<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-03" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.4 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-03"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2024" month="February" day="14"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 89?>

<t>This document provides the gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 93?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is important for defending against source address spoofing attacks and allowing accurate traceback. A multi-fence architecture called Source Address Validation Architecture (SAVA) <xref target="RFC5210"/> was proposed to validate source addresses at three levels: access network SAV, intra-domain SAV, and inter-domain SAV. When SAV is not fully enabled at the edge of the Internet, the multi-fence architecture can help enhance the validation across the whole Internet and thus reduce the opportunities of launching source address spoofing attacks.</t>
      <t>Particularly, access network SAV ensures that a host uses a valid address assigned to the host statically or dynamically. In this way, the host cannot use the source address of another host. There are many mechanisms for SAV in access networks. Static ACL rules can be manually configured for validation by specifying which source addre-sses are acceptable or unacceptable. Dynamic ACL is another efficient mechanism which is associated with authentication servers (e.g., RADIUS and DIAMETER). The servers receive access requests and then install or enable ACL rules on the device to permit particular users' packets. SAVI <xref target="RFC7039"/> represents a kind of mechanism enforcing that the legitimate IP address of a host matches the link-layer property of the host's network attachment. For example, SAVI solution for DHCP <xref target="RFC7513"/> creates a binding between a DHCPv4/DHCPv6-assigned IP address and a link-layer property (like MAC address or switch port) on a SAVI device. IP Source Guard (IPSG) <xref target="IPSG"/> combined with DHCP snooping is an implementation of SAVI solution for DHCP. Cable Source-Verify <xref target="cable-verify"/> also shares some features of SAVI and is used in cable modem networks. Cable modem termination system (CMTS) devices with Cable Source-Verify maintain the bindings of the CPE's IP address, the CPE's MAC address, and the corresponding cable modem identifier. When receiving packets, the device will check the validity of the packets according to the bindings.</t>
      <t>Given numerous access networks managed by different operators throughout the world, it is difficult to require all access networks to effectively deploy SAV. Therefore, intra-domain SAV and inter-domain SAV are needed to block spoofing traffic as close to the source as possible. Both intra-domain SAV and inter-domain SAV usually perform validation at the granularity of IP prefixes, which is coarser than the validation granularity of access network SAV, as an IP prefix covers a range of IP addresses.</t>
      <t>This document focuses on the analysis of intra-domain SAV. In contrast to inter-domain SAV, intra-domain SAV does not require collaboration between different ASes. The SAV rules can be generated by the AS itself. Consider an AS X which provides its host networks or customer networks with the connectivity to other ASes. The intra-domain SAV for AS X has two goals: i) blocking the illegitimate packets originated from its host networks or customer networks with spoofed source addresses; and ii) blocking the illegitimate packets coming from other ASes which spoof the source addresses of AS X.</t>
      <t><xref target="intra-domain"/> illustrates the function of intra-domain SAV with two cases. Case i shows that AS X forwards spoofed packets originated from its host networks or customer networks to other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the spoofed packets from its host networks or customer networks can be blocked by AS X itself (i.e., Goal i). Case ii shows that AS X receives the packets which spoof AS X's source addresses from other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the spoofed packets from AS Y can be blocked by AS X (i.e., Goal ii).</t>
      <figure anchor="intra-domain">
        <name>An example for illustrating intra-domain SAV</name>
        <artwork><![CDATA[
Case i: AS X forwards spoofed packets originated from its 
        host networks or customer networks to other ASes (e.g., AS Y)
Goal i: If AS X deploys intra-domain SAV, 
        the spoofed packets can be blocked by AS X

  +------+  Spoofed packets  +------+
  | AS X |------------------>| AS Y |
  +------+                   +------+


Case ii: AS X receives packets spoofing 
         AS X's source addresses from other ASes (e.g., AS Y)
Goal ii: If AS X deploys intra-domain SAV,
         the spoofed packets can be blocked by AS X

  +------+  Spoofed packets  +------+
  | AS X |<------------------| AS Y |
  +------+                   +------+
]]></artwork>
      </figure>
      <t>There are many mechanisms for intra-domain SAV. This document provides the gap analysis of existing intra-domain SAV mechanisms. According to the gap analysis, the document concludes the main problems of existing mechanisms and describes the requirements for future intra-domain SAV mechanisms.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions and is inferred from the SAV Information Base.</t>
        <t>SAV Table: The table or data structure that implements the SAV rules and is used for source address validation in the data plane.</t>
        <t>Host-facing Router: An intra-domain router of an AS which is connected to a host network (i.e., a layer-2 network).</t>
        <t>Customer-facing Router: An intra-domain router of an AS which is connected to a customer network running the routing protocol (i.e., a layer-3 network).</t>
        <t>AS Border Router: An intra-domain router of an AS which is connected to other ASes.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Existing Mechanisms</name>
      <t>Ingress filtering <xref target="RFC2827"/><xref target="RFC3704"/> is the current practice of intra-domain SAV. This section briefly introduces the existing intra-domain SAV mechanisms.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering <xref target="RFC2827"/><xref target="RFC3704"/> is a typical mechanism for intra-domain SAV. ACL rules can be configured for blocking or permitting packets with specific source addresses. This mechanism can be applied at the downstream interfaces of host-facing routers or customer-facing routers <xref target="manrs-antispoofing"/>. The validation at downstream interfaces will prevent the corresponding host networks or customer networks from spoofing source prefixes of other networks. In addition, at the upstream interfaces of AS border routers, ACL can be enabled for blocking packets with disallowed source prefixes, such as the internal source prefixes owned by the AS <xref target="nist-rec"/>. In any application scenario, ACL rules should be updated in time to be consistent with the latest filtering criteria.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> is another commonly used mechanism for SAV in intra-domain networks. Routers deploying strict uRPF accept a data packet only when i) the local FIB contains a prefix encompassing the packet's source address and ii) the corresponding outgoing interface for the prefix in the FIB matches the packet's incoming interface. Otherwise, the packet will be blocked. Strict uRPF is usually used at downstream interfaces of host-facing routers or customer-facing routers.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> takes a looser validation mechanism than strict uRPF to avoid improper block. A packet will be accepted if the local FIB contains a prefix encompassing the packet's source address regardless of the interface from which the packet is received. Upstream interfaces of AS border routers can enable loose uRPF for blocking non-global addresses <xref target="nist-rec"/>.</t>
        </li>
        <li>
          <t>Carrier Grade NAT has some operations on the source addresses of packets, but is not an anti-spoofing tool, as described in <xref target="manrs-antispoofing"/>. If the source address of a packet is in the INSIDE access list, the NAT rule can translate the source address to an address in the pool OUTSIDE. The NAT rule cannot judge whether the source address is spoofed or not. In addition, the packet with a spoofed source address will be forwarded directly if the spoofed source address is not included in the INSIDE access list. Therefore, Carrier Grade NAT cannot help block or traceback spoofed packets, and other SAV mechanisms are still needed.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>Existing intra-domain SAV mechanisms either require high operational overhead or have limitations in accuracy. They may improperly block the traffic with legitimate source addresses (i.e., improper block) or improperly permit the traffic with spoofed source addresses (i.e., improper permit).</t>
      <section anchor="outbound-traffic-validation">
        <name>Outbound Traffic Validation</name>
        <t>Outbound traffic validation is implemented at downstream interfaces of host-facing or customer-facing routers to validate packets originated from their host networks or customer networks. As described previously, ACL rules can be configured at downstream interfaces for ingress filtering. These rules need to be updated when prefixes or topologies of host networks or customer networks change. If ACL rules are not updated in time, improper block or improper permit may occur. To ensure the accuracy of SAV in dynamic networks, high operational overhead will be induced to achieve timely updates for ACL configurations.</t>
        <t>Strict uRPF can also be used for outbound traffic validation, but there may be improper block problem in multi-homing scenario. <xref target="multi-home"/> shows such a case. In the figure, Network 1 is a host/customer network of the AS. It owns prefix 10.0.0.0/15 and is attached to two intra-domain routers, i.e., Router 1 and Router 2. For the load balance purpose of inbound traffic, Network 1 expects the inbound traffic destined for 10.1.0.0/16 to come only from Router 1 and the inbound traffic destined for 10.0.0.0/16 to come only from Router 2. To this end, Router 1 only learns the route to sub prefix 10.1.0.0/16 from Network 1, while Router 2 only learns the route to the other sub prefix 10.0.0.0/16 from Network 1. Then, Router 1 and Router 2 advertise the learned sub prefix to the other routers in the AS through intra-domain routing protocols such as OSPF or IS-IS. Finally, Router 1 learns the route to 10.0.0.0/16 from Router 3, and Router 2 learns the route to 10.1.0.0/16 from Router 3. The FIBs on Router 1 and Router 2 are shown in the figure. Although Network 1 does not expect inbound traffic destined for 10.0.0.0/16 to come from Router 1, it may send outbound traffic with source addresses of prefix 10.0.0.0/16 to Router 1 for load balance of outbound traffic. As a result, there is asymmetric routing between Network 1 and Router 1. Similarly, Network 1 may also send outbound traffic with source addresses of prefix 10.1.0.0/16 to Router 2, resulting in asymmetric routing between Network 1 and Router 2.</t>
        <figure anchor="multi-home">
          <name>Asymmetric routing in the multi-homing scenario</name>
          <artwork><![CDATA[
 +-------------------------------------------------------------+
 |                                                      AS     |
 |                        +----------+                         |
 |                        | Router 3 |                         |
 | FIB on Router 1        +----------+  FIB on Router 2        |
 | Dest         Next_hop   /\      \    Dest         Next_hop  |
 | 10.1.0.0/16  Network 1  /        \   10.0.0.0/16  Network 1 |
 | 10.0.0.0/16  Router 3  /         \/  10.1.0.0/16  Router 3  |
 |                +----------+     +----------+                |
 |                | Router 1 |     | Router 2 |                |
 |                +-----+#+--+     +-+#+------+                |
 |                        /\         /                         |
 |   Outbound traffic with \        / Inbound traffic with     |
 |   source IP addresses    \      /  destination IP addresses |
 |   of 10.0.0.0/16          \    \/  of 10.0.0.0/16           |
 |                     +---------------+                       |
 |                     | Host/Customer |                       |
 |                     |   Network 1   |                       |
 |                     | (10.0.0.0/15) |                       |
 |                     +---------------+                       |
 |                                                             |
 +-------------------------------------------------------------+
]]></artwork>
        </figure>
        <t>Strict uRPF takes the entries in FIB for SAV. It can improperly block the packets with legitimate source prefixes when asymmetric routing exists. In the figure, if Router 1 applies strict uRPF at interface '#', the SAV rule is that Router 1 only accepts packets with source addresses of 10.1.0.0/16 from Network 1. Therefore, when Network 1 sends packets with source addresses of 10.0.0.0/16 to Router 1, strict uRPF at Router 1 will improperly block these legitimate packets. Similarly, when Router 2 with strict uRPF deployed receives packets with source addresses of prefix 10.1.0.0/16 from Network 1, it will also improperly block these legitimate packets. Therefore, strict uRPF may cause improper block problem in the case of asymmetric routing.</t>
      </section>
      <section anchor="inbound-traffic-validation">
        <name>Inbound Traffic Validation</name>
        <t>Inbound traffic validation is performed at upstream interfaces of AS border routers to validate the packets from other ASes. <xref target="inbound-SAV"/> shows an example of inbound SAV. In the figure, Router 3 and Router 4 deploy SAV mechanisms at interface '#' for validating external packets. Hence, there are multiple points for inbound traffic validation for the AS.</t>
        <t>ACL-based ingress filtering is usually used for validating inbound traffic. By configuring specified ACL rules, inbound packets with disallowed source prefixes (e.g., non-global addresses or the internal source prefixes) can be blocked. As mentioned above, ACL-based ingress filtering requires timely updates when the routing status changes dynamically. When the ACL rules are not updated in time, there may be improper block or improper permit problems. The operational overhead of maintaining updated ACL rules will be extremely high when there are multiple inbound validation points as shown in <xref target="inbound-SAV"/>.</t>
        <t>Loose uRPF is another inbound SAV mechanism and is more adaptive than ACL-based rules. But it sacrifices the directionality of SAV and has limited blocking capability, because it allows packets with source addresses that exist in the FIB table at all router interfaces.</t>
        <figure anchor="inbound-SAV">
          <name>A scenario of inbound SAV</name>
          <artwork><![CDATA[
 Packets with +              Packets with +
 spoofed P1/P2|              spoofed P1/P2|
+-------------|---------------------------|---------+
|   AS        \/                          \/        |
|         +--+#+-----+               +---+#+----+   |
|         | Router 3 +---------------+ Router 4 |   |
|         +----------+               +----+-----+   |
|          /        \                     |         |
|         /          \                    |         |
|        /            \                   |         |
| +----------+     +----------+      +----+-----+   |
| | Router 1 |     | Router 2 |      | Router 5 |   |
| +----------+     +----------+      +----+-----+   |
|        \             /                  |         |
|         \           /                   |         |
|          \         /                    |         |
|       +---------------+         +-------+-------+ |
|       |     Host      |         |   Customer    | |
|       |   Network     |         |   Network     | |
|       |     (P1)      |         |     (P2)      | |
|       +---------------+         +---------------+ |
|                                                   |
+---------------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>Accurate validation and low operational overhead are two important design goals of intra-domain SAV mechanisms. As analyzed above, asymmetric routing and dynamic networks are two challenging scenarios for the two goals. In these scenarios, existing SAV mechanisms have problems of inaccurate validation or high operational overhead.</t>
      <t>ACL-based SAV relies on manual configurations and thus requires high operational overhead in dynamic networks. Operators have to manually update the ACL-based filtering rules in time when the prefix or topology changes. Otherwise, improper block or improper permit problems may appear.</t>
      <t>Strict uRPF-based SAV can automatically update SAV rules, but may improperly block legitimate traffic under asymmetric routing. The root cause is that strict uRPF leverages the local FIB table to determine the incoming interface for source addresses, which may not match the real data-plane forwarding path from the source, due to the existence of asymmetric routes. Hence, it may mistakenly consider a valid incoming interface as invalid, resulting in improper block problem; or it may consider an invalid incoming interface as valid, resulting in improper permit problem.</t>
      <t>Loose uRPF is also an automated SAV mechanism but its SAV rules are overly loose. Most spoofed packets will be improperly permitted by adopting loose uRPF.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section lists the requirements which can be a guidance for narrowing the gaps of existing intra-domain SAV mechanisms. The requirements can be fully or partially fulfilled when designing new intra-domain SAV mechanisms.</t>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanisms <bcp14>MUST</bcp14> be able to automatically adapt to network dynamics such as routing change or prefix change, instead of purely relying on manual update.</t>
      </section>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanisms needs to improve the validation accuracy upon existing intra-domain SAV mechanisms. In a static network, improper block <bcp14>MUST</bcp14> be avoided to guarantee that legitimate traffic will not be blocked. Improper permit <bcp14>SHOULD</bcp14> be reduced as much as possible so that the malicious packets with forged source addresses can be efficiently filtered. When there are network changes, the new mechanisms <bcp14>MUST</bcp14> update SAV rules efficiently for keeping the high accuracy of validaiton.</t>
      </section>
      <section anchor="working-in-incrementalpartial-deployment">
        <name>Working in Incremental/Partial Deployment</name>
        <t>The new intra-domain SAV mechanisms <bcp14>SHOULD NOT</bcp14> assume pervasive adoption. Some routers may not be able to be easily upgraded for supporting the new SAV mechanism due to their limitations of capabilities, versions, or vendors. The mechanisms <bcp14>SHOULD</bcp14> be able to provide protection even when it is partially deployed. The effectiveness of protection for the new intra-domain SAV mechanisms under partial deployment <bcp14>SHOULD</bcp14> be no worse than existing mechanisms.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>Network changes may cause SAV rules to be inaccurate and need to be updated. The new intra-domain SAV mechanism <bcp14>MUST</bcp14> consider how to update SAV rules quickly so as to minimize improper block and improper permit impacts during convergence.</t>
      </section>
      <section anchor="necessary-security-guarantee">
        <name>Necessary Security Guarantee</name>
        <t>Necessary security tools <bcp14>SHOULD</bcp14> be contained in the new intra-domain SAV mechanisms. In an insecure scenario, these security tools can help protect the SAV rule generation process.</t>
      </section>
    </section>
    <section anchor="sec-scope">
      <name>Intra-domain SAV Scope</name>
      <t>The new intra-domain SAV mechanisms work in the same scenarios as existing intra-domain SAV mechanisms. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: including both forwarding based on global routing table and CE site forwarding of VPN.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): focusing on the validation of the outer layer IP address.</t>
        </li>
        <li>
          <t>Validating both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>
          <t>Non-IP packets: including MPLS label-based forwarding and other non-IP-based forwarding.</t>
        </li>
      </ul>
      <t>In addition, the new intra-domain SAV mechanisms <bcp14>SHOULD</bcp14> avoid data-plane packet modification. Existing architectures or protocols or mechanisms can be used in the new SAV mechanisms to achieve better SAV function.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The new intra-domain SAV mechanisms <bcp14>MUST NOT</bcp14> introduce additional security vulnerabilities or confusion to the existing intra-domain architectures or control or management plane protocols. Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanisms <bcp14>SHOULD</bcp14> ensure integrity and authentication of protocol packets that deliver the required SAV information.</t>
      <t>The new intra-domain SAV mechanisms do not provide protection against compromised or misconfigured routers that poison existing control plane protocols. Such routers can not only disrupt the SAV function, but also affect the entire routing domain.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Barry Greene, Fang Gao, Kotikalapudi Sriram, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, Libin Liu, John O'Brien, Roland Dobbins, Xiangqing Chang, etc.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="nist-rec" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation&quot;">
          <front>
            <title>Resilient Interdomain Traffic Exchange - BGP Security and DDos Mitigation</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
      </references>
    </references>
    <?line 321?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
