<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-general-sav-capabilities-01" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="General SAV Capabilities">General Source Address Validation Capabilities</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-01"/>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="W." surname="Cheng" fullname="Weiqiang Cheng">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>chengweiqiang@chinamobile.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="June" day="25"/>
    <area>Routing</area>
    <workgroup>savnet</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 65?>
<t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies.</t>
      <t>To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
    </abstract>
  </front>
  <middle>
    <?line 70?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source address validation (SAV) can detect and prevent source address spoofing on the SAV-enabled routers. When a packet arrives at an interface of the router, the source address of the packet will be validated. Invalid packets - those with unauthorized source addresses or arriving on incorrect interfaces, are typically dropped. Only validated packets will be processed or forwarded.</t>
      <t>From the perspective of data plane validation, the SAV capabilities of existing mechanisms have two main limitations. One of them is the deployable scenario limitation. ACL rules can be configured for filtering unauthorized source addresses at specific interfaces <xref target="RFC3704"/>. However, ACL is not dedicatedly designed for source prefix filtering. There exist performance and scalability issues due to long-key based searching, and typically requires expert maintenance. Strict uRPF and loose uRPF are two typical FIB-based SAV mechanisms <xref target="RFC3704"/> and are supported by most commercial routers/switches. FIB-based validation brings many benefits compared to ACL-based filtering but also induces some limitations. Strict uRPF is not applicable for asymmetric routing <xref target="RFC8704"/>, which exists in various scenarios such as intra-domain multi-homing access, inter-domain interconnection, etc. Under asymmetric routing, a source prefix may have a different incoming interface from the next-hop interface of the matched entry, or the source prefix does not exist in the FIB at all. Loose mode can only block unannounced prefix, which results in massive false negatives. Overall, existing ACL-based or FIB-based SAVs can only be applied to specific scenarios and cannot be adaptive to various scenarios (e.g., symmetric vs asymmetric).</t>
      <t>The other limitation is inflexible traffic handling policy. The current common practice is just to silently drop the spoofed packets. We don't know who benefits from this and who is the source. Further more, the clues of attacks are ignored, which could be very helpful for dealing with DDoS attacks etc.</t>
      <t>The root cause of the above two limitations is that there is no tool specifically designed for source address filtering. That is, the capabilities of current tools are derived from other functions, e.g., FIB or ACL.</t>
      <t>This document describes the general SAV capabilities that the data plane of SAV-enabled devices should have. Two kinds of capabilities will be introduced: validation mode and traffic handling policy. Validation modes describe how to apply validation in different scenarios. Traffic handling policies are the policies applied on the non-validated packets. By implementing the general SAV capabilities, the above two limitations of existing mechanisms can be overcome.</t>
      <t>To achieve accurate and scalable source address validation, dedicated SAV rules are needed instead of just using those derived from other functions, e.g., FIB or ACL.</t>
      <t>Note that the general SAV capabilities described in this document are decoupled with vendor implementation. Conforming implementations of this specification may differ, but the SAV outcomes <bcp14>SHOULD</bcp14> be equivalent to the described SAV capabilities. And also how to generate SAV rules is not the focus of this document.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Validation mode: The mode that describes the typical SAV application for a specific scenario. Each validation mode has its own rule syntax and validation logic.</t>
        <t>SAV rule: The entry mapping the incoming interfaces with specific source addresses/prefixes. The SAV rule expressions and semantics might be different between validation modes.</t>
        <t>Traffic handling policy: The policy applied to the SAV-validated 'invalid' packets.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mode">
      <name>Validation Modes</name>
      <t>This section describes four validation modes (Mode1 in <xref target="mode1"/>, Mode2 in <xref target="mode2"/>, Mode3 in <xref target="mode3"/>, Mode4 in <xref target="mode4"/>). These modes take effect in different scales and need corresponding SAV rules to validate spoofing packets. By choosing modes in different scenarios appropriately, the network can be protected as much as possible while not impacting the forwarding of legitimate packets.</t>
      <section anchor="mode1">
        <name>Mode 1: Interface-based prefix allowlist</name>
        <t>Mode 1 is an interface-scale mode, which means it takes effect on a specific interface. The interface enabling Mode 1 is maintaining an interface-based prefix allowlist--SAV rule 1. Only the source prefixes recorded in the list will be considered valid, otherwise invalid.</t>
        <t>Applying Mode 1 on an interface requires the complete knowledge of legitimate source prefixes connected to the interface. Mode 1 is more suitable to the closed-connected interfaces such as those connecting to a subnet, a stub AS, or a customer cone. Such a mode can efficiently prevent the connected network from spoofing source prefixes of other networks.</t>
        <t>FIB-based strict uRPF belongs to this mode. However, to overcome the limitation of asymmetric routing, additional native source prefix-based SAV rule expression is suggested. This is essential for new SAV mechanisms or architectures such as EFP-uRPF <xref target="RFC8704"/>, BAR-SAV <xref target="I-D.ietf-sidrops-bar-sav"/>, Intra-domain/Inter-domain SAVNET architecture <xref target="I-D.ietf-savnet-intra-domain-architecture"/> <xref target="I-D.ietf-savnet-inter-domain-architecture"/>, etc.</t>
        <t>The scope of legitimate source prefixes for Mode 1 should ideally be as narrow and precise as possible. However, in practice due to scenario limitations, a broader scope may still be acceptable for Mode 1, as long as no legitimate prefix is omitted in the list. FIB-based loose uRPF is an extreme example of this.</t>
        <t>Mode 1 is the most efficient one if applicable. However, in some cases, it may be difficult for an interface getting all the legitimate source prefixes. If any legitimate prefix is not included in the allowlist, packets with this source addresses arriving at the interface will be improperly blocked. For example, the interface with a default route or the interface connecting to the Internet through a provider AS can hardly promise to know all the legitimate source prefixes. We need more modes to cover those scenarios.</t>
      </section>
      <section anchor="mode2">
        <name>Mode 2: Interface-based prefix blocklist</name>
        <t>Mode 2 is also an interface-scale mode, which means it takes effect on a specific interface. The interface enabling Mode 2 is maintaining an interface-based prefix blocklist--SAV rule 2. The source prefixes recorded in the list will be considered invalid, otherwise valid.</t>
        <t>This mode does not require the complete knowledge of the illegitimate source prefixes on the interface. Mode 2 is suitable for proactive and reactive filtering -- Invalid source prefixes are typically preemptively added to a blocklist, enabling proactive filtering; Reactive filtering is commonly deployed by the security systems to dynamically block spoofing traffic with specific source addresses.</t>
        <t>The prefix blocklist can be generated automatically, e.g., one of Intra-domain SAVNET architecture cases, blocking the incoming traffic with internal source prefixes on WAN interface. Or operators can configure the specific source prefixes to block from the interface, which is similar to ACL-based filtering, but more native SAV rule expression with better performance and scalability.</t>
      </section>
      <section anchor="mode3">
        <name>Mode 3: Prefix-based interface allowlist</name>
        <t>Mode 3 is a router-scale mode, which means it can validate traffic arriving at the router from all directions. The router enabling Mode 3 will record the protected source prefixes and maintain an interface allowlist for each source prefix--SAV rule 3. If a source prefix has an interface allowlist, the packet with this source prefix is considered valid only when its incoming interface is in the interface allowlist. Otherwise, the packet is considered invalid.</t>
        <t>Applying Mode 3 in a router requires the complete knowledge of legitimate incoming interfaces for a specific source prefix. Mode 3 focuses on validating/protecting the interested source prefixes, it is applicable to the scenario where multiple interfaces are availalbe to provide potential connection to a(or a group) specific source prefix(es) , e.g. remote AS source prefixes are connected in via the provider interfaces. Mode 3 provides a convenient and effective way to control which a group of interfaces are allowed to accept the specific source prefix, rather than to achieve similar effect by configuring Mode 2 on all other interfaces to block this source prefix.</t>
        <t>Operators can configure the interface allowlist for a specific source prefix, to prevent DDoS attack related to this source prefix. Or the interface list for specific prefixes can be generated automatically, e.g., one capability defined by Inter-domain SAVNET architectures.</t>
      </section>
      <section anchor="mode4">
        <name>Mode 4: Prefix-based interface blocklist</name>
        <t>Mode 4 is also a router-scale mode, which means it can validate traffic arriving at the router from all directions. The router enabling Mode 4 will maintain an interface blocklist for a specific source prefix--SAV rule 4. If a source prefix has an interface blocklist, the packet with this source prefix is considered invalid when its incoming interface is in the interface blocklist. Otherwise, the packet is considered valid.</t>
        <t>Applying Mode 4 in a router does not requires the complete knowledge of illegitimate incoming interfaces for a specific source prefix. Mode 4 focuses on preventing specific source prefix spoofing from specific directions, it is applicable to the scenario where multiple interfaces are facing specific source prefix spoofing attack, e.g. traffic coming in a network from open connected interfaces with its internal prefix as source address. Mode 4 provides a convenient and effective way to control a group of interfaces not to accept the specific source prefix, rather than to achieve similar effect by configuring Mode 2 on each interface to block this source prefix, or Mode 3 for the specific source prefix but with a very long interface allowlist.</t>
        <t>Operators can configure the interface blocklist for a specific source prefix, to prevent DDoS attack related to this source prefix. Or the interface list for specific prefixes can be generated automatically, e.g., one capability defined by Intra-domain SAVNET architectures.</t>
      </section>
    </section>
    <section anchor="sec-procedure">
      <name>Validation Procedure</name>
      <t>Mode 1 and Mode 2 are working on interface-level, they must not be enabled on same interface at same time. If they are enabled on same interface, Mode 2 should be ignored, or be merged into Mode 1 by removing the prefix listed in Mode 2 from the allowlist of Mode 1. Mode 3 and Mode 4 are working on router-level, they are also mutual exclusive with each othter, that is, they must not be enabled for a specific source prefix at same time. If so, Mode 4 should be ignored, or be merged into Mode 3 by removing the interface listed in Mode 4 from the allowlist of Mode 3. Further more, Mode 1 are most preferred mode, which means while an interface has enabled Mode 1, the traffic for this interface don't need go through all other modes (Mode 2, Mode 3 or Mode 4) , no matter whether they are configured. While the validation result on interface-level for Mode 2 is valid, the  traffic still need go through Mode 3 or Mode 4 if applicable. <xref target="modes"/> shows a comparison of different validation modes for dealing with source address validation.</t>
      <figure anchor="modes">
        <name>A comparison of different validation modes</name>
        <artwork><![CDATA[
  +--------------------------------------------------------------------+
  + Mode | Scale     | SAV rule                   | validation result  +
  +--------------------------------------------------------------------+
  + 1    | interface | 1: interface-based         | invalid if         +
  +      |           |    source prefix allowlist | not matched        +
  + 2    | interface | 2: interface-based         | invalid if         +
  +      |           |    source prefix blocklist | matched            +
  + 3    | router    | 3: prefix-based            | invalid if         +
  +      |           |    interface allowlist     | not matched        +
  + 4    | router    | 4: prefix-based            | invalid if         +
  +      |           |    interface blocklist     | matched            +
  +--------------------------------------------------------------------+
]]></artwork>
      </figure>
      <t>The general validation procedure is listed as below. The final validity state, either "valid" or "invalid",  will be returned after the procedure.</t>
      <t>1) A packet arrives at the router, the source address and the incoming interface of the packet will be copied as the input for following validation process, and the initial validity state is set as 'valid'.</t>
      <t>2) If Mode 1 is enabled on the incoming interface, the packet will be only validated based on SAV rule 1 (interface-base prefix allowlist), procedure returns with corresponding validity state. Otherwise--Mode 1 is not enabled on the incoming interface, perform following validation process.</t>
      <t>3) If Mode 2 is enabled on the incoming interface, the packet will be validated based on SAV rule 2 (interface-base prefix blocklist). If validation result is invalid, precedure returns. If the validation result is valid or Mode 2 is not enabled, go through router-level validation procedures as below.</t>
      <t>4) Similarly, if applicable, Mode 3 and Mode 4 validation procedure will be gone through based on SAV rule 3 (prefix-based interface allowlist) and SAV rule 4 (prefix-based interface blocklist) respectively, in which the precedure will return in case the validation result is invalid. For a specific source prefix, there should be only one router-level mode enabled.</t>
    </section>
    <section anchor="sec-policy">
      <name>Traffic Handling Policies</name>
      <t>After doing validation, the router gets the validity state for the incoming packet. For the packet with invalid state, traffic handling policies should be executed for the packet. Simply silently dropping may not well satisfy the requirements of operators in different scenarios. This section suggests to provide flexible traffic handling policies for validated packets just like FlowSpec <xref target="RFC8955"/> <xref target="RFC8956"/>.</t>
      <t>The followings are the traffic control policies that can be taken. One and only one of the policies will be chosen for an "invalid" validation result.</t>
      <ul spacing="normal">
        <li>
          <t>"Permit": Forward packets normally though the packets are considered invalid. This policy is useful when operators only want to monitor the status of source address spoofing in the network. Normally the "Permit" policy is configured together with the traffic monitor policies, e.g. sample.</t>
        </li>
        <li>
          <t>"Discard": Drop packets directly, which is the common choose of existing SAV mechanisms.</t>
        </li>
        <li>
          <t>"Rate limit": Enforce an upper bound of traffic rate (e.g., bps or pps) for mitigation of source address spoofing attacks. This policy is helpful while operators want do tentative filtering.</t>
        </li>
        <li>
          <t>"Traffic redirect": Redirect the packets to the specified server (e.g., scrubbing center) for attack elimination.</t>
        </li>
      </ul>
      <t>There are also traffic monitor policies, which are optional and can be taken together with any other policies (traffic control policies and traffix monitor policies). Some examples of the traffic monitor policies are:</t>
      <ul spacing="normal">
        <li>
          <t>"Count": Count the number of 'invalid' packets for each validation mode.</t>
        </li>
        <li>
          <t>"Sample": Capture the packets with a configurable sampling rate and reports them to remote servers (e.g., security analysis center) for further threat awareness and analysis.</t>
        </li>
      </ul>
      <t>The recommended default traffic handling policy combination is: "discard" for traffic control policy plus "count" for traffic monitor policy. The default combination could be modified per system level, per interface level, or configured based on rule level under different validation modes.</t>
    </section>
    <section anchor="sec-relationship">
      <name>Relationship with Traditional SAV Mechanisms</name>
      <t>The FIB-based SAV mechanisms (strict uPRF and loose uRPF, both belongs SAV Mode 1 -- interface based prefix allowlist) should be upgraded to the new capabilities defined in this document. By doing this, the asysmetic routing scenario limitation to strict uRPF can be overcome and new traffic handling policies can be supported, and meanwhile, the router system might not be suffering significant performance impact by doing validation based on the new SAV mechanism only, rather than on both of them.</t>
      <t>Specially, in the network operation scenario for SAV on an open-connected interface, operator may want combine the loose uRPF and SAV Mode 2 -- loose uRPF allows only announced prefixes as source coming, and additionally SAV mode 2 blocks specific source prefixes (e.g. inner prefixes). From data plane point view, there are 2 options to address it:</t>
      <t>1) Unified Mode 1. Maintain a prefix allowlist for the interface by deducting the source prefixes in the Mode 2 from the prefix allowlist (prefixes in FIB) in the loose uRPF.</t>
      <t>2) Separate validation. Go through traditional loose uRPF validation first, and then go throught the Mode 2 validation.</t>
      <t>These two options differ in aspects such as memory space organization and table lookup procedures. Option 1 is preferred if memory space in data plane is allowed.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document focuses on the general SAV capabilities, the generation of SAV rules is not included. There may be some security considerations for SAV generation, it is not in the scope of this document.</t>
      <t>The "Sample" policy requires a mechanism for sampling control, sampling data encapsulation and transportation etc. The security considerations about this should be described together with the dedicated mechanism document.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
    <section anchor="sec-acknownledgements">
      <name>Acknowledgements</name>
      <t>The authors appreciate the valuable comments from all members of the IETF SAVNET Working Group. We extend a special thanks to Aijun Wang for his guidance and suggestion. We extend a special thanks to Mingxing Liu and Changwang Lin for their feedback and contributions from vendor implemention point of view.</t>
    </section>
    <section anchor="sec-contributors">
      <name>Contributors</name>
      <t>-
  Mingxing Liu</t>
      <t>Huawei Technologies</t>
      <t>China</t>
      <t>Email: liumingxing7@huawei.com</t>
      <t>-
  Changwang Lin</t>
      <t>New H3C Technologies</t>
      <t>China</t>
      <t>email: linchangwang.04414@h3c.com</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC8955" target="https://www.rfc-editor.org/info/rfc8955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8955.xml">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8956" target="https://www.rfc-editor.org/info/rfc8956" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8956.xml">
          <front>
            <title>Dissemination of Flow Specification Rules for IPv6</title>
            <author fullname="C. Loibl" initials="C." role="editor" surname="Loibl"/>
            <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>"Dissemination of Flow Specification Rules" (RFC 8955) provides a Border Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.</t>
              <t>This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8956"/>
          <seriesInfo name="DOI" value="10.17487/RFC8956"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-bar-sav" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-bar-sav-06" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-bar-sav.xml">
          <front>
            <title>Source Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-SAV)</title>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <author fullname="Igor Lubashev" initials="I." surname="Lubashev">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Doug Montgomery" initials="D." surname="Montgomery">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="15" month="March" year="2025"/>
            <abstract>
              <t>Designing an efficient source address validation (SAV) filter requires minimizing false positives (i.e., avoiding blocking legitimate traffic) while maintaining directionality (see RFC8704). This document advances the technology for SAV filter design through a method that makes use of BGP UPDATE messages, Autonomous System Provider Authorization (ASPA), and Route Origin Authorization (ROA). The proposed method's name is abbreviated as BAR-SAV. BAR-SAV can be used by network operators to derive more robust SAV filters and thus improve network resilience. This document updates RFC8704.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-bar-sav-06"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-architecture-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="13" month="April" year="2025"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms [RFC3704] that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL-based ingress filtering [RFC2827] that entirely requires manual efforts to accommodate to network dynamics, SAVNET routers learn SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-architecture-02"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-architecture-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-architecture-01"/>
        </reference>
      </references>
    </references>
    <?line 246?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
