<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.31 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-00" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-00"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2023" month="May" day="04"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <t>This document provides the gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is important for defending against source address spoofing attacks and allowing accurate traceback. A multi-fence architecture called Source Address Validation Architecture (SAVA) <xref target="RFC5210"/> was proposed to validate source addresses at three levels: access network SAV, intra-domain SAV, and inter-domain SAV. When SAV is not fully enabled at the edge of the Internet, the multi-fence architecture can help enhance the validation across the whole Internet and thus reduce the opportunities of launching source address spoofing attacks.</t>
      <t>Particularly, access network SAV ensures that a host uses a valid address assigned to the host statically or dynamically. In this way, the host cannot use the source address of another host. There are many mechanisms for SAV in access networks. Static ACL rules can be manually configured for validation by specifying which source addre-sses are acceptable or unacceptable. Dynamic ACL is another efficient mechanism which is associated with authentication servers (e.g., RADIUS and DIAMETER). The servers receive access requests and then install or enable ACL rules on the device to permit particular users' packets. SAVI <xref target="RFC7039"/> represents a kind of mechanism enforcing that the legitimate IP address of a host matches the link-layer property of the host's network attachment. For example, SAVI solution for DHCP <xref target="RFC7513"/> creates a binding between a DHCPv4/DHCPv6-assigned IP address and a link-layer property (like MAC address or switch port) on a SAVI device. IP Source Guard (IPSG) <xref target="IPSG"/> combined with DHCP snooping is an implementation of SAVI solution for DHCP. Cable Source-Verify <xref target="cable-verify"/> also shares some features of SAVI and is used in cable modem networks. Cable modem termination system (CMTS) devices with Cable Source-Verify maintain the bindings of the CPE's IP address, the CPE's MAC address, and the corresponding cable modem identifier. When receiving packets, the device will check the validity of the packets according to the bindings.</t>
      <t>Given numerous access networks managed by different operators throughout the world, it is difficult to require all access networks to effectively deploy SAV. Therefore, intra-domain SAV and inter-domain SAV are needed to block spoofing traffic as close to the source as possible. Both intra-domain SAV and inter-domain SAV usually perform validation at the granularity of IP prefixes, which is coarser than the validation granularity of access network SAV, as an IP prefix covers a range of IP addresses.</t>
      <t>This document focuses on the analysis of intra-domain SAV. In contrast to inter-domain SAV, intra-domain SAV does not require collaboration between different ASes. The SAV rules can be generated by the AS itself. Consider an AS X which provides its own subnets with the connectivity to other ASes. The intra-domain SAV for AS X has two goals: i) blocking the illegitimate packets originated from the local subnets of AS X with spoofed source addresses; and ii) blocking the illegitimate packets coming from other ASes which spoof the source addresses of AS X.</t>
      <t><xref target="intra-domain"/> illustrates the function of intra-domain SAV with two cases. Case i shows that AS X forwards spoofed packets originated from its subnets to other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the spoofed packets from its own subnet can be locked by AS X itself (i.e., Goal i). Case ii shows that AS X receives the packets which spoof AS X's source addresses from other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the spoofed packets from AS Y can be blocked by AS X (i.e., Goal ii).</t>
      <figure anchor="intra-domain">
        <name>An example for illustrating intra-domain SAV</name>
        <artwork><![CDATA[
Case i: AS X forwards spoofed packets originated 
        from its subnets to other ASes (e.g., AS Y)
Goal i: If AS X deploys intra-domain SAV, 
        the spoofed packets can be blocked by AS X

  +------+  Spoofed packets  +------+
  | AS X |------------------>| AS Y |
  +------+                   +------+


Case ii: AS X receives packets spoofing 
         AS X's source addresses from other ASes (e.g., AS Y)
Goal ii: If AS X deploys intra-domain SAV,
         the spoofed packets can be blocked by AS X

  +------+  Spoofed packets  +------+
  | AS X |<------------------| AS Y |
  +------+                   +------+
]]></artwork>
      </figure>
      <t>There are many mechanisms for intra-domain SAV. This document provides the gap analysis of existing intra-domain SAV mechanisms. According to the gap analysis, the document concludes the main problems of existing mechanisms and describes the requirements for future intra-domain SAV mechanisms.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        <t>SAV Table: The table or data structure that implements the SAV rules and is used for source address validation in the data plane.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Existing Mechanisms</name>
      <t>Ingress filtering <xref target="RFC2827"/><xref target="RFC3704"/> is the current practice of intra-domain SAV. This section briefly introduces the existing intra-domain SAV mechanisms.</t>
      <ul spacing="normal">
        <li>ACL-based ingress filtering <xref target="RFC2827"/><xref target="RFC3704"/> is a typical mechanism for intra-domain SAV. ACL rules can be configured for blocking or permitting packets with specific source addresses. This mechanism can be applied at the downstream interfaces of edge routers connecting the subnets or at the downstream interfaces of aggregation routers <xref target="manrs-antispoofing"/>. The validation at downstream interfaces will prevent local subnets from spoofing source prefixes of other subnets. Besides, at the upstream interfaces of routers connecting other ASes, ACL can be enabled for blocking packets with disallowed source prefixes, such as the internal source prefixes owned by the subnets <xref target="nist-rec"/>. In any application scenario, ACL rules should be updated in time to be consistent with the latest filtering criteria.</li>
        <li>Strict uRPF <xref target="RFC3704"/> is another commonly used mechanism for SAV in intra-domain networks. Routers deploying strict uRPF accept a data packet only when i) the local FIB contains a prefix encompassing the packet's source address and ii) the corresponding outgoing interface for the prefix in the FIB matches the packet's incoming interface. Otherwise, the packet will be blocked. Strict uRPF is usually used at downstream interfaces of edge routers connecting local subnets.</li>
        <li>Loose uRPF <xref target="RFC3704"/> takes a looser validation mechanism than strict uRPF to avoid improper block. A packet will be accepted if the local FIB contains a prefix encompassing the packet's source address. The incoming interface of the packet is not checked. Upstream interfaces can enable loose uRPF for blocking non-global addresses <xref target="nist-rec"/>.</li>
        <li>Carrier Grade NAT has some operations on the source addresses of packets, but is not an anti-spoofing tool, as described in <xref target="manrs-antispoofing"/>. If the source address of a packet is in the INSIDE access list, the NAT rule can translate the source address to an address in the pool OUTSIDE. The NAT rule cannot judge whether the source address is spoofed or not. In addition, the packet with a spoofed source address will be forwarded directly if the spoofed source address is not included in the INSIDE access list. Therefore, Carrier Grade NAT cannot help block or traceback spoofed packets, and other SAV mechanisms are still needed.</li>
      </ul>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>Existing intra-domain SAV mechanisms either require high operational overhead or have limitations in accuracy. They may improperly block the traffic with legitimate source addresses (i.e., improper block) or improperly permit the traffic with spoofed source addresses (i.e., improper permit).</t>
      <section anchor="outbound-traffic-validation">
        <name>Outbound Traffic Validation</name>
        <t>Outbound traffic validation is implemented at downstream interfaces of routers to validate the packets from directly connected subnets. As described previously, ACL rules can be configured at downstream interfaces for ingress filtering. These rules need to be updated when prefixes or topologies of subnets change. If ACL rules are not updated in time, improper block or improper permit may occur. To ensure the accuracy of SAV in dynamic networks, high operational overhead will be induced to achieve timely updates for ACL configurations.</t>
        <t>Strict uRPF can also be used for outbound traffic validation, but there may be improper block problem in multi-homing scenario. <xref target="multi-home"/> shows such a case. In the figure, Subnet 1 owns prefix 10.0.0.0/15 and is attached to two edge routers, i.e., Router 1 and Router 2. For the load balance purpose of inbound traffic, Subnet 1 expects the inbound traffic destined for 10.1.0.0/16 to come only from Router 1 and the inbound traffic destined for 10.0.0.0/16 to come only from Router 2. To this end, Router 1 only learns the route to sub prefix 10.1.0.0/16 from Subnet 1, while Router 2 only learns the route to the other sub prefix 10.0.0.0/16 from Subnet 1. Then, Router 1 and Router 2 advertise the learned sub prefix to the other routers in the AS through intra-domain routing protocols such as OSPF or IS-IS. Finally, Router 1 learns the route to 10.0.0.0/16 from Router 3, and Router 2 learns the route to 10.1.0.0/16 from Router 3. The FIBs on Router 1 and Router 2 are shown in the figure. Although Subnet 1 does not expect inbound traffic destined for 10.0.0.0/16 to come from Router 1, it may send outbound traffic with source addresses of prefix 10.0.0.0/16 to Router 1 for load balance of outbound traffic. As a result, there is asymmetric routing between Subnet 1 and Router 1. Similarly, Subnet 1 may also send outbound traffic with source addresses of prefix 10.1.0.0/16 to Router 2, resulting in asymmetric routing between Subnet1 and Router 2.</t>
        <figure anchor="multi-home">
          <name>Asymmetric routing in the multi-homed subnet scenario</name>
          <artwork><![CDATA[
+-------------------------------------------------------------+
|                                                      AS     |
|                        +----------+                         |
|                        | Router 3 |                         |
| FIB on Router 1        +----------+  FIB on Router 2        |
| Dest         Next_hop   /\      \    Dest         Next_hop  |
| 10.1.0.0/16  Subnet 1   /        \   10.0.0.0/16  Subnet 1  |
| 10.0.0.0/16  Router 3  /         \/  10.1.0.0/16  Router 3  |
|                +----------+     +----------+                |
|                | Router 1 |     | Router 2 |                |
|                +-----+#+--+     +-+#+------+                |
|                        /\         /                         |
|   Outbound traffic with \        / Inbound traffic with     |
|   source IP addresses    \      /  destination IP addresses |
|   of 10.0.0.0/16          \    \/  of 10.0.0.0/16           |
|                           Subnet 1                          |
|                        (10.0.0.0/15 )                       |
|                                                             |
+-------------------------------------------------------------+
]]></artwork>
        </figure>
        <t>Strict uRPF takes the entries in FIB for SAV. It can improperly block the packets with legitimate source prefixes when asymmetric routing exists. In the figure, if Router 1 applies strict uRPF at interface '#', the SAV rule is that Router 1 only accepts packets with source addresses of 10.1.0.0/16 from Subnet 1. Therefore, when Subnet 1 sends packets with source addresses of 10.0.0.0/16 to Router 1, strict uRPF at Router 1 will improperly block these legitimate packets. Similarly, when Router 2 with strict uRPF deployed receives packets with source addresses of prefix 10.1.0.0/16 from Subnet 1, it will also improperly block these legitimate packets. Therefore, strict uRPF may cause improper block problem in the case of asymmetric routing.</t>
      </section>
      <section anchor="inbound-traffic-validation">
        <name>Inbound Traffic Validation</name>
        <t>Inbound traffic validation is performed at upstream interfaces of border routers to validate the packets from other ASes. <xref target="inbound-SAV"/> shows an example of inbound SAV. In the figure, Router 3 and Router 4 deploy SAV mechanisms at interface '#' for validating external packets. Hence, there are multiple points for inbound traffic validation for the AS.</t>
        <t>ACL-based ingress filtering is usually used for validating inbound traffic. By configuring specified ACL rules, inbound packets with disallowed source prefixes (e.g., non-global addresses or the internal source prefixes) can be blocked. As mentioned above, ACL-based ingress filtering requires timely updates when the routing status changes dynamically. When the ACL rules are not updated in time, there may be improper block or improper permit problems. The operational overhead of maintaining updated ACL rules will be extremely high when there are multiple inbound validation points as shown in <xref target="inbound-SAV"/>.</t>
        <t>Loose uRPF is another inbound SAV mechanism and is more adaptive than ACL-based rules. But it sacrifices the directionality of SAV and has limited blocking capability, because it allows packets with source addresses that exist in the FIB table at all router interfaces.</t>
        <figure anchor="inbound-SAV">
          <name>A scenario of inbound SAV</name>
          <artwork><![CDATA[
                + Packets with              + Packets with
                | spoofed p1/p2             | spoofed p1/p2
+--------------|---------------------------|----------+
|  AS          \/                          \/         |
|          +--+#+-----+               +---+#+----+    |
|          | Router 3 +-------------->| Router 4 |    |
|          +----------+               +----------+    |
|             /     \                      |          |
|            /       \                     |          |
|          \/         \/                   \/         |
|  +----------+     +----------+      +----------+    |
|  | Router 1 |     | Router 2 |      | Router 5 |    |
|  +----------+     +----------+      +----------+    |
|        \              /                   |         |
|         \            /                    |         |
|          \          /                     \/        |
|           Subnet1(p1)                 Subnet2(p2)   |
+-----------------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>Accurate validation and low operational overhead are two important design goals of intra-domain SAV mechanisms. As analyzed above, asymmetric routing and dynamic networks are two challenging scenarios for the two goals. In these scenarios, existing SAV mechanisms have problems of inaccurate validation or high operational overhead.</t>
      <t>ACL-based SAV relies on manual configurations and thus requires high operational overhead in dynamic networks. Operators have to manually update the ACL-based filtering rules in time when the prefix or topology changes. Otherwise, improper block or improper permit problems may appear.</t>
      <t>Strict uRPF-based SAV can automatically update SAV rules, but may improperly block legitimate traffic under asymmetric routing. The root cause is that strict uRPF leverages the local FIB table to determine the incoming interface for source addresses, which may not match the real data-plane forwarding path from the source, due to the existence of asymmetric routes. Hence, it may mistakenly consider a valid incoming interface as invalid, resulting in improper block problem; or it may consider an invalid incoming interface as valid, resulting in improper permit problem.</t>
      <t>Loose uRPF is also an automated SAV mechanism but its SAV rules are overly loose. Most spoofed packets will be improperly permitted by adopting loose uRPF.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section lists the requirements which can be a guidance for narrowing the gaps of existing intra-domain SAV mechanisms. The requirements can be fully or partially fulfilled when designing new intra-domain SAV mechanisms.</t>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be able to automatically adapt to network dynamics such as routing change or prefix change, instead of relying on manual update.</t>
      </section>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanism needs to improve the validation accuracy upon existing intra-domain SAV mechanisms. Improper block must be avoided to guarantee that legitimate traffic will not be blocked. Improper permit must be reduced as much as possible. To avoid improper block in asymmetric routing scenario, it is better that the real forwarding path in the data plane can be learned and incoming interface for a certain prefix can be set accordingly. In case when the real forwarding path in the data plane cannot be learned, the learned paths must cover the real forwarding paths so as to avoid improper block. Further, by finding the least number of paths while covering all the real forwarding paths, improper permit can be minimized.</t>
      </section>
      <section anchor="working-in-incrementalpartial-deployment">
        <name>Working in Incremental/Partial Deployment</name>
        <t>The new intra-domain SAV mechanism <bcp14>SHOULD NOT</bcp14> assume pervasive adoption. Some routers may not be able to be easily upgraded for supporting the new SAV mechanism due to their limitations of capabilities, versions, or vendors. The mechanism <bcp14>SHOULD</bcp14> be able to provide protection even when it is partially deployed. The effectiveness of protection for the new intra-domain SAV mechanism under partial deployment <bcp14>SHOULD</bcp14> be no worse than existing mechanisms.</t>
      </section>
    </section>
    <section anchor="sec-scope">
      <name>Intra-domain SAV Scope</name>
      <t>The new intra-domain SAV mechanism should work in the same scenarios as existing intra-domain SAV mechanisms. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>Native IP forwarding: including both forwarding based on global routing table and CE site forwarding of VPN.</li>
        <li>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): focusing on the validation of the outer layer IP address.</li>
        <li>Validating both IPv4 and IPv6 addresses.</li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>Non-IP packets: including MPLS label-based forwarding and other non-IP-based forwarding.</li>
      </ul>
      <t>In addition, the new intra-domain SAV mechanism should avoid data-plane packet modification. Existing architectures or protocols or mechanisms can be used in the new SAV mechanism to achieve better SAV function.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The new intra-domain SAV mechanism <bcp14>MUST NOT</bcp14> introduce additional security vulnerabilities or confusion to the existing intra-domain architectures or control or management plane protocols. Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanism should ensure integrity and authentication of protocol packets that deliver the required SAV information.</t>
      <t>The new intra-domain SAV mechanism does not provide protection against compromised or misconfigured routers that poison existing control plane protocols. Such routers can not only disrupt the SAV function, but also affect the entire routing domain.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Barry Greene, Fang Gao, Anthony Somerset, Kotikalapudi Sriram, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, Libin Liu, John O'Brien, Roland Dobbins, Xiangqing Chang, etc.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="nist-rec" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation&quot;">
          <front>
            <title>Resilient Interdomain Traffic Exchange - BGP Security and DDos Mitigation</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network.  As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment.  There are cases when this may create problems, e.g., with multihoming.  This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular.  This memo updates RFC 2827.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses.  In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network.  This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation.  This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author initials="J." surname="Wu" fullname="J. Wu">
              <organization/>
            </author>
            <author initials="J." surname="Bi" fullname="J. Bi">
              <organization/>
            </author>
            <author initials="M." surname="Bagnulo" fullname="M. Bagnulo">
              <organization/>
            </author>
            <author initials="F." surname="Baker" fullname="F. Baker">
              <organization/>
            </author>
            <author initials="C." surname="Vogt" fullname="C. Vogt" role="editor">
              <organization/>
            </author>
            <date year="2013" month="October"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation.  This document is a framework document that describes and motivates the design of the SAVI methods.  Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device.  The bindings set up by this procedure are used to filter packets with forged source IP addresses.  This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
