<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-huang-savnet-sav-table-08" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="General SAV Capabilities">General Source Address Validation Capabilities</title>
    <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-08"/>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="W." surname="Cheng" fullname="Weiqiang Cheng">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>chengweiqiang@chinamobile.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Liu" fullname="Mingxing Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liumingxing7@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>
    <date year="2024" month="December" day="10"/>
    <area>Routing</area>
    <workgroup>savnet</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 80?>
<t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies.</t>
      <t>To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
    </abstract>
  </front>
  <middle>
    <?line 85?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source address validation (SAV) can detect and prevent source address spoofing on the SAV-enabled routers. When a packet arrives at an interface of the router, the source address of the packet will be validated. The packets with unwanted source addresses or arriving at unwanted interfaces, will be considered invalid and usually be conducted elimination actions on. Only validated packets will continue to be handled or forwarded.</t>
      <t>From the perspective of data plane validation, the SAV capabilities of existing mechanisms have two main limitations. One of them is the deployable scenario limitation. ACL rules can be configured for filtering unwanted source addresses at specific interfaces (<xref target="RFC3704"/>). However, ACL is not dedicatedly designed for source prefix filtering. There exist performance and scalability issues due to long-key based searching, and usually expert maintenance efforts are required. Strict uRPF and loose uRPF are two typical FIB-based SAV mechanisms (<xref target="RFC3704"/>) and are supported by most commercial routers/switches. FIB-based validation brings many benefits compared to ACL-based filtering but also induces some limitations. Strict uRPF is not applicable for asymmetric routing (<xref target="RFC8704"/>), which exists in various scenarios such as intra-domain multi-homing access, inter-domain interconnection, etc. Under asymmetric routing, a source prefix may have a different incoming interface from the next-hop interface of the matched entry, or the source prefix does not exist in the FIB at all. Loose mode can only block unannounced prefix, which results in massive false negatives. Overall, existing ACL-based or FIB-based SAVs can only be applied to specific scenarios and cannot be adaptive to various scenarios (e.g., symmetric vs asymmetric).</t>
      <t>The other limitation is inflexible traffic handling policy. The current common practice is just to silently drop the spoofed packets. We don't know who benefits from this and who is the source. Further more, the clues of attacks are ignored, which could be very helpful for dealing with DDoS attacks etc.</t>
      <t>The root cause of the above two limitations is that there is no tool specifically designed for source address filtering. That is, the capabilities of current tools are derived from other functions, e.g., FIB or ACL.</t>
      <t>This document describes the general SAV capabilities that the data plane of SAV-enabled devices should have. Two kinds of capabilities will be introduced: validation mode and traffic handling policy. Validation modes describe how to apply validation in different scenarios. Traffic handling policies are the policies applied on the validated packets. By implementing the general SAV capabilities, the above two limitations of existing mechanisms can be overcome.</t>
      <t>To achieve accurate and scalable source address validation, dedicated SAV rules are needed instead of just using those derived from other functions, e.g., FIB or ACL.</t>
      <t>Note that the general SAV capabilities described in this document are decoupled with vendor implementation. Conforming implementations of this specification may differ, but the SAV outcomes <bcp14>SHOULD</bcp14> be equivalent to the described SAV capabilities. And also how to generate SAV rules is not the focus of this document.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Validation mode: The mode that describes the typical applications of SAV in a specific kind of scenarios. Different modes take effect in different scales and treat the validated packets differently.</t>
        <t>SAV rule: The entry specifying the incoming interfaces of specific source addresses or source prefixes. The SAV rule expression might be slightly diffrent between validation modes.</t>
        <t>Traffic handling policy: The policy taken on the 'invalid' packets validated by SAV.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sav-mode">
      <name>Validation Modes</name>
      <t>This section describes four validation modes (Mode1 in <xref target="mode1"/>, Mode2 in <xref target="mode2"/>, Mode3 in <xref target="mode3"/>, Mode4 in <xref target="mode4"/>). These modes take effect in different scales and need corresponding SAV rules to validate spoofing packets. By choosing modes in different scenarios appropriately, the network can be protected as much as possible while not impacting the forwarding of legitimate packets.</t>
      <section anchor="mode1">
        <name>Mode 1: Interface-based prefix allowlist</name>
        <t>Mode 1 is an interface-scale mode, which means it takes effect on a specific interface. The interface enabling Mode 1 is maintaining an interface-based prefix allowlist--SAV rule 1. Only the source prefixes recorded in the list will be considered valid, otherwise invalid.</t>
        <t>Applying Mode 1 on an interface requires the complete knowledge of legitimate source prefixes connected to the interface. Mode 1 is suitable to the closed-connected interfaces such as those connecting to a subnet, a stub AS, or a customer cone. Such a mode can efficiently prevent the connected network from spoofing source prefixes of other networks.</t>
        <t>Strict uRPF based on FIB belongs to this mode. However, to overcome the limitation of asymmetric routing, additional native source prefix-based SAV rule expression is suggested. This is essential for new SAV mechanisms or architectures such as EFP-uRPF <xref target="RFC8704"/>, BAR-SAV <xref target="I-D.ietf-sidrops-bar-sav"/>, Intra-domain/Inter-domain SAVNET (<xref target="I-D.li-savnet-intra-domain-architecture"/>, <xref target="I-D.wu-savnet-inter-domain-architecture"/>), etc.</t>
        <t>Mode 1 is the most efficient one if applicable, it is mutual exclusive with other modes. However, in some cases, it may be difficult for an interface getting all the legitimate source prefixes. If any legitimate prefix is not included in the allowlist, packets with this source addresses arriving at the interface may be improperly blocked. For example, the interface with a default route or the interface connecting to the Internet through a provider AS can hardly promise to know all the legitimate source prefixes. We need more modes to cover those scenarios.</t>
      </section>
      <section anchor="mode2">
        <name>Mode 2: Interface-based prefix blocklist</name>
        <t>Mode 2 is also an interface-scale mode, which means it takes effect on a configured interface. An interface cannot enable Mode 1 and Mode 2 at the same time. The interface enabling Mode 2 is maintaining an interface-based prefix blocklist--SAV rule 2. The source prefixes recorded in the list will be considered invalid, otherwise valid.</t>
        <t>This mode does not require the complete knowledge of the illegitimate source prefixes on the interface, however some of them can be learned. Mode 2 is suitable for proactive filtering and reactive filtering. Usually the source prefixes that are sure to be invalid will be put into the blocklist, which is proactive filtering. Reactive filtering rules are usually installed in DDoS elimination for dropping packets with specific source addresses.</t>
        <t>The prefix blocklist can be generated automatically, e.g., one of Intra-domain SAVNET architecture cases, blocking the incoming traffic with internal source prefixes on WAN interface. Or operators can configure the specific source prefixes to block from the interface. This is similar to ACL-based filtering, but more native SAV rule expression with better performance and scalability.</t>
      </section>
      <section anchor="mode3">
        <name>Mode 3: Prefix-based interface allowlist</name>
        <t>Mode 3 is a router-scale mode, which means it can validate traffic arriving at the router from all directions. The router enabling Mode 3 will record the protected source prefixes and maintain an interface allowlist for each source prefix--SAV rule 3. If a source prefix has an interface allowlist, the packet with this source prefix is considered valid only when its incoming interface is in the interface allowlist. Otherwise, the packet is considered invalid.</t>
        <t>Applying Mode 3 in a router requires the complete knowledge of legitimate incoming interfaces for a specific source prefix. Mode 3 focuses on validating/protecting the interested source prefixes, it is applicable to the scenario where multiple interfaces are availalbe to provide potential connection to a(or a group) specific source prefix(es) , e.g. WAN-side open connected interfaces. Mode 3 provides a convenient and effective way to control which interface(s) is allowed to accept the specific source prefix, rather than to achieve similar effect by configuring Mode 2 on all other interfaces to block this source prefix.</t>
        <t>Operators can configure the interface allowlist for a specific source prefix, to prevent DDoS attack related to this source prefix. Or the interface list for specific prefixes can be generated automatically, e.g., one capability defined by Inter-domain SAVNET architectures.</t>
      </section>
      <section anchor="mode4">
        <name>Mode 4: Prefix-based interface blocklist</name>
        <t>Mode 4 is also a router-scale mode, which means it can validate traffic arriving at the router from all directions. The router enabling Mode 4 will maintain an interface blocklist for a specific source prefix--SAV rule 4. If a source prefix has an interface blocklist, the packet with this source prefix is considered invalid when its incoming interface is in the interface blocklist. Otherwise, the packet is considered valid.</t>
        <t>Applying Mode 4 in a router does not requires the complete knowledge of illegitimate incoming interfaces for a specific source prefix. Mode 4 focuses on prevent specific source prefix spoofing from specific directions, it is applicable to the scenario where multiple interfaces are facing specific source prefix spoofing attack, e.g. traffic coming in a network from open connected interfaces with its internal prefix as source address. Mode 4 provides a convenient and effective way to control which interface(s) should not accept the specific source prefix, rather than to achieve similar effect by configuring Mode 2 on each interface to block this source prefix.</t>
        <t>Operators can configure the interface blocklist for a specific source prefix, to prevent DDoS attack related to this source prefix. Or the interface list for specific prefixes can be generated automatically, e.g., one capability defined by Intra-domain SAVNET architectures.</t>
      </section>
      <section anchor="validation-procedure">
        <name>Validation Procedure</name>
        <t>Mode 1 and Mode 2 are working on interface-level, while Mode 3 and Mode 4 are for the router-level. Thus, there can be multiple modes configured on the same router. Mode 1 are most preferred if applicable (with best protection effect) and mutual exclusive with all other  modes, which means while an interface enabled Mode 1, the traffic for this interface don't need go through Mode 2, Mode 3 or Mode 4. While the validation result on interface-level for Mode 2 is valid, the  traffic still need go through Mode 3 and Mode 4 if applicable. <xref target="modes"/> shows a comparison of different validation modes for dealing with source address validation.</t>
        <figure anchor="modes">
          <name>A comparison of different validation modes</name>
          <artwork><![CDATA[
  +--------------------------------------------------------------------+
  + Mode | Scale     | SAV rule                   | validation result  +
  +--------------------------------------------------------------------+
  + 1    | interface | 1: interface-based         | invalid if         +
  +      |           |    source prefix allowlist | not matched        +
  + 2    | interface | 2: interface-based         | invalid if         +
  +      |           |    source prefix blocklist | matched            +
  + 3    | router    | 3: prefix-based            | invalid if         +
  +      |           |    interface allowlist     | not matched        +
  + 4    | router    | 4: prefix-based            | invalid if         +
  +      |           |    interface blocklist     | matched            +
  +--------------------------------------------------------------------+
]]></artwork>
        </figure>
        <t>The general validation procedure is listed as below. The final validity state, either "valid" or "invalid",  will be returned after the procedure.</t>
        <t>1) A packet arrives at the router, the source address and the incoming interface of the packet will be copied as the input for following validation process, and the initial validity state is set as 'valid'.</t>
        <t>2) Firstly, if Mode 1 is enabled on the incoming interface, the packet will be only validated based on SAV rule 1 (interface-base prefix allowlist), procedure returns with corresponding validity state. Otherwise--Mode 1 is not enabled on the incoming interface, perform following validation process.</t>
        <t>3) If Mode 2 is enabled on the incoming interface, the packet will be validated based on SAV rule 2 (interface-base prefix blocklist). If validation result is invalid, precedure returns.</t>
        <t>4) Similarly, if applicable, Mode 3 and Mode 4 validation procedure will be gone through based on SAV rule 3 (prefix-based interface allowlist) and SAV rule 4 (prefix-based interface blocklist) respectively, in which the precedure will return in case the validation result is invalid.</t>
        <t>Please note that the procedure listed above is theoretical. The real procedure in practice might be different due to deployment choices and vendor implementations. For example, the operator might choose either Mode 2 or Mode 4 to handle the spoofing threat based on self-owned prefixes from outside network, it is not always neccessary to deploy both of 2 modes; the vendor might implement router-level mode 3/4 based on interface-level mode 2 rules, to prefer the lookup performance over memory saving.</t>
      </section>
    </section>
    <section anchor="sec-policy">
      <name>Traffic Handling Policies</name>
      <t>After doing validation, the router gets the validity state of the incoming packet. For the packet with invalid state, traffic handling policies should be taken on the packet. Simply forwarding or silently dropping may not well satisfy the requirements of operators in different scenarios. This section suggests to provide flexible traffic handling policies to validated packets just like FlowSpec (<xref target="RFC8955"/>, <xref target="RFC8956"/>).</t>
      <t>The followings are the traffic control policies that can be taken. One and only one of the policies will be chosen for an "invalid" validation result.</t>
      <ul spacing="normal">
        <li>
          <t>"Permit": Forward packets normally though the packets are considered invalid. This policy is useful when operators only want to monitor the status of source address spoofing in the network. The "Permit" policy can be taken together with the "Sample" policy.</t>
        </li>
        <li>
          <t>"Discard": Drop packets directly, which is the common choose of existing SAV mechanisms.</t>
        </li>
        <li>
          <t>"Rate limit": Enforce an upper bound of traffic rate (e.g., bps or pps) for mitigation of source address spoofing attacks. This policy is helpful while operators want do tentative filtering.</t>
        </li>
        <li>
          <t>"Traffic redirect": Redirect the packets to the specified points (e.g., scrubbing centers) in the network for attack elimination.</t>
        </li>
      </ul>
      <t>There are also traffic monitor policies that are optional. One of the useful traffic monitor policies is:</t>
      <ul spacing="normal">
        <li>
          <t>"Sample": Capture the packets with a configurable sampling rate and reports them to remote servers (e.g., security analysis center). The sampled packets can be used for threat awareness and further analysis <xref target="I-D.cheng-savnet-proactive-defense-network"/>. "Sample" can be taken together with any one of the above policies. Note that, existing techniques like NetStream or NetFlow can be used for "Sample".</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document focuses on the general SAV capabilities. The generation of SAV rules is not discussed. There may be some security considerations for SAV generation, but it is not in the scope of this document.</t>
      <t>The "Sample" policy pushes data to remote servers. This function can be achieved by existing techniques like NetStream or NetFlow. The "Sample" policy may induce same security considerations as these techniques, and the corresponding documents have discussed them.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC8955" target="https://www.rfc-editor.org/info/rfc8955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8955.xml">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8956" target="https://www.rfc-editor.org/info/rfc8956" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8956.xml">
          <front>
            <title>Dissemination of Flow Specification Rules for IPv6</title>
            <author fullname="C. Loibl" initials="C." role="editor" surname="Loibl"/>
            <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>"Dissemination of Flow Specification Rules" (RFC 8955) provides a Border Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.</t>
              <t>This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8956"/>
          <seriesInfo name="DOI" value="10.17487/RFC8956"/>
        </reference>
        <reference anchor="I-D.cheng-savnet-proactive-defense-network" target="https://datatracker.ietf.org/doc/html/draft-cheng-savnet-proactive-defense-network-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.cheng-savnet-proactive-defense-network.xml">
          <front>
            <title>Network Proactive Defense based on Source Address Validation</title>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Shengnan Yue" initials="" surname="Yue">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="20" month="October" year="2024"/>
            <abstract>
              <t>Source address validation (SAV) helps routers check the validity of packets. Networks can use the SAV capability to enhance threat awareness. This document proposes proactive defense network where routers can directly identify threats through SAV. The proactive threat awareness feature is helpful for satisfying the threat awareness requirement of ISPs.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cheng-savnet-proactive-defense-network-03"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-bar-sav" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-bar-sav-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-bar-sav.xml">
          <front>
            <title>Source Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-SAV)</title>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <author fullname="Igor Lubashev" initials="I." surname="Lubashev">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Doug Montgomery" initials="D." surname="Montgomery">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>Designing an efficient source address validation (SAV) filter requires minimizing false positives (i.e., avoiding blocking legitimate traffic) while maintaining directionality (see RFC8704). This document advances the technology for SAV filter design through a method that makes use of BGP UPDATE messages, Autonomous System Provider Authorization (ASPA), and Route Origin Authorization (ROA). The proposed method's name is abbreviated as BAR-SAV. BAR-SAV can be used by network operators to derive more robust SAV filters and thus improve network resilience. This document updates RFC8704.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-bar-sav-05"/>
        </reference>
        <reference anchor="I-D.li-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-intra-domain-architecture-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Fang Gao" initials="F." surname="Gao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL rules that require manual efforts to accommodate to network dynamics, SAVNET routers learn the SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-07"/>
        </reference>
        <reference anchor="I-D.wu-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-wu-savnet-inter-domain-architecture-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.wu-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-12"/>
        </reference>
      </references>
    </references>
    <?line 225?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
