<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.31 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-01" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-01"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2023" month="May" day="05"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <t>This document provides the gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is important for defending against source address spoofing attacks and allowing accurate traceback. A multi-fence architecture called Source Address Validation Architecture (SAVA) <xref target="RFC5210"/> was proposed to validate source addresses at three levels: access network SAV, intra-domain SAV, and inter-domain SAV. When SAV is not fully enabled at the edge of the Internet, the multi-fence architecture can help enhance the validation across the whole Internet and thus reduce the opportunities of launching source address spoofing attacks.</t>
      <t>Particularly, access network SAV ensures that a host uses a valid address assigned to the host statically or dynamically. In this way, the host cannot use the source address of another host. There are many mechanisms for SAV in access networks. Static ACL rules can be manually configured for validation by specifying which source addre-sses are acceptable or unacceptable. Dynamic ACL is another efficient mechanism which is associated with authentication servers (e.g., RADIUS and DIAMETER). The servers receive access requests and then install or enable ACL rules on the device to permit particular users' packets. SAVI <xref target="RFC7039"/> represents a kind of mechanism enforcing that the legitimate IP address of a host matches the link-layer property of the host's network attachment. For example, SAVI solution for DHCP <xref target="RFC7513"/> creates a binding between a DHCPv4/DHCPv6-assigned IP address and a link-layer property (like MAC address or switch port) on a SAVI device. IP Source Guard (IPSG) <xref target="IPSG"/> combined with DHCP snooping is an implementation of SAVI solution for DHCP. Cable Source-Verify <xref target="cable-verify"/> also shares some features of SAVI and is used in cable modem networks. Cable modem termination system (CMTS) devices with Cable Source-Verify maintain the bindings of the CPE's IP address, the CPE's MAC address, and the corresponding cable modem identifier. When receiving packets, the device will check the validity of the packets according to the bindings.</t>
      <t>Given numerous access networks managed by different operators throughout the world, it is difficult to require all access networks to effectively deploy SAV. Therefore, intra-domain SAV and inter-domain SAV are needed to block spoofing traffic as close to the source as possible. Both intra-domain SAV and inter-domain SAV usually perform validation at the granularity of IP prefixes, which is coarser than the validation granularity of access network SAV, as an IP prefix covers a range of IP addresses.</t>
      <t>This document focuses on the analysis of intra-domain SAV. In contrast to inter-domain SAV, intra-domain SAV does not require collaboration between different ASes. The SAV rules can be generated by the AS itself. Consider an AS X which provides its own subnets with the connectivity to other ASes. The intra-domain SAV for AS X has two goals: i) blocking the illegitimate packets originated from the local subnets of AS X with spoofed source addresses; and ii) blocking the illegitimate packets coming from other ASes which spoof the source addresses of AS X.</t>
      <t><xref target="intra-domain"/> illustrates the function of intra-domain SAV with two cases. Case i shows that AS X forwards spoofed packets originated from its subnets to other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the spoofed packets from its own subnet can be locked by AS X itself (i.e., Goal i). Case ii shows that AS X receives the packets which spoof AS X's source addresses from other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the spoofed packets from AS Y can be blocked by AS X (i.e., Goal ii).</t>
      <figure anchor="intra-domain">
        <name>An example for illustrating intra-domain SAV</name>
        <artwork><![CDATA[
Case i: AS X forwards spoofed packets originated 
        from its subnets to other ASes (e.g., AS Y)
Goal i: If AS X deploys intra-domain SAV, 
        the spoofed packets can be blocked by AS X

  +------+  Spoofed packets  +------+
  | AS X |------------------>| AS Y |
  +------+                   +------+


Case ii: AS X receives packets spoofing 
         AS X's source addresses from other ASes (e.g., AS Y)
Goal ii: If AS X deploys intra-domain SAV,
         the spoofed packets can be blocked by AS X

  +------+  Spoofed packets  +------+
  | AS X |<------------------| AS Y |
  +------+                   +------+
]]></artwork>
      </figure>
      <t>There are many mechanisms for intra-domain SAV. This document provides the gap analysis of existing intra-domain SAV mechanisms. According to the gap analysis, the document concludes the main problems of existing mechanisms and describes the requirements for future intra-domain SAV mechanisms.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        <t>SAV Table: The table or data structure that implements the SAV rules and is used for source address validation in the data plane.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Existing Mechanisms</name>
      <t>Ingress filtering <xref target="RFC2827"/><xref target="RFC3704"/> is the current practice of intra-domain SAV. This section briefly introduces the existing intra-domain SAV mechanisms.</t>
      <ul spacing="normal">
        <li>ACL-based ingress filtering <xref target="RFC2827"/><xref target="RFC3704"/> is a typical mechanism for intra-domain SAV. ACL rules can be configured for blocking or permitting packets with specific source addresses. This mechanism can be applied at the downstream interfaces of edge routers connecting the subnets or at the downstream interfaces of aggregation routers <xref target="manrs-antispoofing"/>. The validation at downstream interfaces will prevent local subnets from spoofing source prefixes of other subnets. Besides, at the upstream interfaces of routers connecting other ASes, ACL can be enabled for blocking packets with disallowed source prefixes, such as the internal source prefixes owned by the subnets <xref target="nist-rec"/>. In any application scenario, ACL rules should be updated in time to be consistent with the latest filtering criteria.</li>
        <li>Strict uRPF <xref target="RFC3704"/> is another commonly used mechanism for SAV in intra-domain networks. Routers deploying strict uRPF accept a data packet only when i) the local FIB contains a prefix encompassing the packet's source address and ii) the corresponding outgoing interface for the prefix in the FIB matches the packet's incoming interface. Otherwise, the packet will be blocked. Strict uRPF is usually used at downstream interfaces of edge routers connecting local subnets.</li>
        <li>Loose uRPF <xref target="RFC3704"/> takes a looser validation mechanism than strict uRPF to avoid improper block. A packet will be accepted if the local FIB contains a prefix encompassing the packet's source address. The incoming interface of the packet is not checked. Upstream interfaces can enable loose uRPF for blocking non-global addresses <xref target="nist-rec"/>.</li>
        <li>Carrier Grade NAT has some operations on the source addresses of packets, but is not an anti-spoofing tool, as described in <xref target="manrs-antispoofing"/>. If the source address of a packet is in the INSIDE access list, the NAT rule can translate the source address to an address in the pool OUTSIDE. The NAT rule cannot judge whether the source address is spoofed or not. In addition, the packet with a spoofed source address will be forwarded directly if the spoofed source address is not included in the INSIDE access list. Therefore, Carrier Grade NAT cannot help block or traceback spoofed packets, and other SAV mechanisms are still needed.</li>
      </ul>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>Existing intra-domain SAV mechanisms either require high operational overhead or have limitations in accuracy. They may improperly block the traffic with legitimate source addresses (i.e., improper block) or improperly permit the traffic with spoofed source addresses (i.e., improper permit).</t>
      <section anchor="outbound-traffic-validation">
        <name>Outbound Traffic Validation</name>
        <t>Outbound traffic validation is implemented at downstream interfaces of routers to validate the packets from directly connected subnets. As described previously, ACL rules can be configured at downstream interfaces for ingress filtering. These rules need to be updated when prefixes or topologies of subnets change. If ACL rules are not updated in time, improper block or improper permit may occur. To ensure the accuracy of SAV in dynamic networks, high operational overhead will be induced to achieve timely updates for ACL configurations.</t>
        <t>Strict uRPF can also be used for outbound traffic validation, but there may be improper block problem in multi-homing scenario. <xref target="multi-home"/> shows such a case. In the figure, Subnet 1 owns prefix 10.0.0.0/15 and is attached to two edge routers, i.e., Router 1 and Router 2. For the load balance purpose of inbound traffic, Subnet 1 expects the inbound traffic destined for 10.1.0.0/16 to come only from Router 1 and the inbound traffic destined for 10.0.0.0/16 to come only from Router 2. To this end, Router 1 only learns the route to sub prefix 10.1.0.0/16 from Subnet 1, while Router 2 only learns the route to the other sub prefix 10.0.0.0/16 from Subnet 1. Then, Router 1 and Router 2 advertise the learned sub prefix to the other routers in the AS through intra-domain routing protocols such as OSPF or IS-IS. Finally, Router 1 learns the route to 10.0.0.0/16 from Router 3, and Router 2 learns the route to 10.1.0.0/16 from Router 3. The FIBs on Router 1 and Router 2 are shown in the figure. Although Subnet 1 does not expect inbound traffic destined for 10.0.0.0/16 to come from Router 1, it may send outbound traffic with source addresses of prefix 10.0.0.0/16 to Router 1 for load balance of outbound traffic. As a result, there is asymmetric routing between Subnet 1 and Router 1. Similarly, Subnet 1 may also send outbound traffic with source addresses of prefix 10.1.0.0/16 to Router 2, resulting in asymmetric routing between Subnet1 and Router 2.</t>
        <figure anchor="multi-home">
          <name>Asymmetric routing in the multi-homed subnet scenario</name>
          <artwork><![CDATA[
+-------------------------------------------------------------+
|                                                      AS     |
|                        +----------+                         |
|                        | Router 3 |                         |
| FIB on Router 1        +----------+  FIB on Router 2        |
| Dest         Next_hop   /\      \    Dest         Next_hop  |
| 10.1.0.0/16  Subnet 1   /        \   10.0.0.0/16  Subnet 1  |
| 10.0.0.0/16  Router 3  /         \/  10.1.0.0/16  Router 3  |
|                +----------+     +----------+                |
|                | Router 1 |     | Router 2 |                |
|                +-----+#+--+     +-+#+------+                |
|                        /\         /                         |
|   Outbound traffic with \        / Inbound traffic with     |
|   source IP addresses    \      /  destination IP addresses |
|   of 10.0.0.0/16          \    \/  of 10.0.0.0/16           |
|                           Subnet 1                          |
|                        (10.0.0.0/15 )                       |
|                                                             |
+-------------------------------------------------------------+
]]></artwork>
        </figure>
        <t>Strict uRPF takes the entries in FIB for SAV. It can improperly block the packets with legitimate source prefixes when asymmetric routing exists. In the figure, if Router 1 applies strict uRPF at interface '#', the SAV rule is that Router 1 only accepts packets with source addresses of 10.1.0.0/16 from Subnet 1. Therefore, when Subnet 1 sends packets with source addresses of 10.0.0.0/16 to Router 1, strict uRPF at Router 1 will improperly block these legitimate packets. Similarly, when Router 2 with strict uRPF deployed receives packets with source addresses of prefix 10.1.0.0/16 from Subnet 1, it will also improperly block these legitimate packets. Therefore, strict uRPF may cause improper block problem in the case of asymmetric routing.</t>
      </section>
      <section anchor="inbound-traffic-validation">
        <name>Inbound Traffic Validation</name>
        <t>Inbound traffic validation is performed at upstream interfaces of border routers to validate the packets from other ASes. <xref target="inbound-SAV"/> shows an example of inbound SAV. In the figure, Router 3 and Router 4 deploy SAV mechanisms at interface '#' for validating external packets. Hence, there are multiple points for inbound traffic validation for the AS.</t>
        <t>ACL-based ingress filtering is usually used for validating inbound traffic. By configuring specified ACL rules, inbound packets with disallowed source prefixes (e.g., non-global addresses or the internal source prefixes) can be blocked. As mentioned above, ACL-based ingress filtering requires timely updates when the routing status changes dynamically. When the ACL rules are not updated in time, there may be improper block or improper permit problems. The operational overhead of maintaining updated ACL rules will be extremely high when there are multiple inbound validation points as shown in <xref target="inbound-SAV"/>.</t>
        <t>Loose uRPF is another inbound SAV mechanism and is more adaptive than ACL-based rules. But it sacrifices the directionality of SAV and has limited blocking capability, because it allows packets with source addresses that exist in the FIB table at all router interfaces.</t>
        <figure anchor="inbound-SAV">
          <name>A scenario of inbound SAV</name>
          <artwork><![CDATA[
                + Packets with              + Packets with
                | spoofed p1/p2             | spoofed p1/p2
+--------------|---------------------------|----------+
|  AS          \/                          \/         |
|          +--+#+-----+               +---+#+----+    |
|          | Router 3 +-------------->| Router 4 |    |
|          +----------+               +----------+    |
|             /     \                      |          |
|            /       \                     |          |
|          \/         \/                   \/         |
|  +----------+     +----------+      +----------+    |
|  | Router 1 |     | Router 2 |      | Router 5 |    |
|  +----------+     +----------+      +----------+    |
|        \              /                   |         |
|         \            /                    |         |
|          \          /                     \/        |
|           Subnet1(p1)                 Subnet2(p2)   |
+-----------------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>Accurate validation and low operational overhead are two important design goals of intra-domain SAV mechanisms. As analyzed above, asymmetric routing and dynamic networks are two challenging scenarios for the two goals. In these scenarios, existing SAV mechanisms have problems of inaccurate validation or high operational overhead.</t>
      <t>ACL-based SAV relies on manual configurations and thus requires high operational overhead in dynamic networks. Operators have to manually update the ACL-based filtering rules in time when the prefix or topology changes. Otherwise, improper block or improper permit problems may appear.</t>
      <t>Strict uRPF-based SAV can automatically update SAV rules, but may improperly block legitimate traffic under asymmetric routing. The root cause is that strict uRPF leverages the local FIB table to determine the incoming interface for source addresses, which may not match the real data-plane forwarding path from the source, due to the existence of asymmetric routes. Hence, it may mistakenly consider a valid incoming interface as invalid, resulting in improper block problem; or it may consider an invalid incoming interface as valid, resulting in improper permit problem.</t>
      <t>Loose uRPF is also an automated SAV mechanism but its SAV rules are overly loose. Most spoofed packets will be improperly permitted by adopting loose uRPF.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section lists the requirements which can be a guidance for narrowing the gaps of existing intra-domain SAV mechanisms. The requirements can be fully or partially fulfilled when designing new intra-domain SAV mechanisms.</t>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanisms <bcp14>MUST</bcp14> be able to automatically adapt to network dynamics such as routing change or prefix change, instead of purely relying on manual update.</t>
      </section>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanisms needs to improve the validation accuracy upon existing intra-domain SAV mechanisms. In a static network, improper block <bcp14>MUST</bcp14> be avoided to guarantee that legitimate traffic will not be blocked. Improper permit <bcp14>SHOULD</bcp14> be reduced as much as possible so that the malicious packets with forged source addresses can be efficiently filtered. When there are network changes, the new mechanisms <bcp14>MUST</bcp14> update SAV rules efficiently for keeping the high accuracy of validaiton.</t>
      </section>
      <section anchor="working-in-incrementalpartial-deployment">
        <name>Working in Incremental/Partial Deployment</name>
        <t>The new intra-domain SAV mechanisms <bcp14>SHOULD NOT</bcp14> assume pervasive adoption. Some routers may not be able to be easily upgraded for supporting the new SAV mechanism due to their limitations of capabilities, versions, or vendors. The mechanisms <bcp14>SHOULD</bcp14> be able to provide protection even when it is partially deployed. The effectiveness of protection for the new intra-domain SAV mechanisms under partial deployment <bcp14>SHOULD</bcp14> be no worse than existing mechanisms.</t>
      </section>
    </section>
    <section anchor="sec-scope">
      <name>Intra-domain SAV Scope</name>
      <t>The new intra-domain SAV mechanisms work in the same scenarios as existing intra-domain SAV mechanisms. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>Native IP forwarding: including both forwarding based on global routing table and CE site forwarding of VPN.</li>
        <li>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): focusing on the validation of the outer layer IP address.</li>
        <li>Validating both IPv4 and IPv6 addresses.</li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>Non-IP packets: including MPLS label-based forwarding and other non-IP-based forwarding.</li>
      </ul>
      <t>In addition, the new intra-domain SAV mechanisms <bcp14>SHOULD</bcp14> avoid data-plane packet modification. Existing architectures or protocols or mechanisms can be used in the new SAV mechanisms to achieve better SAV function.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The new intra-domain SAV mechanisms <bcp14>MUST NOT</bcp14> introduce additional security vulnerabilities or confusion to the existing intra-domain architectures or control or management plane protocols. Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanisms <bcp14>SHOULD</bcp14> ensure integrity and authentication of protocol packets that deliver the required SAV information.</t>
      <t>The new intra-domain SAV mechanisms do not provide protection against compromised or misconfigured routers that poison existing control plane protocols. Such routers can not only disrupt the SAV function, but also affect the entire routing domain.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Barry Greene, Fang Gao, Kotikalapudi Sriram, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, Libin Liu, John O'Brien, Roland Dobbins, Xiangqing Chang, etc.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="nist-rec" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation&quot;">
          <front>
            <title>Resilient Interdomain Traffic Exchange - BGP Security and DDos Mitigation</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network.  As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment.  There are cases when this may create problems, e.g., with multihoming.  This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular.  This memo updates RFC 2827.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses.  In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network.  This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation.  This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author initials="J." surname="Wu" fullname="J. Wu">
              <organization/>
            </author>
            <author initials="J." surname="Bi" fullname="J. Bi">
              <organization/>
            </author>
            <author initials="M." surname="Bagnulo" fullname="M. Bagnulo">
              <organization/>
            </author>
            <author initials="F." surname="Baker" fullname="F. Baker">
              <organization/>
            </author>
            <author initials="C." surname="Vogt" fullname="C. Vogt" role="editor">
              <organization/>
            </author>
            <date year="2013" month="October"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation.  This document is a framework document that describes and motivates the design of the SAVI methods.  Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device.  The bindings set up by this procedure are used to filter packets with forged source IP addresses.  This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
