<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-02" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.0 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-02"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2023" month="August" day="17"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 89?>

<t>This document provides the gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 93?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is important for defending against source address spoofing attacks and allowing accurate traceback. A multi-fence architecture called Source Address Validation Architecture (SAVA) <xref target="RFC5210"/> was proposed to validate source addresses at three levels: access network SAV, intra-domain SAV, and inter-domain SAV. When SAV is not fully enabled at the edge of the Internet, the multi-fence architecture can help enhance the validation across the whole Internet and thus reduce the opportunities of launching source address spoofing attacks.</t>
      <t>Particularly, access network SAV ensures that a host uses a valid address assigned to the host statically or dynamically. In this way, the host cannot use the source address of another host. There are many mechanisms for SAV in access networks. Static ACL rules can be manually configured for validation by specifying which source addre-sses are acceptable or unacceptable. Dynamic ACL is another efficient mechanism which is associated with authentication servers (e.g., RADIUS and DIAMETER). The servers receive access requests and then install or enable ACL rules on the device to permit particular users' packets. SAVI <xref target="RFC7039"/> represents a kind of mechanism enforcing that the legitimate IP address of a host matches the link-layer property of the host's network attachment. For example, SAVI solution for DHCP <xref target="RFC7513"/> creates a binding between a DHCPv4/DHCPv6-assigned IP address and a link-layer property (like MAC address or switch port) on a SAVI device. IP Source Guard (IPSG) <xref target="IPSG"/> combined with DHCP snooping is an implementation of SAVI solution for DHCP. Cable Source-Verify <xref target="cable-verify"/> also shares some features of SAVI and is used in cable modem networks. Cable modem termination system (CMTS) devices with Cable Source-Verify maintain the bindings of the CPE's IP address, the CPE's MAC address, and the corresponding cable modem identifier. When receiving packets, the device will check the validity of the packets according to the bindings.</t>
      <t>Given numerous access networks managed by different operators throughout the world, it is difficult to require all access networks to effectively deploy SAV. Therefore, intra-domain SAV and inter-domain SAV are needed to block spoofing traffic as close to the source as possible. Both intra-domain SAV and inter-domain SAV usually perform validation at the granularity of IP prefixes, which is coarser than the validation granularity of access network SAV, as an IP prefix covers a range of IP addresses.</t>
      <t>This document focuses on the analysis of intra-domain SAV. In contrast to inter-domain SAV, intra-domain SAV does not require collaboration between different ASes. The SAV rules can be generated by the AS itself. Consider an AS X which provides its own subnets with the connectivity to other ASes. The intra-domain SAV for AS X has two goals: i) blocking the illegitimate packets originated from the local subnets of AS X with spoofed source addresses; and ii) blocking the illegitimate packets coming from other ASes which spoof the source addresses of AS X.</t>
      <t><xref target="intra-domain"/> illustrates the function of intra-domain SAV with two cases. Case i shows that AS X forwards spoofed packets originated from its subnets to other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the spoofed packets from its own subnet can be locked by AS X itself (i.e., Goal i). Case ii shows that AS X receives the packets which spoof AS X's source addresses from other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the spoofed packets from AS Y can be blocked by AS X (i.e., Goal ii).</t>
      <figure anchor="intra-domain">
        <name>An example for illustrating intra-domain SAV</name>
        <artwork><![CDATA[
Case i: AS X forwards spoofed packets originated 
        from its subnets to other ASes (e.g., AS Y)
Goal i: If AS X deploys intra-domain SAV, 
        the spoofed packets can be blocked by AS X

  +------+  Spoofed packets  +------+
  | AS X |------------------>| AS Y |
  +------+                   +------+


Case ii: AS X receives packets spoofing 
         AS X's source addresses from other ASes (e.g., AS Y)
Goal ii: If AS X deploys intra-domain SAV,
         the spoofed packets can be blocked by AS X

  +------+  Spoofed packets  +------+
  | AS X |<------------------| AS Y |
  +------+                   +------+
]]></artwork>
      </figure>
      <t>There are many mechanisms for intra-domain SAV. This document provides the gap analysis of existing intra-domain SAV mechanisms. According to the gap analysis, the document concludes the main problems of existing mechanisms and describes the requirements for future intra-domain SAV mechanisms.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        <t>SAV Table: The table or data structure that implements the SAV rules and is used for source address validation in the data plane.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Existing Mechanisms</name>
      <t>Ingress filtering <xref target="RFC2827"/><xref target="RFC3704"/> is the current practice of intra-domain SAV. This section briefly introduces the existing intra-domain SAV mechanisms.</t>
      <ul spacing="normal">
        <li>ACL-based ingress filtering <xref target="RFC2827"/><xref target="RFC3704"/> is a typical mechanism for intra-domain SAV. ACL rules can be configured for blocking or permitting packets with specific source addresses. This mechanism can be applied at the downstream interfaces of edge routers connecting the subnets or at the downstream interfaces of aggregation routers <xref target="manrs-antispoofing"/>. The validation at downstream interfaces will prevent local subnets from spoofing source prefixes of other subnets. Besides, at the upstream interfaces of routers connecting other ASes, ACL can be enabled for blocking packets with disallowed source prefixes, such as the internal source prefixes owned by the subnets <xref target="nist-rec"/>. In any application scenario, ACL rules should be updated in time to be consistent with the latest filtering criteria.</li>
        <li>Strict uRPF <xref target="RFC3704"/> is another commonly used mechanism for SAV in intra-domain networks. Routers deploying strict uRPF accept a data packet only when i) the local FIB contains a prefix encompassing the packet's source address and ii) the corresponding outgoing interface for the prefix in the FIB matches the packet's incoming interface. Otherwise, the packet will be blocked. Strict uRPF is usually used at downstream interfaces of edge routers connecting local subnets.</li>
        <li>Loose uRPF <xref target="RFC3704"/> takes a looser validation mechanism than strict uRPF to avoid improper block. A packet will be accepted if the local FIB contains a prefix encompassing the packet's source address. The incoming interface of the packet is not checked. Upstream interfaces can enable loose uRPF for blocking non-global addresses <xref target="nist-rec"/>.</li>
        <li>Carrier Grade NAT has some operations on the source addresses of packets, but is not an anti-spoofing tool, as described in <xref target="manrs-antispoofing"/>. If the source address of a packet is in the INSIDE access list, the NAT rule can translate the source address to an address in the pool OUTSIDE. The NAT rule cannot judge whether the source address is spoofed or not. In addition, the packet with a spoofed source address will be forwarded directly if the spoofed source address is not included in the INSIDE access list. Therefore, Carrier Grade NAT cannot help block or traceback spoofed packets, and other SAV mechanisms are still needed.</li>
      </ul>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>Existing intra-domain SAV mechanisms either require high operational overhead or have limitations in accuracy. They may improperly block the traffic with legitimate source addresses (i.e., improper block) or improperly permit the traffic with spoofed source addresses (i.e., improper permit).</t>
      <section anchor="outbound-traffic-validation">
        <name>Outbound Traffic Validation</name>
        <t>Outbound traffic validation is implemented at downstream interfaces of routers to validate the packets from directly connected subnets. As described previously, ACL rules can be configured at downstream interfaces for ingress filtering. These rules need to be updated when prefixes or topologies of subnets change. If ACL rules are not updated in time, improper block or improper permit may occur. To ensure the accuracy of SAV in dynamic networks, high operational overhead will be induced to achieve timely updates for ACL configurations.</t>
        <t>Strict uRPF can also be used for outbound traffic validation, but there may be improper block problem in multi-homing scenario. <xref target="multi-home"/> shows such a case. In the figure, Subnet 1 owns prefix 10.0.0.0/15 and is attached to two edge routers, i.e., Router 1 and Router 2. For the load balance purpose of inbound traffic, Subnet 1 expects the inbound traffic destined for 10.1.0.0/16 to come only from Router 1 and the inbound traffic destined for 10.0.0.0/16 to come only from Router 2. To this end, Router 1 only learns the route to sub prefix 10.1.0.0/16 from Subnet 1, while Router 2 only learns the route to the other sub prefix 10.0.0.0/16 from Subnet 1. Then, Router 1 and Router 2 advertise the learned sub prefix to the other routers in the AS through intra-domain routing protocols such as OSPF or IS-IS. Finally, Router 1 learns the route to 10.0.0.0/16 from Router 3, and Router 2 learns the route to 10.1.0.0/16 from Router 3. The FIBs on Router 1 and Router 2 are shown in the figure. Although Subnet 1 does not expect inbound traffic destined for 10.0.0.0/16 to come from Router 1, it may send outbound traffic with source addresses of prefix 10.0.0.0/16 to Router 1 for load balance of outbound traffic. As a result, there is asymmetric routing between Subnet 1 and Router 1. Similarly, Subnet 1 may also send outbound traffic with source addresses of prefix 10.1.0.0/16 to Router 2, resulting in asymmetric routing between Subnet1 and Router 2.</t>
        <figure anchor="multi-home">
          <name>Asymmetric routing in the multi-homed subnet scenario</name>
          <artwork><![CDATA[
+-------------------------------------------------------------+
|                                                      AS     |
|                        +----------+                         |
|                        | Router 3 |                         |
| FIB on Router 1        +----------+  FIB on Router 2        |
| Dest         Next_hop   /\      \    Dest         Next_hop  |
| 10.1.0.0/16  Subnet 1   /        \   10.0.0.0/16  Subnet 1  |
| 10.0.0.0/16  Router 3  /         \/  10.1.0.0/16  Router 3  |
|                +----------+     +----------+                |
|                | Router 1 |     | Router 2 |                |
|                +-----+#+--+     +-+#+------+                |
|                        /\         /                         |
|   Outbound traffic with \        / Inbound traffic with     |
|   source IP addresses    \      /  destination IP addresses |
|   of 10.0.0.0/16          \    \/  of 10.0.0.0/16           |
|                           Subnet 1                          |
|                        (10.0.0.0/15 )                       |
|                                                             |
+-------------------------------------------------------------+
]]></artwork>
        </figure>
        <t>Strict uRPF takes the entries in FIB for SAV. It can improperly block the packets with legitimate source prefixes when asymmetric routing exists. In the figure, if Router 1 applies strict uRPF at interface '#', the SAV rule is that Router 1 only accepts packets with source addresses of 10.1.0.0/16 from Subnet 1. Therefore, when Subnet 1 sends packets with source addresses of 10.0.0.0/16 to Router 1, strict uRPF at Router 1 will improperly block these legitimate packets. Similarly, when Router 2 with strict uRPF deployed receives packets with source addresses of prefix 10.1.0.0/16 from Subnet 1, it will also improperly block these legitimate packets. Therefore, strict uRPF may cause improper block problem in the case of asymmetric routing.</t>
      </section>
      <section anchor="inbound-traffic-validation">
        <name>Inbound Traffic Validation</name>
        <t>Inbound traffic validation is performed at upstream interfaces of border routers to validate the packets from other ASes. <xref target="inbound-SAV"/> shows an example of inbound SAV. In the figure, Router 3 and Router 4 deploy SAV mechanisms at interface '#' for validating external packets. Hence, there are multiple points for inbound traffic validation for the AS.</t>
        <t>ACL-based ingress filtering is usually used for validating inbound traffic. By configuring specified ACL rules, inbound packets with disallowed source prefixes (e.g., non-global addresses or the internal source prefixes) can be blocked. As mentioned above, ACL-based ingress filtering requires timely updates when the routing status changes dynamically. When the ACL rules are not updated in time, there may be improper block or improper permit problems. The operational overhead of maintaining updated ACL rules will be extremely high when there are multiple inbound validation points as shown in <xref target="inbound-SAV"/>.</t>
        <t>Loose uRPF is another inbound SAV mechanism and is more adaptive than ACL-based rules. But it sacrifices the directionality of SAV and has limited blocking capability, because it allows packets with source addresses that exist in the FIB table at all router interfaces.</t>
        <figure anchor="inbound-SAV">
          <name>A scenario of inbound SAV</name>
          <artwork><![CDATA[
                + Packets with              + Packets with
                | spoofed p1/p2             | spoofed p1/p2
+--------------|---------------------------|----------+
|  AS          \/                          \/         |
|          +--+#+-----+               +---+#+----+    |
|          | Router 3 +-------------->| Router 4 |    |
|          +----------+               +----------+    |
|             /     \                      |          |
|            /       \                     |          |
|          \/         \/                   \/         |
|  +----------+     +----------+      +----------+    |
|  | Router 1 |     | Router 2 |      | Router 5 |    |
|  +----------+     +----------+      +----------+    |
|        \              /                   |         |
|         \            /                    |         |
|          \          /                     \/        |
|           Subnet1(p1)                 Subnet2(p2)   |
+-----------------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>Accurate validation and low operational overhead are two important design goals of intra-domain SAV mechanisms. As analyzed above, asymmetric routing and dynamic networks are two challenging scenarios for the two goals. In these scenarios, existing SAV mechanisms have problems of inaccurate validation or high operational overhead.</t>
      <t>ACL-based SAV relies on manual configurations and thus requires high operational overhead in dynamic networks. Operators have to manually update the ACL-based filtering rules in time when the prefix or topology changes. Otherwise, improper block or improper permit problems may appear.</t>
      <t>Strict uRPF-based SAV can automatically update SAV rules, but may improperly block legitimate traffic under asymmetric routing. The root cause is that strict uRPF leverages the local FIB table to determine the incoming interface for source addresses, which may not match the real data-plane forwarding path from the source, due to the existence of asymmetric routes. Hence, it may mistakenly consider a valid incoming interface as invalid, resulting in improper block problem; or it may consider an invalid incoming interface as valid, resulting in improper permit problem.</t>
      <t>Loose uRPF is also an automated SAV mechanism but its SAV rules are overly loose. Most spoofed packets will be improperly permitted by adopting loose uRPF.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section lists the requirements which can be a guidance for narrowing the gaps of existing intra-domain SAV mechanisms. The requirements can be fully or partially fulfilled when designing new intra-domain SAV mechanisms.</t>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanisms <bcp14>MUST</bcp14> be able to automatically adapt to network dynamics such as routing change or prefix change, instead of purely relying on manual update.</t>
      </section>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanisms needs to improve the validation accuracy upon existing intra-domain SAV mechanisms. In a static network, improper block <bcp14>MUST</bcp14> be avoided to guarantee that legitimate traffic will not be blocked. Improper permit <bcp14>SHOULD</bcp14> be reduced as much as possible so that the malicious packets with forged source addresses can be efficiently filtered. When there are network changes, the new mechanisms <bcp14>MUST</bcp14> update SAV rules efficiently for keeping the high accuracy of validaiton.</t>
      </section>
      <section anchor="working-in-incrementalpartial-deployment">
        <name>Working in Incremental/Partial Deployment</name>
        <t>The new intra-domain SAV mechanisms <bcp14>SHOULD NOT</bcp14> assume pervasive adoption. Some routers may not be able to be easily upgraded for supporting the new SAV mechanism due to their limitations of capabilities, versions, or vendors. The mechanisms <bcp14>SHOULD</bcp14> be able to provide protection even when it is partially deployed. The effectiveness of protection for the new intra-domain SAV mechanisms under partial deployment <bcp14>SHOULD</bcp14> be no worse than existing mechanisms.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>Network changes may cause SAV rules to be inaccurate and need to be updated. The new intra-domain SAV mechanism <bcp14>MUST</bcp14> consider how to update SAV rules quickly so as to minimize improper block and improper permit impacts during convergence.</t>
      </section>
      <section anchor="necessary-security-guarantee">
        <name>Necessary Security Guarantee</name>
        <t>Necessary security tools <bcp14>SHOULD</bcp14> be contained in the new intra-domain SAV mechanisms. In an insecure scenario, these security tools can help protect the SAV rule generation process.</t>
      </section>
    </section>
    <section anchor="sec-scope">
      <name>Intra-domain SAV Scope</name>
      <t>The new intra-domain SAV mechanisms work in the same scenarios as existing intra-domain SAV mechanisms. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>Native IP forwarding: including both forwarding based on global routing table and CE site forwarding of VPN.</li>
        <li>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): focusing on the validation of the outer layer IP address.</li>
        <li>Validating both IPv4 and IPv6 addresses.</li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>Non-IP packets: including MPLS label-based forwarding and other non-IP-based forwarding.</li>
      </ul>
      <t>In addition, the new intra-domain SAV mechanisms <bcp14>SHOULD</bcp14> avoid data-plane packet modification. Existing architectures or protocols or mechanisms can be used in the new SAV mechanisms to achieve better SAV function.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The new intra-domain SAV mechanisms <bcp14>MUST NOT</bcp14> introduce additional security vulnerabilities or confusion to the existing intra-domain architectures or control or management plane protocols. Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanisms <bcp14>SHOULD</bcp14> ensure integrity and authentication of protocol packets that deliver the required SAV information.</t>
      <t>The new intra-domain SAV mechanisms do not provide protection against compromised or misconfigured routers that poison existing control plane protocols. Such routers can not only disrupt the SAV function, but also affect the entire routing domain.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Barry Greene, Fang Gao, Kotikalapudi Sriram, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, Libin Liu, John O'Brien, Roland Dobbins, Xiangqing Chang, etc.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="nist-rec" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation&quot;">
          <front>
            <title>Resilient Interdomain Traffic Exchange - BGP Security and DDos Mitigation</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
      </references>
    </references>
    <?line 297?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
