<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-huang-savnet-sav-table-03" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="General SAV Capabilities">General Source Address Validation Capabilities</title>
    <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-03"/>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="W." surname="Cheng" fullname="Weiqiang Cheng">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>chengweiqiang@chinamobile.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Liu" fullname="Mingxing Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liumingxing7@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>
    <date year="2023" month="November" day="05"/>
    <area>Routing</area>
    <workgroup>savnet</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 80?>
<t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies.</t>
      <t>To overcome these limitations, this document introduces the general SAV capabilitiies from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
    </abstract>
  </front>
  <middle>
    <?line 85?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source address validation (SAV) can detect and prevent source address spoofing on the SAV-enabled routers. When a packet arrives at an interface of the router, the source address of the packet will be validated. The packets with unwanted source addresses or arriving at unwanted interfaces, will be considered invalid and usually be conducted elimination actions on.</t>
      <t>From the perspective of data plane validation, the SAV capabilities of existing mechanisms have two main limitations. One of them is the deployable scenario limitation. ACL rules can be configured for filtering unwanted source addresses at specific interfaces (<xref target="RFC3704"/>). However, ACL is not dedicatedly designed for source prefix filtering. There exist performance and scalability issues due to long-key based searching, and usually expert maintenance efforts are required. Strict uRPF and loose uRPF are two typical FIB-based SAV mechanisms (<xref target="RFC3704"/>) and are supported by most commercial routers/switches. FIB-based validation brings many benefits compared to ACL-based filtering but also induces some limitations. Strict uRPF is not applicable for asymmetric routing (<xref target="RFC8704"/>), which exists in various scenarios such as intra-domain multi-homing access, inter-domain interconnection, etc. Under asymmetric routing, a source prefix may have a different incoming interface from the next-hop interface of the matched entry, or the source prefix does not exist in the FIB at all. Loose mode can only block unannounced prefix, which results in massive false negatives. Overall, existing ACL-based or FIB-based SAVs can only be applied to specific scenarios and cannot be adaptive to various scenarios (e.g., symmetric vs asymmetric).</t>
      <t>The other limitation is inflexible traffic handling policy. The current common practice is just to silently drop the spoofed packets. We don’t know who benefits from this and who is the source. Further more, the clues of attacks are ignored, which could be very helpful for dealing with DDoS etc.</t>
      <t>The root cause of the above two limitations is that there is no tool specifically designed for source address filtering. That is, the capabilities of current tools are derived from other functions, e.g., FIB or ACL.</t>
      <t>This document describes the general SAV capabilities that the data plane of SAV-enabled devices should have. Two kinds of capabilities will be introduced: validation mode and traffic handling policy. Validation modes describe how to apply validation in different scenarios. Traffic handling policies are the policies applied on the validated packets. By implementing the general SAV capabilities, the above two limitations of existing mechanisms can be overcome.</t>
      <t>To achieve accurate and scalable source address validation, a dedicated SAV table for SAV rules is needed instead of using those derived from other functions, e.g., FIB or ACL. 
Note that the general SAV capabilities described in this document is decoupled with real implementation. Conforming implementations of this specification may differ, but the SAV outcomes <bcp14>SHOULD</bcp14> be equivalent to the described SAV capabilities. How to generate SAV rules is not the focus of this document.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV rule: The entry specifying the valid incoming interfaces of specific source addresses or source prefixes.</t>
        <t>Validation mode: The mode that describes the typical applications of SAV in a specific kind of scenarios. Different modes take effect in different scales and treat the default prefix differently.</t>
        <t>Traffic handling policy: The policy taken on the packets validated by SAV.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sav-mode">
      <name>Validation Modes</name>
      <t>This section describes validation modes. These modes take effect in different scales and treat the default prefix differently. By choosing modes in different scenarios appropriately, the network can be protected as much as possible while not impacting the forwarding of legitimate packets.</t>
      <t>Validation modes also describe the goal of SAV rule generation. The modes can be set before generating the rules. By specifying validation modes, operators can take appropriate SAV mechanisms matching the modes, and engineers can design new SAV mechanisms to achieve the goal in challenging scenarios.</t>
      <section anchor="mode-1-interface-based-prefix-allowlist">
        <name>Mode 1: Interface-based prefix allowlist</name>
        <t>Mode 1 is an interface-scale mode, i.e., it takes effect on a specific interface. The interface enabling Mode 1 is maintaining an interface-based prefix allowlist. Only the source prefixes recorded in the list will be considered valid, otherwise invalid.</t>
        <t>Applying Mode 1 on an interface requires the complete knowledge of legitimate prefixes connected to the interface. Mode 1 is suitable to the closed-connected interfaces such as those connecting to a subnet, a stub AS, or a customer cone. Such a mode can efficiently prevent the connected network from spoofing source prefixes of other networks.</t>
        <t>Strict uRPF based on FIB belongs to this mode. However, to overcome the limitation of asymmetric routing, native source prefix-based SAV table is suggested. This is essential for new SAV mechanisms/architectures such as EFP-uRPF <xref target="RFC8704"/>, BAR-SAV <xref target="I-D.ietf-sidrops-bar-sav"/>, Intra-domain/Inter-domain SAVNET (<xref target="I-D.li-savnet-intra-domain-architecture"/>, <xref target="I-D.wu-savnet-inter-domain-architecture"/>), etc.</t>
        <t>In some cases, it may be difficult for an interface getting all the legitimate source prefixes. If not all legitimate prefixes are included in the allowlist, packets with legitimate source addresses arriving at the interface may be improperly blocked. For example, the interface with a default route or the interface connecting to the Internet through a provider AS can hardly promise to know all the legitimate source prefixes.</t>
      </section>
      <section anchor="mode-2-interface-based-prefix-blocklist">
        <name>Mode 2: Interface-based prefix blocklist</name>
        <t>Mode 2 is also an interface-scale mode, i.e., it takes effect on a configured interface. An interface cannot enable Mode 1 and Mode 2 at the same time. The interface enabling Mode 2 is maintaining an interface-based prefix blocklist. The source prefixes recorded in the list will be considered invalid, otherwise valid.</t>
        <t>This mode does not require the complete blocklist. If the packets with the specific source addresses need to be discarded, Mode 2 can be taken. Mode 2 is suitable for proactive filtering and reactive filtering. Usually the source prefixes that are sure to be invalid will be put into the blocklist, which is proactive filtering. Reactive filtering rules are usually installed in DDoS elimination for dropping packets with specific source addresses.</t>
        <t>The prefix blocklist can be generated automatically, e.g., one of Intra-domain SAVNET architecture cases, blocking the incoming traffic with internal source prefixes. Or operators can configure the specific source prefixes to block from the interface. This is similar to ACL-based filtering, but more native SAV rule expression with better performance and scalability is needed.</t>
      </section>
      <section anchor="mode-3-prefix-based-interface-allowlist">
        <name>Mode 3: Prefix-based interface allowlist</name>
        <t>Mode 3 is a router-scale mode, i.e., it takes effect on all the SAV-enabled interfaces except those enabling Mode 1. The router enabling Mode 3 is maintaining an interface allowlist (i.e., a list of legitimate incoming interfaces) for each specific source prefixe (Notes: usually not include the default prefix).<br/>
A packet will also be considered valid, if 1) its source address is covered by a recorded source prefix and 2) the incoming interface is also included in the corresponding interface allowlist of this source prefix. Otherwise, If the source address can not be found, or the source address is covered by a recorded source prefix but the incoming interface is not included, the validation result will be "invalid".</t>
        <!-- Mode 3 focuses on validating/protecting the interested source prefixes. If some source prefixes are important but there is no condition to enable Mode 1, Mode 3 can be enabled to provide some extent of protection.  -->

<t>Operators can configure the allowed interface list for a specific source prefix, to prevent DDoS attack related to this source prefix. Or the allowed interface list for specific prefixes can be generated automatically, e.g., one capability defined by Inter-domain SAVNET architecture.</t>
      </section>
      <section anchor="validation-procedure">
        <name>Validation Procedure</name>
        <t>Mode 1 and Mode 2 are working on interface-level, while Mode 3 is for the router-level. Thus, there can be multiple modes configured on the same router. Mode 1 are most preferred if applicable (with best pretection effect) and mutual exclusive with the other two modes, which means while an interface enabled Mode 1, the traffic for this interface don't need go through Mode 2 or Mode 3 -- while an interface enabled Mode 2, the traffic still need go through Mode 3. <xref target="modes"/> shows a comparison of different validation modes for dealing with default prefix.</t>
        <figure anchor="modes">
          <name>A comparison of different validation modes</name>
          <artwork><![CDATA[
  +-----------------------------------------------------+
  + Mode | Scale     | Treatment of the default prefix  +
  +-----------------------------------------------------+
  + 1    | interface | invalid                          +
  + 2    | interface | valid                            +
  + 3    | router    | check its incoming interface     +
  +-----------------------------------------------------+
]]></artwork>
        </figure>
        <t>The validation procedure is shown in <xref target="SAV-procedure"/>. Suppose the router has learned the SAV rules by SAV mechanisms and implemented them in the data plane. When a packet arrives at the router, the router will take the source address and the incoming interface of the packet as the input and look up the SAV rules. The validity state that is either "valid" or "invalid" will be returned after the procedure.</t>
        <figure anchor="SAV-procedure">
          <name>Validation procedure</name>
          <artwork><![CDATA[
                        SAV-enabled router
             +------------------------------------+
             |                                    |
packet1 ---->Mode1------------> validity state1   |
             |                                    |
packet2 ---->Mode2-------                         |
             |          |                         |
             |          \/                        |
packet3 ---->|------->Mode3---> validity state3   |
             |                                    |
             +------------------------------------+
]]></artwork>
        </figure>
        <t>To achieve accurate and scalable source address validation, a dedicated SAV table for SAV rules is needed rather than using those derived from other functions, e.g., FIB or ACL.</t>
      </section>
    </section>
    <section anchor="sec-policy">
      <name>Traffic Handling Policies</name>
      <t>After doing validation, the router gets the validity state of the incoming packet. For the packet with invalid state, traffic handling policies should be taken on the packet. Simply forwarding or silently dropping may not well satisfy the requirements of operators in different scenarios. This section suggests to provide flexible traffic handling policies to validated packets just like FlowSpec (<xref target="RFC8955"/>, <xref target="RFC8956"/>).</t>
      <t>The followings are the traffic control policies that can be taken. One and only one of the policies will be chosen for an "invalid" validation result.</t>
      <ul spacing="normal">
        <li>
          <t>"Permit": Forward packets normally though the packets are considered invalid. This policy is useful when operators only want to monitor the status of source address spoofing in the network. The "Permit" policy can be taken together with the "Sample" policy.</t>
        </li>
        <li>
          <t>"Discard": Drop packets directly, which is the common choose of existing SAV mechanisms.</t>
        </li>
        <li>
          <t>"Rate limit": Enforce an upper bound of traffic rate (e.g., bps or pps) for mitigation of source address spoofing attacks. This policy is helpful while operators want do tentative filtering.</t>
        </li>
        <li>
          <t>"Traffic redirect": Redirect the packets to the specified points (e.g., scrubbing centers) in the network for attack elimination.</t>
        </li>
      </ul>
      <t>There are also traffic monitor policies that are optional. One of the useful traffic monitor policies is:</t>
      <ul spacing="normal">
        <li>
          <t>"Sample": Capture the packets with a configurable sampling rate and reports them to remote servers (e.g., security analysis center). The sampled packets can be used for threat awareness and further analysis <xref target="I-D.cheng-savnet-proactive-defense-network"/>. "Sample" can be taken together with any one of the above policies. Note that, existing techniques like NetStream or NetFlow can be used for "Sample".</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document focuses on the general SAV capabilities. The generation of SAV rules is not discussed. There may be some security considerations for SAV generation, but it is not in the scope of this document.</t>
      <t>The "Sample" policy pushes data to remote servers. This function can be achieved by existing techniques like NetStream or NetFlow. The "Sample" policy may induce same security considerations as these techniques, and the corresponding documents have discussed them.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC8955" target="https://www.rfc-editor.org/info/rfc8955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8955.xml">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8956" target="https://www.rfc-editor.org/info/rfc8956" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8956.xml">
          <front>
            <title>Dissemination of Flow Specification Rules for IPv6</title>
            <author fullname="C. Loibl" initials="C." role="editor" surname="Loibl"/>
            <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>"Dissemination of Flow Specification Rules" (RFC 8955) provides a Border Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.</t>
              <t>This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8956"/>
          <seriesInfo name="DOI" value="10.17487/RFC8956"/>
        </reference>
        <reference anchor="I-D.cheng-savnet-proactive-defense-network" target="https://datatracker.ietf.org/doc/html/draft-cheng-savnet-proactive-defense-network-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.cheng-savnet-proactive-defense-network.xml">
          <front>
            <title>Network Proactive Defense based on Source Address Validation</title>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Shengnan Yue" initials="" surname="Yue">
              <organization>China Mobile</organization>
            </author>
            <date day="18" month="October" year="2023"/>
            <abstract>
              <t>Source address validation (SAV) helps routers check the validity of packets. Networks can use the SAV capability to enhance threat awareness. This document proposes proactive defense network where routers can directly identify threats through SAV. The proactive threat awareness feature is helpful for satisfying the threat awareness requirement of ISPs.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cheng-savnet-proactive-defense-network-01"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-bar-sav" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-bar-sav-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-bar-sav.xml">
          <front>
            <title>Source Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-SAV)</title>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <author fullname="Igor Lubashev" initials="I." surname="Lubashev">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Doug Montgomery" initials="D." surname="Montgomery">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="12" month="September" year="2023"/>
            <abstract>
              <t>Designing an efficient source address validation (SAV) filter requires minimizing false positives (i.e., avoiding blocking legitimate traffic) while maintaining directionality (see RFC8704). This document advances the technology for SAV filter design through a method that makes use of BGP UPDATE messages, Autonomous System Provider Authorization (ASPA), and Route Origin Authorization (ROA). The proposed method's name is abbreviated as BAR-SAV. BAR-SAV can be used by network operators to derive more robust SAV filters and thus improve network resilience. This document updates RFC8704.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-bar-sav-02"/>
        </reference>
        <reference anchor="I-D.li-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-intra-domain-architecture-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Fang Gao" initials="F." surname="Gao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL rules that require manual efforts to accommodate to network dynamics, SAVNET routers learn the SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-05"/>
        </reference>
        <reference anchor="I-D.wu-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-wu-savnet-inter-domain-architecture-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.wu-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture, providing a comprehensive framework for guiding the design of inter- domain SAV mechanisms. The proposed architecture empowers ASes to establish SAV rules by sharing SAV-specific Information between themselves. During the incremental or partial deployment of SAV- specific Information, it can rely on general information, such as routing information from the RIB, to construct the SAV table when SAV-specific Information for an AS's prefixes is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. It also defines the architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-05"/>
        </reference>
      </references>
    </references>
    <?line 226?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
