<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-huang-savnet-sav-table-02" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="SAV Table">Source Address Validation Table Abstraction and Application</title>
    <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-02"/>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="W." surname="Cheng" fullname="Weiqiang Cheng">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>chengweiqiang@chinamobile.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Liu" fullname="Mingxing Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liumingxing7@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="20"/>
    <area>Routing</area>
    <workgroup>savnet</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 77?>
<t>Existing source address validation (SAV) mechanisms have their own core data structures for SAV rules which are coupled with the corresponding underlying implementation. This document defines a unified abstraction named SAV table that stores all the SAV rules. The abstraction makes it convenient for engineers or operators to improve existing SAV mechanisms or properly apply SAV on routers.</t>
    </abstract>
  </front>
  <middle>
    <?line 80?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source address validation (SAV) can detect and prevent source address spoofing on the SAV-enabled routers. When a packet arrives at an interface of the router, the source address of the packet will be validated. For the packets with unwanted source addresses or arriving at unwanted interfaces, will be considered invalid and usually be conducted elimination actions on.</t>
      <t>There have been many source address validation (SAV) mechanisms such as ACL-based filtering (<xref target="RFC3704"/>), uRPF-like mechanisms (<xref target="RFC3704"/>, <xref target="RFC8704"/>), etc. ACL rules can act as SAV rules for filtering unwanted source addresses (possibly spoofed source addresses) at specific interfaces. Strict uRPF and loose uRPF conducts reverse looking up in FIB for validating source addresses. Therefore, FIB entries can somehow be considered as SAV rules.</t>
      <t>It can be found that existing SAV mechanisms have their own core data structures which are coupled with the corresponding underlying implementation. The coupling induces three problems. First, it is not easy to perform analysis across different SAV mechanisms because the SAV rule generation process and the validation process depends on the underlying implementation. Second, the accuracy of SAV varies under different application conditions. With diversified data structure of SAV rules, we cannot easily express or agree on important questions such as which kind of SAV tables can be generated and enabled in the data plane. Third, SAV mechanisms usually take either "permit" action or "block" action on the validated packets. It is sometimes not flexible enough for diversified operation requirements in practice.</t>
      <t>This document abstracts the data structure for storing SAV rules as a unified SAV table. The SAV table is a logical description and not coupled with underlying implementation. After defining the SAV table, the document introduces the validation process, validation modes, and elimination actions. All the descriptions are not bound to specific implementations, but real implementations must have the equivalent effects to the abstracted descriptions.</t>
      <t>The SAV table abstraction and application introductions can:</t>
      <ul spacing="normal">
        <li>
          <t>Help engineers easily clarify the design goals of SAV mechanisms.</t>
        </li>
        <li>
          <t>Help operators easily learn how to apply SAV in different scenarios.</t>
        </li>
      </ul>
      <t>How to generate the SAV rules in the SAV table is not the focus of this document.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV rule: The entry specifying the valid incoming interfaces of specific source addresses or source prefixes.</t>
        <t>SAV table: The abstracted data structure that stores SAV rules.</t>
        <t>Validation mode: The definition that describes the typical applications of SAV table. Different modes take effect in different scales and treat the default prefix differently.</t>
        <t>Elimination action: The action taken on the invalid packets that fail to pass SAV process.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sav-table-abst">
      <name>SAV Table Abstraction</name>
      <t>The basic idea of SAV is to check whether a source prefix arrives from a valid interface of the router. So, there are two dimensions in a logic SAV table, i.e., source prefix and interface. <xref target="sav-table-abst"/> shows the abstraction of SAV table. The prefixes, i.e., Prefix1, Prefix2, Prefix3, ..., Prefixn, mean the prefixes that the SAV mechanisms have learned or aim to validate. The interfaces, i.e., Intf. 1, Intf. 2, Intf. 3 ..., are the router's interfaces that enable validation.</t>
      <t>Each cell in the table indicates the validity state of the corresponding source prefix and interface. For example, suppose a packet with source address P1 arrives at interface Intf1. The validity state for the packet is "state_11" after taking SAV. For the source prefix of "default" in <xref target="sav-table-abst"/>, it means all zero IP address for IPv4 or IPv6, i.e., unrecorded source addresses. The packets with unrecorded source addresses will match the default source prefix.</t>
      <t>There are two kinds of validity states: "valid" and "invalid". If the state is "valid", the packet is considered legitimate. If the state is "invalid", the packet is considered as carrying a spoofed source address. 
There may be some cases where SAV mechanisms fail to get enough information for SAV table generation and cannot determine the validity states of some cells. In these cases, the cells are suggested to be filled with "valid" instead of "invalid" or a particularly defined "unknown" state, so that the forwarding of legitimate packets will not be impacted (e.g., blocked) by mistake.</t>
      <figure anchor="sav-table-abs">
        <name>SAV table abstraction</name>
        <artwork><![CDATA[
  +-------------------------------------------------+
  +          |  Intf 1  |  Intf 2  |  Intf 3  | ... +
  +-------------------------------------------------+
  +  Prefix1 | state_11 | state_12 | state_13 | ... +
  +  Prefix2 | state_21 | state_22 | state_23 | ... +
  +  Prefix3 | state_31 | state_32 | state_33 | ... +
  +  ...     |   ...    |   ...    |   ...    | ... +
  +  Prefixn | state_n1 | state_n2 | state_n3 | ... +
  +  default | state_*1 | state_*2 | state_*3 | ... +
  +-------------------------------------------------+
  *state: valid or invalid
  *default: all zero IP address for IPv4 or IPv6
]]></artwork>
      </figure>
      <section anchor="validation-process">
        <name>Validation Process</name>
        <t>The validation process is shown in <xref target="SAV-process"/>. Suppose the router has learned the SAV table by SAV mechanisms and implemented it in the data plane. When a packet arrives at the router, the router will take the source address and the incoming interface of the packet as the input and look up the table. The validity state that is either "valid" or "invalid" will be returned after the process.</t>
        <figure anchor="SAV-process">
          <name>Validation process</name>
          <artwork><![CDATA[
                 SAV-enabled Router
                  +-------------+   
  packet          | look up the |
(src address ---->| implemented |--------> validity
incoming intf.)   | SAV table   |          state
                  +-------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-SAV-mode">
        <name>Validation Modes</name>
        <t>This section defines validation modes which describes the typical applications of SAV table. These modes take effect in different scales and treat the default prefix differently. By choosing modes in different scenarios appropriately, the network can be protected as much as possible while not impacting the forwarding of legitimate packets.</t>
        <t>Validation modes also describe the goal of SAV table generation. The modes can be set before generating the table. By specifying validation modes, operators can take appropriate SAV mechanisms matching the modes, and engineers can design new SAV mechanisms to achieve the goal in challenging scenarios.</t>
        <t>Note that, validation modes do not put restrictions to product implementations, but the implementation should have the equivalent effect to the description.</t>
        <section anchor="mode-1-interface-based-prefix-allowlist">
          <name>Mode 1: Interface-based prefix allowlist</name>
          <t>Mode 1 is an interface-scale mode, i.e., it takes effect on a configured interface. The interface enabling Mode 1 is maintaining an interface-based prefix allowlist. Only the source prefixes recorded in the list will be considered valid, otherwise invalid. For the interface enabling Mode 1, the corresponding column in the generated SAV table can be equivalently mapped to a prefix allowlist. In the column, the prefixes recorded as valid will be put into the allowlist. Particularly, the default prefix is deterministic to be "invalid" in the column.</t>
          <t>Applying Mode 1 on an interface requires the complete knowledge of legitimate prefixes connected to the interface. Mode 1 is suitable to the interfaces connecting to a subnet, a stub AS, or a customer cone. Such a mode can efficiently prevent the connected network from spoofing source prefixes of other networks. 
In some cases, it may be difficult for an interface getting all the legitimate source prefixes. If not all legitimate prefixes are included in the allowlist, packets with legitimate source addresses arriving at the interface may be improperly blocked. For example, the interface with a default route or the interface connecting to the Internet through a provider AS can hardly promise to know all the legitimate source prefixes.</t>
        </section>
        <section anchor="mode-2-interface-based-prefix-blocklist">
          <name>Mode 2: Interface-based prefix blocklist</name>
          <t>Mode 2 is also an interface-scale mode, i.e., it takes effect on a configured interface. An interface cannot enable Mode 1 and Mode 2 at the same time. The interface enabling Mode 2 is maintaining an interface-based prefix blocklist. The source prefixes recorded in the list will be considered invalid, otherwise valid. For the interface enabling Mode 2, the corresponding column in the generated SAV table can be equivalently mapped to a prefix blocklist. In the column, the prefixes recorded as invalid will be put into the blocklist. Particularly, the default prefix is deterministic to be "valid" in the column.</t>
          <t>This mode does not require the complete blocklist. If the packets with the specific source addresses need to be discarded, Mode 2 can be taken. Mode 2 is suitable for proactive filtering and reactive filtering. Usually the source prefixes that are sure to be invalid will be put into the blocklist, which is proactive filtering. Reactive filtering rules are usually installed in DDoS elimination for dropping specific packets.</t>
        </section>
        <section anchor="mode-3-prefix-based-interface-allowlist">
          <name>Mode 3: Prefix-based interface allowlist</name>
          <t>Mode 3 is a router-scale mode, i.e., it takes effect on all the SAV-enabled interfaces except those enabling Mode 1 or Mode 2. The router enabling Mode 3 is maintaining a specific set of source prefixes (Notes: usually not include the default prefix) and an interface allowlist (i.e., a list of legitimate incoming interfaces) for each of the source prefixes. 
The packets whose source addresses are covered by no recorded source prefix will be considered valid. 
A packet will also be considered valid, if 1) its source address is covered by a recorded source prefix and 2) the incoming interface is also included in the corresponding interface allowlist of the source prefix. If the source address is covered by a recorded source prefix but the incoming interface is not included, the validation result will be "invalid".</t>
          <t>Mode 3 focuses on validating/protecting the interested source prefixes. If some source prefixes are important but there is no condition to enable Mode 1, Mode 3 can be enabled to provide some extent of protection.</t>
          <t>Note that, Mode 1 and Mode 2 are configured on an interface, while Mode 3 is for the whole router. Thus, there can be multiple modes configured on the same router. For interfaces configured with Mode 1 or Mode 2, Mode 3 will not be conducted for the packets arriving at the interface. <xref target="modes"/> shows a comparison of different validation modes.</t>
          <figure anchor="modes">
            <name>A comparison of different validation modes</name>
            <artwork><![CDATA[
  +-----------------------------------------------------+
  + Mode | Scale     | Treatment of the default prefix  +
  +-----------------------------------------------------+
  + 1    | interface | invalid                          +
  + 2    | interface | valid                            +
  + 3    | router    | check its incoming interface     +
  +-----------------------------------------------------+
]]></artwork>
          </figure>
        </section>
      </section>
    </section>
    <section anchor="sec-SAV-action">
      <name>Elimination Actions</name>
      <t>After doing validation, the router should update the local validation statistics. For the packet with invalid state, elimination actions should be taken on the packet. Simply dropping the packets may not well satisfy the requirements of operators in different scenarios. This section suggests to provide flexible actions to invalid packet just like FlowSpec (<xref target="RFC8955"/>, <xref target="RFC8956"/>).</t>
      <t>One of the followings elimination actions will be taken:</t>
      <ul spacing="normal">
        <li>
          <t>"Permit": Forward packets normally though the packets are considered invalid. This action is useful when operators only want to monitor the status of source address spoofing in the network. The "Permit" action can be taken together with the "Sample" action.</t>
        </li>
        <li>
          <t>"Block": Drop packets directly, which is the common choose of existing SAV mechanisms.</t>
        </li>
        <li>
          <t>"Rate limit": Enforce an upper bound of traffic rate (e.g., bps or pps) for mitigation of source address spoofing attacks.</t>
        </li>
        <li>
          <t>"Traffic redirect": Redirect the packets to the specified points (e.g., scrubbing centers) in the network for attack elimination.</t>
        </li>
      </ul>
      <t>The following action is optional:</t>
      <ul spacing="normal">
        <li>
          <t>"Sample": Capture the packets with a configurable sampling rate and reports them to remote servers (e.g., security analysis center). The sampled packets can be used for threat awareness and further analysis <xref target="I-D.cheng-savnet-proactive-defense-network"/>. "Sample" can be taken together with any one of the above elimination actions. Note that, existing techniques like NetStream or NetFlow can be used for "Sample".</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document focuses on the organization of the core data structure of SAV and device-local SAV operation. The generation of SAV table is not discussed. There may be some security considerations for SAV generation, but it is not in the scope of this document.</t>
      <t>The "Sample" action pushes data to remote servers. This function can be achieved by existing techniques like NetStream or NetFlow. The "Sample" action may induce same security considerations as these techniques, and the corresponding documents have discussed them.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC8955" target="https://www.rfc-editor.org/info/rfc8955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8955.xml">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8956" target="https://www.rfc-editor.org/info/rfc8956" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8956.xml">
          <front>
            <title>Dissemination of Flow Specification Rules for IPv6</title>
            <author fullname="C. Loibl" initials="C." role="editor" surname="Loibl"/>
            <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>"Dissemination of Flow Specification Rules" (RFC 8955) provides a Border Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.</t>
              <t>This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8956"/>
          <seriesInfo name="DOI" value="10.17487/RFC8956"/>
        </reference>
        <reference anchor="I-D.cheng-savnet-proactive-defense-network" target="https://datatracker.ietf.org/api/v1/doc/document/draft-cheng-savnet-proactive-defense-network/" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.cheng-savnet-proactive-defense-network.xml">
          <front>
            <title>Network Proactive Defense based on Source Address Validation</title>
            <author fullname="Weiqiang Cheng"/>
            <author fullname="Nan Geng"/>
            <author fullname="Dan Li"/>
            <author fullname="Shengnan Yue"/>
            <date day="19" month="October" year="2023"/>
            <abstract>
              <t>Source address validation (SAV) helps routers check the validity of
   packets.  Networks can use the SAV capability to enhance threat
   awareness.  This document proposes proactive defense network where
   routers can directly identify threats through SAV.  The proactive
   threat awareness feature is helpful for satisfying the threat
   awareness requirement of ISPs.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cheng-savnet-proactive-defense-network-01"/>
        </reference>
      </references>
    </references>
    <?line 238?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
