RFC3704"/>, <xref target="RFC5210"/>, <xref target="RFC8704"/>, and <xref target="manrs-antispoofing"/>). However, the challenges of accurate validation and operation exist in asymetric routing scenarios or dynamic networks <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/><xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>. To facilitate SAV management, additional SAV rule dissemination is needed <xref target="I-D.li-savnet-intra-domain-architecture"/><xref target="I-D.wu-savnet-inter-domain-architecture"/>.</t>
      <t>BGP FlowSpec is a convenient and flexible tool for traffic filtering/controling (<xref target="RFC8955"/>, <xref target="RFC8956"/>). It propogates traffic flow information for different traffic control purposes through the BGP protocol extension. Existing BGP FlowSpec design has supported source prefix matching and various traffic filtering actions but does not support binding valid/invalid incoming interfaces to source prefixes. With a minor extension, BGP FlowSpec can be used for SAV rule dissemination.</t>
      <t>This document specifies a new BGP extended community named SAV Interface-set extended community. SAV rules can be disseminated through BGP FlowSpec by combining the new extended community with source prefix component and filtering actions of existing BGP FlowSpec. The new extension can be soly used to configure SAV rules on remote routers. It can also help existing SAV mechanisms generate accurate SAV rules (i.e., as a supplement of SAV mechanisms).</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV: Source address validation</t>
        <t>SAV Rule: The rule that indicates the valid/invalid incoming interfaces of a specific source IP address or source IP prefix.</t>
        <t>AS: Autonomous System</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="flow-specifications-for-sav">
      <name>Flow Specifications for SAV</name>
      <section anchor="sav-rules">
        <name>SAV Rules</name>
        <t>SAV rules can be used for checking the validity of source addresses of incoming packets. A rule usually has a format of &lt;source prefix, interface set, validity&gt;. source prefix is for matching specific packets. Interface set represents a set of physical interfaces from which the packets arrive. Validity indicates whether the packets matching the source prefix and arrival interface are valid or invalid, so validity has a value of either valid or invalid. For example, the rule &lt;P1, [intf1, intf2], valid&gt; means the source prefix P1 must arrive the router at interface Intf1 or Intf2, otherwise, P1 is invalid. For invalid source prefixes, the filtering actions, such as block, rate-limit, and redirect, can be taken on the packets <xref target="I-D.huang-savnet-sav-table"/>.</t>
        <t>In real networks, the interface set in SAV rules usually can be grouped. For example, the interfaces can be grouped as:</t>
        <ul spacing="normal">
          <li>
            <t>Subnet interface set that contains the interfaces connecting a target subnet</t>
          </li>
          <li>
            <t>All customer AS interfaces set or the customer AS interfaces set of a customer AS</t>
          </li>
          <li>
            <t>All lateral peer AS interfaces set or the lateral peer AS interfaces set of a lateral peer AS</t>
          </li>
          <li>
            <t>All transit provider AS interfaces set or the transit provider AS interfaces set of a transit provider AS</t>
          </li>
        </ul>
        <t>These interface set can be indentified by a group id for easy management.</t>
      </section>
      <section anchor="bgp-flowspec-for-sav">
        <name>BGP FlowSpec for SAV</name>
        <t>SAV can be disseminated to Edge/Border/Aggragation routers through BGP FlowSpec, as shown in the figure below. The controller is used to set up BGP connection with the routers in a SAV-deployed AS or domain. Note that, SAV rules disseminated by BGP FlowSpec can take effect alone or acts as a management tool of other SAV mechanisms (e.g., <xref target="RFC8704"/>).</t>
        <artwork><![CDATA[
                      +------------+
                      | Controller |
                      +------------+
                        /   |    \
                       / FS | FS  \ FS
                      /     |      \
+-------------+      +--------------+      +---------+
| Provider or |      | SAV-deployed |      |         |
| Customer or |------# AS/Domain    #------| Subnets |
| Peer AS     |      |              |      |         |
+-------------+      +--------------+      +---------+
]]></artwork>
      </section>
    </section>
    <section anchor="extended-community-for-sav">
      <name>Extended Community for SAV</name>
      <t>Existing BGP FlowSpec supports the component for matching source prefix and various filtering actions. This document will define a new extended community called SAV Interface-set extended community, which is similar to <xref target="I-D.ietf-idr-flowspec-interfaceset"/>. SAV rules can be disseminated through BGP FlowSpec by combining the new extended community with source prefix component and filtering actions of existing BGP FlowSpec (<xref target="RFC8955"/>, <xref target="RFC8956"/>).</t>
      <section anchor="sav-interface-set-extended-community">
        <name>SAV Interface-set Extended Community</name>
        <t>The newly defined SAV Interface-set extended community is encoded as follows:</t>
        <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |    SubType    |           AS Number           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       AS Number (cont.)       |U|V|     Group Identifier      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The meaning of fields:</t>
        <ul spacing="normal">
          <li>
            <t>Type (1 octect): 0x07 or 0x47. The value of 0x07 is for FlowSpec Transitive Extended Communities, and 0x47 represents FlowSpec Non-Transitive Extended Communities. The two values have been allocated by IANA <xref target="I-D.ietf-idr-flowspec-interfaceset"/>.</t>
          </li>
          <li>
            <t>SubType (1 octect): TBD. SubType field indicates SAV Interface-set extended community.</t>
          </li>
          <li>
            <t>AS Number (4 octects): Four-octect AS number. This field indicates the target AS where the SAV rule takes effect.</t>
          </li>
          <li>
            <t>Group Identifier (14 bits): A 14-bit number with the value ranging within 0..16383. Group identifier is a local property and identifies a set of interfaces for the source prefix carried in NLRI. The meaning of a group identifier depends on the configuration of network administrator. An interface may be associated with one or more group identifiers.</t>
          </li>
          <li>
            <t>Flag V (1 bit): 1 means the identified interface set is valid for the source prefix, while 0 means the interface set is invalid for the source prefix.</t>
          </li>
          <li>
            <t>Flag U (1 bit): 1 means the rest of interfaces (not included in the interface set) on the local router are unknown for the source prefix. 0 means the rest of interfaces on the local router are invalid (when V=1) or valid (when V=0) for the source prefix.</t>
          </li>
        </ul>
        <t>In a BGP update, there may be more than one instances of SAV Interface-set extended community. The final interface set for the corresponding source prefix <bcp14>MUST</bcp14> be the union of these instances.</t>
        <t>Multiple source prefixes can be put in multiple BGP FlowSpec NLRIs of one BGP update. In such case, these source prefixes <bcp14>MUST</bcp14> share the same SAV Interface-set extended communities.</t>
      </section>
      <section anchor="examples">
        <name>Examples</name>
        <t>Example 1: Configure soucre prefix P1 as valid at AS1's interfaces (Group Identifier=ID1) connecting a multi-homed subnet.</t>
        <t>Encoding description: NLRI carries source prefix P1 following existing BGP FlowSpec. The SAV Interface-set community with Type=0x07 and subType=TBD carries ID1 with AS number=AS1, flag V=1, and U=1.</t>
        <t>Example 2: Block soucre prefix P2 at AS2's interfaces (Group Identifier=ID2) connecting to transit providers.</t>
        <t>Encoding description: NLRI carries source prefix P2 and BGP extended community carries the drop action (e.g., set traffic-rate-bytes to zero). The SAV Interface-set community with Type=0x07 and subType=TBD carries ID2 with AS number=AS2, flag V=0 and U=1.</t>
      </section>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document requests a new subtype (suggested value 0x03) within the FlowSpec Transitive Extended Communities (0x07) and FlowSpec Non-Transitive Extended Communities (0x47). This sub-type shall be named "SAV Interface-set", with a reference to this document.</t>
      <artwork><![CDATA[
+=======+======================+===============+
| Value | Name                 | Reference     |
+=======+======================+===============+
| TBD   | SAV Interface-set    | This document |
+-------+----------------------+---------------+
]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>No new security issues are introduced.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBD.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-idr-flowspec-interfaceset" target="https://datatracker.ietf.org/doc/html/draft-ietf-idr-flowspec-interfaceset-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-idr-flowspec-interfaceset.xml">
          <front>
            <title>Applying BGP flowspec rules on a specific interface set</title>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Individual</organization>
            </author>
            <author fullname="Adam Simpson" initials="A." surname="Simpson">
              <organization>Nokia</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus, Inc</organization>
            </author>
            <author fullname="Jeffrey Haas" initials="J." surname="Haas">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Lucy Yong" initials="L." surname="Yong">
              <organization>Huawei</organization>
            </author>
            <date day="18" month="November" year="2019"/>
            <abstract>
              <t>The BGP Flow Specification (flowspec) Network Layer Reachability Information (BGP NLRI) extension (draft-ietf-idr-rfc5575bis) is used to distribute traffic flow specifications into BGP. The primary application of this extension is the distribution of traffic filtering policies for the mitigation of distributed denial of service (DDoS) attacks. By default, flow specification filters are applied on all forwarding interfaces that are enabled for use by the BGP flowspec extension. A network operator may wish to apply a given filter selectively to a subset of interfaces based on an internal classification scheme. Examples of this include "all customer interfaces", "all peer interfaces", "all transit interfaces", etc. This document defines BGP Extended Communities (RFC4360) that allow such filters to be selectively applied to sets of forwarding interfaces sharing a common group identifier. The BGP Extended Communities carrying this group identifier are referred to as the BGP Flowspec "interface-set" Extended Communities.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-idr-flowspec-interfaceset-05"/>
        </reference>
        <reference anchor="RFC8955" target="https://www.rfc-editor.org/info/rfc8955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8955.xml">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8956" target="https://www.rfc-editor.org/info/rfc8956" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8956.xml">
          <front>
            <title>Dissemination of Flow Specification Rules for IPv6</title>
            <author fullname="C. Loibl" initials="C." role="editor" surname="Loibl"/>
            <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>"Dissemination of Flow Specification Rules" (RFC 8955) provides a Border Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.</t>
              <t>This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8956"/>
          <seriesInfo name="DOI" value="10.17487/RFC8956"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-problem-statement-02" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.ietf-savnet-intra-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="17" month="August" year="2023"/>
            <abstract>
              <t>This document provides the gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-02"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-02" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="22" month="August" year="2023"/>
            <abstract>
              <t>This document provides the gap analysis of existing inter-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-02"/>
        </reference>
        <reference anchor="I-D.li-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-intra-domain-architecture-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Fang Gao" initials="F." surname="Gao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="25" month="July" year="2023"/>
            <abstract>
              <t>This document proposes an intra-domain SAVNET architecture. Devices in the intra-domain network can communicate with each other and advertise SAV-specific information. SAV-specific information explicitly or implicitly indicates the accurate incoming directions of source addresses. With the advertised information, devices can generate accurate SAV rules automatically. Under the incremental/ partial deployment of the architecture, routing information can be used as a supplement of SAV-specific information for SAV rule generation. The architecture primarily introduces the SAV-specific information, architectural components, and the collaborations between them. Future intra-domain SAV mechanisms/protocols can be developed based on the architecture. Concrete protocol extensions or implementations are not the focus of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-03"/>
        </reference>
        <reference anchor="I-D.wu-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-wu-savnet-inter-domain-architecture-04" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.wu-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <date day="30" month="September" year="2023"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture, providing a comprehensive framework for guiding the design of inter- domain SAV mechanisms. The proposed architecture empowers ASes to establish SAV rules by sharing SAV-specific Information between themselves. During the incremental or partial deployment of SAV- specific Information, it can rely on general information, such as routing information from the RIB, to construct the SAV table when SAV-specific Information for an AS's prefixes is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. It also defines the architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-04"/>
        </reference>
        <reference anchor="I-D.huang-savnet-sav-table" target="https://datatracker.ietf.org/doc/html/draft-huang-savnet-sav-table-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.huang-savnet-sav-table.xml">
          <front>
            <title>Source Address Validation Table Abstraction and Application</title>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="6" month="March" year="2023"/>
            <abstract>
              <t>Source address validation (SAV) table consists of SAV rules that are manually configured or automatically generated. The table will take effect in data plane for checking the validity of source addresses. SAV mechanisms may enable SAV tables in data plane using different methods (e.g., ACL or FIB), and these tables are suitable for different application scenarios. This document aims to provide a systematic view of existing SAV tables, which makes it convenient for engineers or operators to improve existing SAV mechanisms or properly apply SAV on routers. The document first examines existing forms of SAV tables and provides a unified abstraction. Then, three validation modes are concluded as well as suggestions for application scenarios. Finally, diversified actions for each validity state are introduced for compliance of different operation requirements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-01"/>
        </reference>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
      </references>
    </references>
    <?line 224?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
