<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-huang-savnet-sav-table-07" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.0 -->
  <front>
    <title abbrev="General SAV Capabilities">General Source Address Validation Capabilities</title>
    <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-07"/>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="W." surname="Cheng" fullname="Weiqiang Cheng">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>chengweiqiang@chinamobile.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Liu" fullname="Mingxing Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liumingxing7@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>
    <date year="2024" month="August" day="26"/>
    <area>Routing</area>
    <workgroup>savnet</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 80?>
<t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies.</t>
      <t>To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
    </abstract>
  </front>
  <middle>
    <?line 85?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source address validation (SAV) can detect and prevent source address spoofing on the SAV-enabled routers. When a packet arrives at an interface of the router, the source address of the packet will be validated. The packets with unwanted source addresses or arriving at unwanted interfaces, will be considered invalid and usually be conducted elimination actions on. Only validated packets will continue to be handled or forwarded.</t>
      <t>From the perspective of data plane validation, the SAV capabilities of existing mechanisms have two main limitations. One of them is the deployable scenario limitation. ACL rules can be configured for filtering unwanted source addresses at specific interfaces (<xref target="RFC3704"/>). However, ACL is not dedicatedly designed for source prefix filtering. There exist performance and scalability issues due to long-key based searching, and usually expert maintenance efforts are required. Strict uRPF and loose uRPF are two typical FIB-based SAV mechanisms (<xref target="RFC3704"/>) and are supported by most commercial routers/switches. FIB-based validation brings many benefits compared to ACL-based filtering but also induces some limitations. Strict uRPF is not applicable for asymmetric routing (<xref target="RFC8704"/>), which exists in various scenarios such as intra-domain multi-homing access, inter-domain interconnection, etc. Under asymmetric routing, a source prefix may have a different incoming interface from the next-hop interface of the matched entry, or the source prefix does not exist in the FIB at all. Loose mode can only block unannounced prefix, which results in massive false negatives. Overall, existing ACL-based or FIB-based SAVs can only be applied to specific scenarios and cannot be adaptive to various scenarios (e.g., symmetric vs asymmetric).</t>
      <t>The other limitation is inflexible traffic handling policy. The current common practice is just to silently drop the spoofed packets. We don’t know who benefits from this and who is the source. Further more, the clues of attacks are ignored, which could be very helpful for dealing with DDoS attacks etc.</t>
      <t>The root cause of the above two limitations is that there is no tool specifically designed for source address filtering. That is, the capabilities of current tools are derived from other functions, e.g., FIB or ACL.</t>
      <t>This document describes the general SAV capabilities that the data plane of SAV-enabled devices should have. Two kinds of capabilities will be introduced: validation mode and traffic handling policy. Validation modes describe how to apply validation in different scenarios. Traffic handling policies are the policies applied on the validated packets. By implementing the general SAV capabilities, the above two limitations of existing mechanisms can be overcome.</t>
      <t>To achieve accurate and scalable source address validation, a dedicated SAV table for SAV rules is needed instead of using those derived from other functions, e.g., FIB or ACL.
Note that the general SAV capabilities described in this document is decoupled with real implementation. Conforming implementations of this specification may differ, but the SAV outcomes <bcp14>SHOULD</bcp14> be equivalent to the described SAV capabilities. And also how to generate SAV rules is not the focus of this document.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Validation mode: The mode that describes the typical applications of SAV in a specific kind of scenarios. Different modes take effect in different scales and treat the validated packets differently.</t>
        <t>SAV rule: The entry specifying the incoming interfaces of specific source addresses or source prefixes. The SAV rule expression might be slightly diffrent between validation modes.</t>
        <t>Traffic handling policy: The policy taken on the packets validated by SAV.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sav-mode">
      <name>Validation Modes</name>
      <t>This section describes three validation modes (Mode1 in <xref target="mode1"/>, Mode2 in <xref target="mode2"/>, Mode3 in <xref target="mode3"/>). These modes take effect in different scales and need corresponding SAV rules to validate spoofing packets. By choosing modes in different scenarios appropriately, the network can be protected as much as possible while not impacting the forwarding of legitimate packets.</t>
      <section anchor="mode1">
        <name>Mode 1: Interface-based prefix allowlist</name>
        <t>Mode 1 is an interface-scale mode, which means it takes effect on a specific interface. The interface enabling Mode 1 is maintaining an interface-based prefix allowlist--SAV rule 1. Only the source prefixes recorded in the list will be considered valid, otherwise invalid.</t>
        <t>Applying Mode 1 on an interface requires the complete knowledge of legitimate prefixes connected to the interface. Mode 1 is suitable to the closed-connected interfaces such as those connecting to a subnet, a stub AS, or a customer cone. Such a mode can efficiently prevent the connected network from spoofing source prefixes of other networks.</t>
        <t>Strict uRPF based on FIB belongs to this mode. However, to overcome the limitation of asymmetric routing, native source prefix-based SAV rule expression is suggested. This is essential for new SAV mechanisms or architectures such as EFP-uRPF <xref target="RFC8704"/>, BAR-SAV <xref target="I-D.ietf-sidrops-bar-sav"/>, Intra-domain/Inter-domain SAVNET (<xref target="I-D.li-savnet-intra-domain-architecture"/>, <xref target="I-D.wu-savnet-inter-domain-architecture"/>), etc.</t>
        <t>In some cases, it may be difficult for an interface getting all the legitimate source prefixes. If any legitimate prefix is not included in the allowlist, packets with this source addresses arriving at the interface may be improperly blocked. For example, the interface with a default route or the interface connecting to the Internet through a provider AS can hardly promise to know all the legitimate source prefixes.</t>
      </section>
      <section anchor="mode2">
        <name>Mode 2: Interface-based prefix blocklist</name>
        <t>Mode 2 is also an interface-scale mode, which means it takes effect on a configured interface. An interface cannot enable Mode 1 and Mode 2 at the same time. The interface enabling Mode 2 is maintaining an interface-based prefix blocklist--SAV rule 2. The source prefixes recorded in the list will be considered invalid, otherwise valid.</t>
        <t>This mode does not require the complete blocklist. If the packets with the specific source addresses need to be discarded, Mode 2 can be taken. Mode 2 is suitable for proactive filtering and reactive filtering. Usually the source prefixes that are sure to be invalid will be put into the blocklist, which is proactive filtering. Reactive filtering rules are usually installed in DDoS elimination for dropping packets with specific source addresses.</t>
        <t>The prefix blocklist can be generated automatically, e.g., one of Intra-domain SAVNET architecture cases, blocking the incoming traffic with internal source prefixes. Or operators can configure the specific source prefixes to block from the interface. This is similar to ACL-based filtering, but more native SAV rule expression with better performance and scalability.</t>
      </section>
      <section anchor="mode3">
        <name>Mode 3: Prefix-based interface list</name>
        <t>Mode 3 is a router-scale mode, which means it can validate traffic arriving at the router from all directions. The router enabling Mode 3 will record the protected source prefixes and maintain an interface list for each source prefix-SAV rule 3. The interface list of each source prefix may be an allowlist or a blocklist.</t>
        <t>If a source prefix has an interface allowlist, the packet with this source prefix is considered valid only when its incoming interface is in the interface allowlist. Otherwise, the packet is considered invalid.</t>
        <t>Conversely, If a source prefix has an interface blocklist, the packet with this source prefix is considered invalid only when its incoming interface is in the interface blocklist. Otherwise, the packet is considered valid. Either allowlist or blocklist here shares the same validating effects, the difference in reality mainly lies on how long the list would be. So generally we put these two in one mode, and thereafter illustrate the coresponding procedure only based on interface allowlist.</t>
        <!-- Mode 3 focuses on validating/protecting the interested source prefixes. If some source prefixes are important but there is no condition to enable Mode 1, Mode 3 can be enabled to provide some extent of protection.  -->

<t>Mode 3 focuses on validating/protecting the interested source prefixes. Mode 3 is applicable to the scenario where multiple interfaces are availalbe to provide potential connection to specific source prefix. If some source prefixes are important, Mode 3 can also provide stricter and more efficient protection than Mode 1 and Mode 2 for these source prefixes.</t>
        <t>Operators can configure the interface list for a specific source prefix, to prevent DDoS attack related to this source prefix. Or the interface list for specific prefixes can be generated automatically, e.g., one capability defined by Intra-domain and Inter-domain SAVNET architectures.</t>
      </section>
      <section anchor="validation-procedure">
        <name>Validation Procedure</name>
        <t>Mode 1 and Mode 2 are working on interface-level, while Mode 3 is for the router-level. Thus, there can be multiple modes configured on the same router. Mode 1 are most preferred if applicable (with best protection effect) and mutual exclusive with the other two modes, which means while an interface enabled Mode 1, the traffic for this interface don't need go through Mode 2 or Mode 3 -- while the validation result for Mode 2 is valid, the  traffic still need go through Mode 3 if applicable. <xref target="modes"/> shows a comparison of different validation modes for dealing with source address validation.</t>
        <figure anchor="modes">
          <name>A comparison of different validation modes</name>
          <artwork><![CDATA[
  +------------------------------------------------------------------------------------------+
  + Mode | Scale     | SAV rule                                   | validation result        +
  +------------------------------------------------------------------------------------------+
  + 1    | interface | 1: interface-based source prefix allowlist | invalid if not matched   +
  + 2    | interface | 2: interface-based source prefix blocklist | invalid if matched       +
  + 3    | router    | 3: prefix-based interface allowlist        | invalid if not matched   +
  +------------------------------------------------------------------------------------------+
]]></artwork>
        </figure>
        <t>The validation procedure is shown in <xref target="SAV-procedure"/>. Suppose the router has learned the SAV rules by SAV mechanisms and implemented them in the data plane. When a packet arrives at the router, the router will take the source address and the incoming interface of the packet as the input and look up the coresponding SAV rules. The final validity state that is either "valid" or "invalid" will be returned after the procedure.</t>
        <t>Firstly, if the Mode 1 is enabled on the incoming interface, the packet will be only validated based on SAV rule 1 (interface-base prefix allowlist) -- according the principle that Mode 1 is the first priority and mutual exclusive with the other two modes.</t>
        <t>And then, if the Mode 1 is not but Mode 2 is enabled on the incoming interface, the packet will be validated based on SAV rule 2 (interface-base prefix blocklist).</t>
        <t>Mode 3 validation procedure will be gone through based on SAV rule 3 (prefix-based interface allowlist) only if: 1) the Mode 1 is not enabled on the incoming interface; 2) Mode 2 is not enabled on the incoming interface, or Mode 2 is enabled but the validaty state is valid; 3) Router-level Mode 3 is enabled.</t>
        <figure anchor="SAV-procedure">
          <name>Validation procedure</name>
          <artwork><![CDATA[
                                  SAV-enabled router
         +----------------------------------------------------------------------------+
         |                                                                            |
packet-->|-->Mode 1?--Yes-->  validating    --> Validity State                        |
         |     |              on SAV rule 1                                           |
         |     |                                                                      |
         |     +--No--> Mode 2?--Yes-->   validating    --> Validity State            |
         |                 |             on SAV rule 2              |                 |
         |                 |                                     if Valid             |
         |                 |                                        |                 |
         |                 +--No-->Mode 3?<------------------------ +                 |
         |                           |                                                |
         |                           +--Yes-->    validating    --> Validity State    |
         |                                       on SAV rule 3                        |
         |                                                                            |
         +----------------------------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-policy">
      <name>Traffic Handling Policies</name>
      <t>After doing validation, the router gets the validity state of the incoming packet. For the packet with invalid state, traffic handling policies should be taken on the packet. Simply forwarding or silently dropping may not well satisfy the requirements of operators in different scenarios. This section suggests to provide flexible traffic handling policies to validated packets just like FlowSpec (<xref target="RFC8955"/>, <xref target="RFC8956"/>).</t>
      <t>The followings are the traffic control policies that can be taken. One and only one of the policies will be chosen for an "invalid" validation result.</t>
      <ul spacing="normal">
        <li>
          <t>"Permit": Forward packets normally though the packets are considered invalid. This policy is useful when operators only want to monitor the status of source address spoofing in the network. The "Permit" policy can be taken together with the "Sample" policy.</t>
        </li>
        <li>
          <t>"Discard": Drop packets directly, which is the common choose of existing SAV mechanisms.</t>
        </li>
        <li>
          <t>"Rate limit": Enforce an upper bound of traffic rate (e.g., bps or pps) for mitigation of source address spoofing attacks. This policy is helpful while operators want do tentative filtering.</t>
        </li>
        <li>
          <t>"Traffic redirect": Redirect the packets to the specified points (e.g., scrubbing centers) in the network for attack elimination.</t>
        </li>
      </ul>
      <t>There are also traffic monitor policies that are optional. One of the useful traffic monitor policies is:</t>
      <ul spacing="normal">
        <li>
          <t>"Sample": Capture the packets with a configurable sampling rate and reports them to remote servers (e.g., security analysis center). The sampled packets can be used for threat awareness and further analysis <xref target="I-D.cheng-savnet-proactive-defense-network"/>. "Sample" can be taken together with any one of the above policies. Note that, existing techniques like NetStream or NetFlow can be used for "Sample".</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document focuses on the general SAV capabilities. The generation of SAV rules is not discussed. There may be some security considerations for SAV generation, but it is not in the scope of this document.</t>
      <t>The "Sample" policy pushes data to remote servers. This function can be achieved by existing techniques like NetStream or NetFlow. The "Sample" policy may induce same security considerations as these techniques, and the corresponding documents have discussed them.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC8955" target="https://www.rfc-editor.org/info/rfc8955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8955.xml">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8956" target="https://www.rfc-editor.org/info/rfc8956" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8956.xml">
          <front>
            <title>Dissemination of Flow Specification Rules for IPv6</title>
            <author fullname="C. Loibl" initials="C." role="editor" surname="Loibl"/>
            <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>"Dissemination of Flow Specification Rules" (RFC 8955) provides a Border Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.</t>
              <t>This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8956"/>
          <seriesInfo name="DOI" value="10.17487/RFC8956"/>
        </reference>
        <reference anchor="I-D.cheng-savnet-proactive-defense-network" target="https://datatracker.ietf.org/doc/html/draft-cheng-savnet-proactive-defense-network-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.cheng-savnet-proactive-defense-network.xml">
          <front>
            <title>Network Proactive Defense based on Source Address Validation</title>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Shengnan Yue" initials="" surname="Yue">
              <organization>China Mobile</organization>
            </author>
            <date day="14" month="April" year="2024"/>
            <abstract>
              <t>Source address validation (SAV) helps routers check the validity of packets. Networks can use the SAV capability to enhance threat awareness. This document proposes proactive defense network where routers can directly identify threats through SAV. The proactive threat awareness feature is helpful for satisfying the threat awareness requirement of ISPs.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cheng-savnet-proactive-defense-network-02"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-bar-sav" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-bar-sav-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-bar-sav.xml">
          <front>
            <title>Source Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-SAV)</title>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <author fullname="Igor Lubashev" initials="I." surname="Lubashev">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Doug Montgomery" initials="D." surname="Montgomery">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>Designing an efficient source address validation (SAV) filter requires minimizing false positives (i.e., avoiding blocking legitimate traffic) while maintaining directionality (see RFC8704). This document advances the technology for SAV filter design through a method that makes use of BGP UPDATE messages, Autonomous System Provider Authorization (ASPA), and Route Origin Authorization (ROA). The proposed method's name is abbreviated as BAR-SAV. BAR-SAV can be used by network operators to derive more robust SAV filters and thus improve network resilience. This document updates RFC8704.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-bar-sav-03"/>
        </reference>
        <reference anchor="I-D.li-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-intra-domain-architecture-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Fang Gao" initials="F." surname="Gao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL rules that require manual efforts to accommodate to network dynamics, SAVNET routers learn the SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-07"/>
        </reference>
        <reference anchor="I-D.wu-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-wu-savnet-inter-domain-architecture-11" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.wu-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="6" month="August" year="2024"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-11"/>
        </reference>
      </references>
    </references>
    <?line 237?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
