<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-general-sav-capabilities-00" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="General SAV Capabilities">General Source Address Validation Capabilities</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-00"/>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="W." surname="Cheng" fullname="Weiqiang Cheng">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>chengweiqiang@chinamobile.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="March" day="16"/>
    <area>Routing</area>
    <workgroup>savnet</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 65?>
<t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies.</t>
      <t>To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
    </abstract>
  </front>
  <middle>
    <?line 70?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source address validation (SAV) can detect and prevent source address spoofing on the SAV-enabled routers. When a packet arrives at an interface of the router, the source address of the packet will be validated. The packets with unwanted source addresses or arriving at unwanted interfaces, will be considered invalid and usually be conducted elimination actions on. Only validated packets will continue to be handled or forwarded.</t>
      <t>From the perspective of data plane validation, the SAV capabilities of existing mechanisms have two main limitations. One of them is the deployable scenario limitation. ACL rules can be configured for filtering unwanted source addresses at specific interfaces (<xref target="RFC3704"/>). However, ACL is not dedicatedly designed for source prefix filtering. There exist performance and scalability issues due to long-key based searching, and usually expert maintenance efforts are required. Strict uRPF and loose uRPF are two typical FIB-based SAV mechanisms (<xref target="RFC3704"/>) and are supported by most commercial routers/switches. FIB-based validation brings many benefits compared to ACL-based filtering but also induces some limitations. Strict uRPF is not applicable for asymmetric routing (<xref target="RFC8704"/>), which exists in various scenarios such as intra-domain multi-homing access, inter-domain interconnection, etc. Under asymmetric routing, a source prefix may have a different incoming interface from the next-hop interface of the matched entry, or the source prefix does not exist in the FIB at all. Loose mode can only block unannounced prefix, which results in massive false negatives. Overall, existing ACL-based or FIB-based SAVs can only be applied to specific scenarios and cannot be adaptive to various scenarios (e.g., symmetric vs asymmetric).</t>
      <t>The other limitation is inflexible traffic handling policy. The current common practice is just to silently drop the spoofed packets. We don't know who benefits from this and who is the source. Further more, the clues of attacks are ignored, which could be very helpful for dealing with DDoS attacks etc.</t>
      <t>The root cause of the above two limitations is that there is no tool specifically designed for source address filtering. That is, the capabilities of current tools are derived from other functions, e.g., FIB or ACL.</t>
      <t>This document describes the general SAV capabilities that the data plane of SAV-enabled devices should have. Two kinds of capabilities will be introduced: validation mode and traffic handling policy. Validation modes describe how to apply validation in different scenarios. Traffic handling policies are the policies applied on the validated packets. By implementing the general SAV capabilities, the above two limitations of existing mechanisms can be overcome.</t>
      <t>To achieve accurate and scalable source address validation, dedicated SAV rules are needed instead of just using those derived from other functions, e.g., FIB or ACL.</t>
      <t>Note that the general SAV capabilities described in this document are decoupled with vendor implementation. Conforming implementations of this specification may differ, but the SAV outcomes <bcp14>SHOULD</bcp14> be equivalent to the described SAV capabilities. And also how to generate SAV rules is not the focus of this document.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Validation mode: The mode that describes the typical applications of SAV in a specific kind of scenarios. Different modes take effect in different scales and treat the validated packets differently.</t>
        <t>SAV rule: The entry specifying the incoming interfaces of specific source addresses or source prefixes. The SAV rule expression might be slightly diffrent between validation modes.</t>
        <t>Traffic handling policy: The policy taken on the 'invalid' packets validated by SAV.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sav-mode">
      <name>Validation Modes</name>
      <t>This section describes four validation modes (Mode1 in <xref target="mode1"/>, Mode2 in <xref target="mode2"/>, Mode3 in <xref target="mode3"/>, Mode4 in <xref target="mode4"/>). These modes take effect in different scales and need corresponding SAV rules to validate spoofing packets. By choosing modes in different scenarios appropriately, the network can be protected as much as possible while not impacting the forwarding of legitimate packets.</t>
      <section anchor="mode1">
        <name>Mode 1: Interface-based prefix allowlist</name>
        <t>Mode 1 is an interface-scale mode, which means it takes effect on a specific interface. The interface enabling Mode 1 is maintaining an interface-based prefix allowlist--SAV rule 1. Only the source prefixes recorded in the list will be considered valid, otherwise invalid.</t>
        <t>Applying Mode 1 on an interface requires the complete knowledge of legitimate source prefixes connected to the interface. Mode 1 is suitable to the closed-connected interfaces such as those connecting to a subnet, a stub AS, or a customer cone. Such a mode can efficiently prevent the connected network from spoofing source prefixes of other networks.</t>
        <t>Strict uRPF based on FIB belongs to this mode. However, to overcome the limitation of asymmetric routing, additional native source prefix-based SAV rule expression is suggested. This is essential for new SAV mechanisms or architectures such as EFP-uRPF <xref target="RFC8704"/>, BAR-SAV <xref target="I-D.ietf-sidrops-bar-sav"/>, Intra-domain/Inter-domain SAVNET (<xref target="I-D.ietf-savnet-intra-domain-architecture"/>, <xref target="I-D.ietf-savnet-inter-domain-architecture"/>), etc.</t>
        <t>Mode 1 is the most efficient one if applicable, it is mutual exclusive with other modes. However, in some cases, it may be difficult for an interface getting all the legitimate source prefixes. If any legitimate prefix is not included in the allowlist, packets with this source addresses arriving at the interface may be improperly blocked. For example, the interface with a default route or the interface connecting to the Internet through a provider AS can hardly promise to know all the legitimate source prefixes. We need more modes to cover those scenarios.</t>
      </section>
      <section anchor="mode2">
        <name>Mode 2: Interface-based prefix blocklist</name>
        <t>Mode 2 is also an interface-scale mode, which means it takes effect on a configured interface. An interface cannot enable Mode 1 and Mode 2 at the same time. The interface enabling Mode 2 is maintaining an interface-based prefix blocklist--SAV rule 2. The source prefixes recorded in the list will be considered invalid, otherwise valid.</t>
        <t>This mode does not require the complete knowledge of the illegitimate source prefixes on the interface, however some of them can be learned. Mode 2 is suitable for proactive filtering and reactive filtering. Usually the source prefixes that are sure to be invalid will be put into the blocklist, which is proactive filtering. Reactive filtering rules are usually installed in DDoS elimination for dropping packets with specific source addresses.</t>
        <t>The prefix blocklist can be generated automatically, e.g., one of Intra-domain SAVNET architecture cases, blocking the incoming traffic with internal source prefixes on WAN interface. Or operators can configure the specific source prefixes to block from the interface. This is similar to ACL-based filtering, but more native SAV rule expression with better performance and scalability.</t>
      </section>
      <section anchor="mode3">
        <name>Mode 3: Prefix-based interface allowlist</name>
        <t>Mode 3 is a router-scale mode, which means it can validate traffic arriving at the router from all directions. The router enabling Mode 3 will record the protected source prefixes and maintain an interface allowlist for each source prefix--SAV rule 3. If a source prefix has an interface allowlist, the packet with this source prefix is considered valid only when its incoming interface is in the interface allowlist. Otherwise, the packet is considered invalid.</t>
        <t>Applying Mode 3 in a router requires the complete knowledge of legitimate incoming interfaces for a specific source prefix. Mode 3 focuses on validating/protecting the interested source prefixes, it is applicable to the scenario where multiple interfaces are availalbe to provide potential connection to a(or a group) specific source prefix(es) , e.g. WAN-side open connected interfaces. Mode 3 provides a convenient and effective way to control which interface(s) is allowed to accept the specific source prefix, rather than to achieve similar effect by configuring Mode 2 on all other interfaces to block this source prefix.</t>
        <t>Operators can configure the interface allowlist for a specific source prefix, to prevent DDoS attack related to this source prefix. Or the interface list for specific prefixes can be generated automatically, e.g., one capability defined by Inter-domain SAVNET architectures.</t>
      </section>
      <section anchor="mode4">
        <name>Mode 4: Prefix-based interface blocklist</name>
        <t>Mode 4 is also a router-scale mode, which means it can validate traffic arriving at the router from all directions. The router enabling Mode 4 will maintain an interface blocklist for a specific source prefix--SAV rule 4. If a source prefix has an interface blocklist, the packet with this source prefix is considered invalid when its incoming interface is in the interface blocklist. Otherwise, the packet is considered valid.</t>
        <t>Applying Mode 4 in a router does not requires the complete knowledge of illegitimate incoming interfaces for a specific source prefix. Mode 4 focuses on prevent specific source prefix spoofing from specific directions, it is applicable to the scenario where multiple interfaces are facing specific source prefix spoofing attack, e.g. traffic coming in a network from open connected interfaces with its internal prefix as source address. Mode 4 provides a convenient and effective way to control which interface(s) should not accept the specific source prefix, rather than to achieve similar effect by configuring Mode 2 on each interface to block this source prefix, or Mode 4 for the specific source prefix but with a very long interface allowlist.</t>
        <t>Operators can configure the interface blocklist for a specific source prefix, to prevent DDoS attack related to this source prefix. Or the interface list for specific prefixes can be generated automatically, e.g., one capability defined by Intra-domain SAVNET architectures.</t>
      </section>
      <section anchor="validation-procedure">
        <name>Validation Procedure</name>
        <t>Mode 1 and Mode 2 are working on interface-level, they should not be enabled on same interface at same time. If they are enabled on same interface, Mode 2 must be ignored. Mode 3 and Mode 4 are working on router-level, they are also mutual exclusive with each othter, that is, they should not be enabled for a specific source prefix at same time. If so, Mode 4 must be ignored. Fruther more, Mode 1 are most preferred mode, which means while an interface has enabled Mode 1, the traffic for this interface don't need go through all other modes (Mode 2, Mode 3 or Mode 4) no matter whether they are configured. While the validation result on interface-level for Mode 2 is valid, the  traffic still need go through Mode 3 or Mode 4 if applicable. <xref target="modes"/> shows a comparison of different validation modes for dealing with source address validation.</t>
        <figure anchor="modes">
          <name>A comparison of different validation modes</name>
          <artwork><![CDATA[
  +--------------------------------------------------------------------+
  + Mode | Scale     | SAV rule                   | validation result  +
  +--------------------------------------------------------------------+
  + 1    | interface | 1: interface-based         | invalid if         +
  +      |           |    source prefix allowlist | not matched        +
  + 2    | interface | 2: interface-based         | invalid if         +
  +      |           |    source prefix blocklist | matched            +
  + 3    | router    | 3: prefix-based            | invalid if         +
  +      |           |    interface allowlist     | not matched        +
  + 4    | router    | 4: prefix-based            | invalid if         +
  +      |           |    interface blocklist     | matched            +
  +--------------------------------------------------------------------+
]]></artwork>
        </figure>
        <t>The general validation procedure is listed as below. The final validity state, either "valid" or "invalid",  will be returned after the procedure.</t>
        <t>1) A packet arrives at the router, the source address and the incoming interface of the packet will be copied as the input for following validation process, and the initial validity state is set as 'valid'.</t>
        <t>2) If Mode 1 is enabled on the incoming interface, the packet will be only validated based on SAV rule 1 (interface-base prefix allowlist), procedure returns with corresponding validity state. Otherwise--Mode 1 is not enabled on the incoming interface, perform following validation process.</t>
        <t>3) If Mode 2 is enabled on the incoming interface, the packet will be validated based on SAV rule 2 (interface-base prefix blocklist). If validation result is invalid, precedure returns. If the validation result is valid or Mode 2 is not enabled, go through router-level validation procedures as below.</t>
        <t>4) Similarly, if applicable, Mode 3 and Mode 4 validation procedure will be gone through based on SAV rule 3 (prefix-based interface allowlist) and SAV rule 4 (prefix-based interface blocklist) respectively, in which the precedure will return in case the validation result is invalid. For a specific source prefix, there should be only one router-level mode enabled.</t>
      </section>
    </section>
    <section anchor="sec-policy">
      <name>Traffic Handling Policies</name>
      <t>After doing validation, the router gets the validity state of the incoming packet. For the packet with invalid state, traffic handling policies should be taken on the packet. Simply forwarding or silently dropping may not well satisfy the requirements of operators in different scenarios. This section suggests to provide flexible traffic handling policies to validated packets just like FlowSpec (<xref target="RFC8955"/>, <xref target="RFC8956"/>).</t>
      <t>The followings are the traffic control policies that can be taken. One and only one of the policies will be chosen for an "invalid" validation result.</t>
      <ul spacing="normal">
        <li>
          <t>"Permit": Forward packets normally though the packets are considered invalid. This policy is useful when operators only want to monitor the status of source address spoofing in the network. The "Permit" policy can be taken together with the "Sample" policy.</t>
        </li>
        <li>
          <t>"Discard": Drop packets directly, which is the common choose of existing SAV mechanisms.</t>
        </li>
        <li>
          <t>"Rate limit": Enforce an upper bound of traffic rate (e.g., bps or pps) for mitigation of source address spoofing attacks. This policy is helpful while operators want do tentative filtering.</t>
        </li>
        <li>
          <t>"Traffic redirect": Redirect the packets to the specified points (e.g., scrubbing centers) in the network for attack elimination.</t>
        </li>
      </ul>
      <t>There are also traffic monitor policies that are optional. One of the useful traffic monitor policies is:</t>
      <ul spacing="normal">
        <li>
          <t>"Sample": Capture the packets with a configurable sampling rate and reports them to remote servers (e.g., security analysis center). The sampled packets can be used for threat awareness and further analysis. "Sample" can be taken together with any one of the above policies. Note that, existing techniques like NetStream or NetFlow can be used for "Sample".</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document focuses on the general SAV capabilities. The generation of SAV rules is not discussed. There may be some security considerations for SAV generation, but it is not in the scope of this document.</t>
      <t>The "Sample" policy pushes data to remote servers. This function can be achieved by existing techniques like NetStream or NetFlow. The "Sample" policy may induce same security considerations as these techniques, and the corresponding documents have discussed them.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors appreciate the valuable comments from all members of the IETF SAVNET Working Group. We extend a special thanks to Aijun Wang for his guidance and suggestion. We extend a special thanks to Mingxing Liu and Changwang Lin for their feedback and contributions from vendor implemention point of view.</t>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>-
  Mingxing Liu
  Huawei Technologies 
  China</t>
      <t>Email: liumingxing7@huawei.com</t>
      <t>-
  Changwang Lin
  New H3C Technologies
  China</t>
      <t>email: linchangwang.04414@h3c.com</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC8955" target="https://www.rfc-editor.org/info/rfc8955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8955.xml">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8956" target="https://www.rfc-editor.org/info/rfc8956" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8956.xml">
          <front>
            <title>Dissemination of Flow Specification Rules for IPv6</title>
            <author fullname="C. Loibl" initials="C." role="editor" surname="Loibl"/>
            <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>"Dissemination of Flow Specification Rules" (RFC 8955) provides a Border Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.</t>
              <t>This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8956"/>
          <seriesInfo name="DOI" value="10.17487/RFC8956"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-bar-sav" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-bar-sav-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-bar-sav.xml">
          <front>
            <title>Source Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-SAV)</title>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <author fullname="Igor Lubashev" initials="I." surname="Lubashev">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Doug Montgomery" initials="D." surname="Montgomery">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>Designing an efficient source address validation (SAV) filter requires minimizing false positives (i.e., avoiding blocking legitimate traffic) while maintaining directionality (see RFC8704). This document advances the technology for SAV filter design through a method that makes use of BGP UPDATE messages, Autonomous System Provider Authorization (ASPA), and Route Origin Authorization (ROA). The proposed method's name is abbreviated as BAR-SAV. BAR-SAV can be used by network operators to derive more robust SAV filters and thus improve network resilience. This document updates RFC8704.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-bar-sav-05"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-architecture-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="14" month="October" year="2024"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms [RFC3704] that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL-based ingress filtering [RFC2827] that entirely requires manual efforts to accommodate to network dynamics, SAVNET routers learn SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-architecture-01"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/api/v1/doc/document/draft-ietf-savnet-inter-domain-architecture/" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li"/>
            <author fullname="Li Chen"/>
            <author fullname="Nan Geng"/>
            <author fullname="Libin Liu"/>
            <author fullname="Lancheng Qin"/>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for
   performing AS-level SAV and provides a comprehensive framework for
   guiding the design of inter-domain SAV mechanisms.  The proposed
   architecture empowers ASes to generate SAV rules by sharing SAV-
   specific information between themselves, which can be used to
   generate more accurate and trustworthy SAV rules in a timely manner
   compared to the general information.  During the incremental or
   partial deployment of SAV-specific information, it can utilize
   general information to generate SAV rules, if an AS's SAV-specific
   information is unavailable.  Rather than delving into protocol
   extensions or implementations, this document primarily concentrates
   on proposing SAV-specific and general information and guiding how to
   utilize them to generate SAV rules.  To this end, it also defines
   some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-architecture-01"/>
        </reference>
      </references>
    </references>
    <?line 227?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
