<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-idr-flowspec-sav-04" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="BGP FlowSpec for SAV">BGP Flow Specification for Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-idr-flowspec-sav-04"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="T." surname="Tong" fullname="Tian Tong">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tongt5@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="October" day="12"/>
    <area>Routing</area>
    <workgroup>IDR</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 71?>

<t>BGP FlowSpec reuses BGP route to distribute infrastructure and propagates traffic flow information with filtering actions. This document proposes some extensions to BGP FlowSpec for disseminating SAV rules.</t>
    </abstract>
  </front>
  <middle>
    <?line 75?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is an efficient method for preventing source address spoofing-based attacks. SAV rules indicate the valid/invalid incoming interfaces of a specific source IP address or source IP prefix. The rules can be deployed on edge routers, border routers, or aggregation routers for checking the validity of intra-domain and inter-domain packets. For invalid packets, filtering actions can be taken such as block, rate-limit, redirect, and sampling <xref target="I-D.huang-savnet-sav-table"/>.</t>
      <t>There are many mechanisms that can distributedly generate SAV rules on routers (<xref target="RFC2827"/>, <xref target="RFC3704"/>, <xref target="RFC5210"/>, <xref target="RFC8704"/>, and <xref target="manrs-antispoofing"/>). To facilitate flexible SAV management and improve validation accuracy, centralized SAV rule dissemination is also needed <xref target="I-D.li-savnet-intra-domain-architecture"/><xref target="I-D.wu-savnet-inter-domain-architecture"/>, which can be a complementary to existing distributed SAV mechanisms.</t>
      <t>BGP FlowSpec is a convenient and flexible tool for traffic filtering/controlling (<xref target="RFC8955"/>, <xref target="RFC8956"/>). It propagates traffic flow information for different traffic control purposes through the BGP protocol extension. Existing BGP FlowSpec has supported source prefix matching and various traffic filtering actions but does not support binding valid/invalid incoming interfaces to source prefixes. With some extensions, BGP FlowSpec can be used for SAV rule dissemination.</t>
      <t>This document defines a new flow specification component named Incoming-Interface-Set. SAV rules can be disseminated through BGP FlowSpec by carrying the new flow specification component together with Source Prefix component (or Source Prefix Group component). Traffic filtering actions of existing BGP FlowSpec can also be carried to specify the actions for the packets failing source address validation. 
This document also defines a new action which indicates where to install the SAV rules in the data-plane.</t>
      <t>BGP FlowSpec with the new extensions can be used to disseminate SAV rules to remote routers, which acts as a supplement of existing SAV mechanisms and help improve SAV accuracy.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV: Source address validation</t>
        <t>SAV Rule: The rule that indicates the valid/invalid incoming interfaces of a specific source IP address or source IP prefix.</t>
        <t>Group Identifier: An ID value that identifies a set of interfaces on the target routers (e.g., all the interfaces connected to customer ASes).</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="bgp-flowspec-for-sav">
      <name>BGP FlowSpec for SAV</name>
      <t>A SAV rule typically has a format of &lt;source prefix, interface set, validity indicator&gt;. Source prefix is for matching specific packets. Interface set represents a set of physical interfaces from which the packets arrive. Validity indicator indicates whether the packets matching the source prefix and arrival interface are valid or invalid. So, validity indicator has a value of either valid or invalid.</t>
      <t>For example, the rule &lt;P1, [intf1, intf2], valid&gt; means the source prefix P1 must arrive the router at interface Intf1 or Intf2, otherwise, P1 is invalid. For the packets with invalid source addresses/prefixes, the filtering actions, such as block, rate-limit, and redirect, can be taken <xref target="I-D.huang-savnet-sav-table"/>.</t>
      <t>SAV rules can be disseminated to Edge/Border/Aggregation routers (i.e., target routers) through BGP FlowSpec, as shown in the figure below. The controller is used to set up BGP connection with the routers in a SAV-deployed AS or domain.</t>
      <artwork><![CDATA[
                      +------------+
                      | Controller |
                      +------------+
                        /   |    \
                       / FS | FS  \ FS
                      /     |      \
+-------------+      +--------------+      +---------+
| Provider or |      | SAV-deployed |      |         |
| Customer or |------# AS/Domain    #------| Subnets |
| Peer AS     |      |              |      |         |
+-------------+      +--------------+      +---------+
]]></artwork>
      <t>Existing BGP FlowSpec has supported source prefix matching and various traffic filtering actions. There are also some proposals that group source prefixes by AS numbers (<xref target="I-D.wang-idr-flowspec-dip-origin-as-filter"/>) or community values for good scalability and efficiency. An AS number or a community value can represent a set of source prefixes. For simplicity, the term of Source Prefix Group component will be used to represent such source prefix groups in BGP FlowSpec.</t>
      <t>However, existing BGP FlowSpec does not support binding valid/invalid incoming interfaces to source prefixes. Besides, BGP FlowSpec rules are mostly installed in ACL table/firewall table. In contrast, SAV rules may be installed in differect positions of data-plane, such as ACL/firewall, FIB, or independent SAV table. Some extensions are needed by BGP FlowSpec for efficient SAV rule dissemination.</t>
    </section>
    <section anchor="extensions-to-bgp-flowspec">
      <name>Extensions to BGP FlowSpec</name>
      <section anchor="incoming-interface-set-component">
        <name>Incoming-Interface-Set Component</name>
        <section anchor="interface-set">
          <name>Interface Set</name>
          <t>To facilitate scalability, the interface set in SAV rules can be grouped. For example, the interfaces can be grouped as:</t>
          <ul spacing="normal">
            <li>
              <t>Subnet interface set that contains the interfaces connecting a target subnet.</t>
            </li>
            <li>
              <t>All customer AS interfaces set or the customer AS interfaces set of a customer AS.</t>
            </li>
            <li>
              <t>All lateral peer AS interfaces set or the lateral peer AS interfaces set of a lateral peer AS.</t>
            </li>
            <li>
              <t>All transit provider AS interfaces set or the transit provider AS interfaces set of a transit provider AS.</t>
            </li>
          </ul>
          <t>These interface set can be identified by a Group Identifier for easy management. A Group Identifier can have either local meaning or global meaning. On the one hand, it can be a local interface property on the target routers, and the meaning of it depends on the configurations of network administrator. On the other hand, a global meaning Group Identifier field carries AS number, which represents all the interfaces connected to the neighboring AS with the AS number.</t>
          <t>Any interface may be associated with one or more Group Identifiers.</t>
        </section>
        <section anchor="incoming-interface-set-encoding">
          <name>Incoming-Interface-Set Encoding</name>
          <t>The new flow specification component is encoded in the BGP Flowspec NLRI. It appears together with Source Prefix component or Source Prefix Group component.</t>
          <t>The following new component type is defined:</t>
          <ul spacing="normal">
            <li>
              <t>Type TBD1: Incoming-Interface-Set</t>
            </li>
            <li>
              <t>Encoding: &lt;type (1 octet), [numeric_op, value]+&gt;</t>
            </li>
          </ul>
          <t>The new component contains a set of {numeric_op, value} pairs that are used to match the Incoming-Interface-Set (i.e., the valid or invalid interfaces of a specific source prefix).</t>
          <t>The numeric operator (numeric_op) is encoded as (see RFC8955 sec. 4.2.1.1):</t>
          <artwork><![CDATA[
    0   1   2   3   4   5   6   7
  +---+---+---+---+---+---+---+---+
  | e | a |  len  | 0 |lt |gt |eq |
  +---+---+---+---+---+---+---+---+
]]></artwork>
          <t>The value field is encoded as:</t>
          <artwork><![CDATA[
 0                   1                   2                   3  
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|V|R|     Group Identifier (variable, 6, 14, 30, or 62 bits)    ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          <t>The length of the value field can be 1, 2, 4, or 8 octets, which depends on the len in numeric_op. 
Particularly, the most two significant bits in the value field are two flags:</t>
          <ul spacing="normal">
            <li>
              <t>Flag V (1 bit): The most significant bit in the value field. If unset, it means the interface set is invalid for the source prefix. If set, the identified interface set is valid for the source prefix.</t>
            </li>
            <li>
              <t>Flag G (1 bit): The second most significant bit in the value field. If unset, the Group Identifier has a local meaning. If set, the Group Identifier has a global meaning, i.e., the Group Identifier field stores an AS number.</t>
            </li>
          </ul>
          <t>Zero Group Identifier (i.e., Group Identifier equaling 0) is a reserved value and does not need to be configured. A NLRI may carry one zero Group Identifier and several non-zero Group Identifiers. The zero Group Identifier means any other interfaces on the target router except the interfaces indicated by non-zero Group Identifiers in the same NLRI. If a NLRI only contains a zero Group Identifier and has no non-zero Group Identifiers, the zero Group Identifier will represent all interfaces on the target router. A NLRI <bcp14>MUST</bcp14> not contain more than one zero Group Identifiers, otherwise, the whole NLRI will be ignored.</t>
          <t>The bits lt, gt, and eq can be combined to match a specific Group Identifier or a range of Group Identifiers (e.g., greater than Group ID1 and less than Group ID2). For a range of Group Identifiers, their corresponding flags (i.e., V and R) <bcp14>MUST</bcp14> be the same. Otherwise, the whole NLRI will be ignored.</t>
          <t>If a receiving BGP speaker cannot support this new flow specification component type, it <bcp14>MUST</bcp14> discard the NLRI value field that contains such unknown components (section 10 of <xref target="RFC8955"/>). 
A NLRI value field <bcp14>MUST</bcp14> only contain a Source Prefix component (or Source Prefix Group component) and an Incoming-Interface-Set component. If the NLRI value does not satisfy this principle, the receiving BGP speaker <bcp14>SHOULD</bcp14> discard the NLRI value field (see Section <xref target="usages"/>). 
Since the NLRI field encoding (Section 4 of <xref target="RFC8955"/>) is defined in the form of a 2-tuple &lt;length, NLRI value&gt;, message decoding can skip over the unknown NLRI value and continue with subsequent remaining NLRIs.</t>
        </section>
        <section anchor="example">
          <name>Example</name>
          <t>Example: A Flow Specification NLRI encoding for "incoming interfaces {Group ID range [1, 20]} are valid for the packets from 203.0.113.0/24, and other local interfaces are invalid for the source prefix".</t>
          <artwork><![CDATA[
+========+================+========================+
| Length | Source         | Flags+Group Identifier |
+========+================+========================+
| 0c     | 02 18 cb 00 71 | TBD1 03 81 45 94 81 00 |
+--------+----------------+------------------------+
]]></artwork>
          <t>Decoded:</t>
          <artwork><![CDATA[
+=======+============+====================================+
| Value |                                                 |
+=======+============+====================================+
| 0x0c  | length     | 12 octets (if len<240, 1 octet)    |
+-------+------------+------------------------------------+
| 0x02  | type       | Type 2 - Source Prefix             |
+-------+------------+------------------------------------+
| 0x18  | length     | 24 bit                             |
+-------+------------+------------------------------------+
| 0xcb  | prefix     | 203                                |
+-------+------------+------------------------------------+
| 0x00  | prefix     | 0                                  |
+-------+------------+------------------------------------+
| 0x71  | prefix     | 113                                |
+-------+------------+------------------------------------+
| TBD1  | type       | Type TBD1 - Incoming-interface-set |
+-------+------------+------------------------------------+
| 0x03  | numeric_op | value size=1, >=                   |
+-------+------------+------------------------------------+
| 0x81  | value      | V=1, R=0, ID=1                     |
+-------+------------+------------------------------------+
| 0x45  | numeric_op | "AND", value size=1, <=            |
+-------+------------+------------------------------------+
| 0x94  | value      | V=1, R=0, ID=20                    |
+-------+------------+------------------------------------+
| 0x81  | numeric_op | end-of-list, value size=1, ==      |
+-------+------------+------------------------------------+
| 0x00  | value      | V=0, R=0, ID=0                     |
+-------+------------+------------------------------------+
]]></artwork>
          <t>This constitutes an NLRI with an NLRI length of 12 octets.</t>
        </section>
      </section>
      <section anchor="rule-position-extended-community">
        <name>Rule-Position Extended Community</name>
        <t>This document proposes a new BGP Route Target extended community called the "rule-position".  This document expands the definition of the Route Target extended community to allow a new value of high order octet (Type field) to be 0x07 for the transitive flowspec interface-set extended community, or 0x47 for the non-transitive flowspec interface-set extended community. These are in addition to the values specified in [RFC4360].</t>
        <t>The Rule-Position extended community is encoded as follows:</t>
        <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  | 0x07 or 0x47  |      TBD2     |    Autonomous System Number   :
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  :     AS Number (cont.)         |    Position   |    Reserved   |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        <t>The Position field indicates that where to install the SAV rule. Some values can be:</t>
        <ul spacing="normal">
          <li>
            <t>0: ACL</t>
          </li>
          <li>
            <t>1: FIB</t>
          </li>
          <li>
            <t>2: Independent SAV table</t>
          </li>
          <li>
            <t>Other values: reserved</t>
          </li>
        </ul>
        <t>Since FIB and Independent SAV table can only match address prefix and interface, the Rule-Position extended community with the Position field equaling 1 or 2 means the NLRI is specific for SAV rule dissemination, and the unrelated components (not Source Prefix (Group) or Incoming-Interface-Set) <bcp14>SHOULD NOT</bcp14> appear in the NLRI.</t>
      </section>
    </section>
    <section anchor="usages">
      <name>General Usages</name>
      <t>The Incoming-Interface-Set component can be used as a general flow specification instead of SAV-specific component. Other components can be combined with the new component for matching specific traffic.</t>
    </section>
    <section anchor="error-handling">
      <name>Error Handling</name>
      <t>TBD</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <section anchor="incoming-interface-set-component-1">
        <name>Incoming-Interface-Set Component</name>
        <t>This document requests a new entry in "Flow Spec component types registry" with the following values:</t>
        <artwork><![CDATA[
+=======+========================+===============+
| Type  | IPv4/IPv6 Name         | Reference     |
+=======+========================+===============+
| TBD1  | Incoming-Interface-set | This document |
+-------+------------------------+---------------+
]]></artwork>
      </section>
      <section anchor="rule-position-extended-community-1">
        <name>Rule-Position Extended Community</name>
        <t>This document requests a new subtype TBD2 within Transitive and Non-Transitive Extended Communities. This sub-type shall be named "rule-position", with a reference to this document.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD.</t>
      <!-- Q: How to verify the routes with only src+interface in the inter-domain flowspec case? 
A: Only accept the FS routes with source prefixes originated from the same AS as the FS route, which is similar to draft-geng-idr-bgp-savnet-03. 
 Use case: A customer advertises SAV rules to its provider. The provider installs SAV rules for the source prefixes of the customer and helps block the forged source prefixes transiting the provider AS.  -->

</section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the comments from Shunwan Zhuang, Susan Hares, Jeffrey Haas, Mingxing Liu, etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.wang-idr-flowspec-dip-origin-as-filter" target="https://datatracker.ietf.org/doc/html/draft-wang-idr-flowspec-dip-origin-as-filter-09" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.wang-idr-flowspec-dip-origin-as-filter.xml">
          <front>
            <title>Destination-IP-Origin-AS Filter for BGP Flow Specification</title>
            <author fullname="Haibo Wang" initials="H." surname="Wang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Aijun Wang" initials="A." surname="Wang">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Shunwan Zhuang" initials="S." surname="Zhuang">
              <organization>Huawei</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>BGP Flowspec mechanism (BGP-FS) [RFC8955] [RFC8956] propagates both traffic Flow Specifications and Traffic Filtering Actions by making use of the BGP NLRI and the BGP Extended Community encoding formats. This document specifies a new BGP-FS component type to support AS- level filtering. The match field is the origin AS number of the destination IP address that is encoded in the Flowspec NLRI. This function is applied in a single administrative domain.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wang-idr-flowspec-dip-origin-as-filter-09"/>
        </reference>
        <reference anchor="RFC8955" target="https://www.rfc-editor.org/info/rfc8955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8955.xml">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8956" target="https://www.rfc-editor.org/info/rfc8956" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8956.xml">
          <front>
            <title>Dissemination of Flow Specification Rules for IPv6</title>
            <author fullname="C. Loibl" initials="C." role="editor" surname="Loibl"/>
            <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>"Dissemination of Flow Specification Rules" (RFC 8955) provides a Border Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.</t>
              <t>This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8956"/>
          <seriesInfo name="DOI" value="10.17487/RFC8956"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.li-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-intra-domain-architecture-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Fang Gao" initials="F." surname="Gao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL rules that require manual efforts to accommodate to network dynamics, SAVNET routers learn the SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-07"/>
        </reference>
        <reference anchor="I-D.wu-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-wu-savnet-inter-domain-architecture-11" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.wu-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="6" month="August" year="2024"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-11"/>
        </reference>
        <reference anchor="I-D.huang-savnet-sav-table" target="https://datatracker.ietf.org/doc/html/draft-huang-savnet-sav-table-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.huang-savnet-sav-table.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <date day="25" month="August" year="2024"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-07"/>
        </reference>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
      </references>
    </references>
    <?line 330?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
