<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-04" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-04"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2024" month="August" day="02"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 90?>

<t>This document provides the gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 94?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is important for defending against source address spoofing attacks and allowing accurate traceback. A multi-fence architecture called Source Address Validation Architecture (SAVA) <xref target="RFC5210"/> was proposed to validate source addresses at three levels: access network SAV, intra-domain SAV, and inter-domain SAV. When SAV is not fully enabled at the edge of the Internet, the multi-fence architecture can help enhance the validation across the whole Internet and thus reduce the opportunities of launching source address spoofing attacks.</t>
      <t>Particularly, access network SAV ensures that a host uses a valid address assigned to the host statically or dynamically. In this way, the host cannot use the source address of another host. There are many mechanisms for SAV in access networks. Static ACL rules can be manually configured for validation by specifying which source addre-sses are acceptable or unacceptable. Dynamic ACL is another efficient mechanism which is associated with authentication servers (e.g., RADIUS and DIAMETER). The servers receive access requests and then install or enable ACL rules on the device to permit particular users' packets. SAVI <xref target="RFC7039"/> represents a kind of mechanism enforcing that the legitimate IP address of a host matches the link-layer property of the host's network attachment. For example, SAVI solution for DHCP <xref target="RFC7513"/> creates a binding between a DHCPv4/DHCPv6-assigned IP address and a link-layer property (like MAC address or switch port) on a SAVI device. IP Source Guard (IPSG) <xref target="IPSG"/> combined with DHCP snooping is an implementation of SAVI solution for DHCP. Cable Source-Verify <xref target="cable-verify"/> also shares some features of SAVI and is used in cable modem networks. Cable modem termination system (CMTS) devices with Cable Source-Verify maintain the bindings of the CPE's IP address, the CPE's MAC address, and the corresponding cable modem identifier. When receiving packets, the device will check the validity of the packets according to the bindings.</t>
      <t>Given numerous access networks managed by different operators throughout the world, it is difficult to require all access networks to effectively deploy SAV. Therefore, intra-domain SAV and inter-domain SAV are needed to block spoofing traffic as close to the source as possible. Both intra-domain SAV and inter-domain SAV usually perform validation at the granularity of IP prefixes, which is coarser than the validation granularity of access network SAV, as an IP prefix covers a range of IP addresses.</t>
      <t>This document focuses on the analysis of intra-domain SAV. In contrast to inter-domain SAV, intra-domain SAV does not require collaboration between different ASes. The SAV rules can be generated by the AS itself. Consider an AS X which provides its host networks or customer networks with the connectivity to other ASes. The intra-domain SAV for AS X has two goals: i) blocking the illegitimate packets originated from its host networks or customer networks with spoofed source addresses; and ii) blocking the illegitimate packets coming from other ASes which spoof the source addresses of AS X.</t>
      <t><xref target="intra-domain"/> illustrates the function of intra-domain SAV with two cases. Case i shows that AS X forwards spoofed packets originated from its host networks or customer networks to other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the spoofed packets from its host networks or customer networks can be blocked by AS X itself (i.e., Goal i). Case ii shows that AS X receives the packets which spoof AS X's source addresses from other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the spoofed packets from AS Y can be blocked by AS X (i.e., Goal ii).</t>
      <figure anchor="intra-domain">
        <name>An example for illustrating intra-domain SAV</name>
        <artwork><![CDATA[
Case i: AS X forwards spoofed packets originated from its 
        host networks or customer networks to other ASes (e.g., AS Y)
Goal i: If AS X deploys intra-domain SAV, 
        the spoofed packets can be blocked by AS X

  +------+  Spoofed packets  +------+
  | AS X |------------------>| AS Y |
  +------+                   +------+


Case ii: AS X receives packets spoofing 
         AS X's source addresses from other ASes (e.g., AS Y)
Goal ii: If AS X deploys intra-domain SAV,
         the spoofed packets can be blocked by AS X

  +------+  Spoofed packets  +------+
  | AS X |<------------------| AS Y |
  +------+                   +------+
]]></artwork>
      </figure>
      <t>There are many mechanisms for intra-domain SAV. This document provides the gap analysis of existing intra-domain SAV mechanisms. According to the gap analysis, the document concludes the main problems of existing mechanisms and describes the requirements for future intra-domain SAV mechanisms.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions and is inferred from the SAV Information Base.</t>
        <t>SAV Table: The table or data structure that implements the SAV rules and is used for source address validation in the data plane.</t>
        <t>Host-facing Router: An intra-domain router of an AS which is connected to a host network (i.e., a layer-2 network).</t>
        <t>Customer-facing Router: An intra-domain router of an AS which is connected to a customer network running the routing protocol (i.e., a layer-3 network).</t>
        <t>AS Border Router: An intra-domain router of an AS which is connected to other ASes.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        <t>Outbound Traffic: For a network, the outbound traffic is the traffic that flows from the network to other networks.</t>
        <t>Inbound Traffic: For a network, the inbound traffic is the traffic that flows from other networks to the network.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Existing Mechanisms</name>
      <t>Ingress filtering <xref target="RFC2827"/><xref target="RFC3704"/> is the current practice of intra-domain SAV. This section briefly introduces the existing intra-domain SAV mechanisms.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering <xref target="RFC2827"/><xref target="RFC3704"/> is a typical mechanism for intra-domain SAV. ACL rules can be configured for blocking or permitting packets with specific source addresses. This mechanism can be applied at the downstream interfaces of host-facing routers or customer-facing routers <xref target="manrs-antispoofing"/>. The validation at downstream interfaces will prevent the corresponding host networks or customer networks from spoofing source prefixes of other networks. In addition, at the upstream interfaces of AS border routers, ACL can be enabled for blocking packets with disallowed source prefixes, such as the internal source prefixes owned by the AS <xref target="nist-rec"/>. In any application scenario, ACL rules should be updated in time to be consistent with the latest filtering criteria.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> is another commonly used mechanism for SAV in intra-domain networks. Routers deploying strict uRPF accept a data packet only when i) the local FIB contains a prefix encompassing the packet's source address and ii) the corresponding outgoing interface for the prefix in the FIB matches the packet's incoming interface. Otherwise, the packet will be blocked. Strict uRPF is usually used at downstream interfaces of host-facing routers or customer-facing routers.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> takes a looser validation mechanism than strict uRPF to avoid improper block. A packet will be accepted if the local FIB contains a prefix encompassing the packet's source address regardless of the interface from which the packet is received. Upstream interfaces of AS border routers can enable loose uRPF for blocking non-global addresses <xref target="nist-rec"/>.</t>
        </li>
        <li>
          <t>Carrier Grade NAT has some operations on the source addresses of packets, but is not an anti-spoofing tool, as described in <xref target="manrs-antispoofing"/>. If the source address of a packet is in the INSIDE access list, the NAT rule can translate the source address to an address in the pool OUTSIDE. The NAT rule cannot judge whether the source address is spoofed or not. In addition, the packet with a spoofed source address will be forwarded directly if the spoofed source address is not included in the INSIDE access list. Therefore, Carrier Grade NAT cannot help block or traceback spoofed packets, and other SAV mechanisms are still needed.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>Existing intra-domain SAV mechanisms either require high operational overhead or have limitations in accuracy. They may improperly block the traffic with legitimate source addresses (i.e., improper block) or improperly permit the traffic with spoofed source addresses (i.e., improper permit).</t>
      <section anchor="outbound-traffic-validation">
        <name>Outbound Traffic Validation</name>
        <t>Outbound traffic validation is typically implemented at downstream interfaces of host-facing or customer-facing routers to validate packets originated from their host networks or customer networks, since it is most effective closer to the edges of the Internet. As described previously, ACL rules can be configured at downstream interfaces for ingress filtering. These rules need to be updated when prefixes or topologies of host networks or customer networks change. If ACL rules are not updated in time, improper block or improper permit may occur. To ensure the accuracy of SAV in dynamic networks, high operational overhead will be induced to achieve timely updates for ACL configurations.</t>
        <t>Strict uRPF can also be used for outbound traffic validation, but there may be improper block problem in multi-homing and asymmetric routing scenario. <xref target="multi-home"/> shows such a case. In the figure, Network 1 is a host/customer network of the AS. It owns prefix 192.0.2.0/24 <xref target="RFC6890"/> and is attached to two intra-domain edge routers, i.e., Router 1 and Router 2. For the load balance purpose of inbound traffic, Network 1 expects the inbound traffic destined for the sub-prefix 192.0.2.128/25 to come only from Router 1 and the inbound traffic destined for the other sub-prefix 192.0.2.0/25 to come only from Router 2. To this end, Router 1 only learns the route to sub-prefix 192.0.2.128/25 from Network 1, while Router 2 only learns the route to the other sub-prefix 192.0.2.0/25 from Network 1. Then, Router 1 and Router 2 advertise the sub-prefix information to routers in the AS through intra-domain routing protocols such as OSPF or IS-IS. Finally, Router 1 learns the route to 192.0.2.0/25 from Router 3, and Router 2 learns the route to 192.0.2.128/25 from Router 3. The FIBs of Router 1 and Router 2 are shown in the figure. Although Network 1 does not expect inbound traffic destined for 192.0.2.0/25 to come from Router 1, it may send outbound traffic with source addresses of prefix 192.0.2.0/25 to Router 1 for load balance of outbound traffic. As a result, there is asymmetric routing of data packets between Network 1 and Router 1. Similarly, Network 1 may also send outbound traffic with source addresses of prefix 192.0.2.128/25 to Router 2, resulting in asymmetric routing between Network 1 and Router 2.</t>
        <figure anchor="multi-home">
          <name>Asymmetric routing in the multi-homing scenario</name>
          <artwork><![CDATA[
 +---------------------------------------------------------------+
 |                                                           AS  |
 |                         +----------+                          |
 |                         | Router 3 |                          |
 |FIB of Router 1          +----------+  FIB of Router 2         |
 |Dest           Next_hop   /\      \    Dest           Next_hop |
 |192.0.2.128/25 Network 1  /        \   192.0.2.0/25   Network 1|
 |192.0.2.0/25   Router 3  /         \/  192.0.2.128/25 Router 3 |
 |                  +----------+     +----------+                |
 |                  | Router 1 |     | Router 2 |                |
 |                  +-----+#+--+     +-+#+------+                |
 |                        /\           /                         |
 |    Outbound traffic with\          /Inbound traffic with      |
 |    source IP addresses   \        / destination IP addresses  |
 |    of 192.0.2.0/25        \      \/ of 192.0.2.0/25           |
 |                     +----------------+                        |
 |                     |  Host/Customer |                        |
 |                     |    Network 1   |                        |
 |                     | (192.0.2.0/24) |                        |
 |                     +----------------+                        |
 |                                                               |
 +---------------------------------------------------------------+

 The outbound traffic with source IP addresses of 192.0.2.0/25 will
 be improperly blocked by Router 1 if Router 1 uses strict uRPF.
]]></artwork>
        </figure>
        <t>Strict uRPF takes the entries in FIB for SAV. It can improperly block data packets that use legitimate source IP addresses when asymmetric routing exists. In the figure, if Router 1 applies strict uRPF at interface '#', the SAV rule is that Router 1 only accepts packets with source addresses of 192.0.2.128/25 from Network 1. Therefore, when Network 1 sends packets with source addresses of 192.0.2.0/25 to Router 1, strict uRPF at Router 1 will improperly block these legitimate packets. Similarly, when Router 2 with strict uRPF deployed receives packets with source addresses of prefix 192.0.2.128/25 from Network 1, it will also improperly block these legitimate packets because strict uRPF at Router 2 will only accept packets from Network 1 using source addressses of prefix 192.0.2.0/25. Therefore, strict uRPF may cause improper block problem in the case of asymmetric routing.</t>
      </section>
      <section anchor="inbound-traffic-validation">
        <name>Inbound Traffic Validation</name>
        <t>Inbound traffic validation is performed at upstream interfaces of AS border routers to validate the packets from other ASes. <xref target="inbound-SAV"/> shows an example of inbound SAV. In the figure, Router 3 and Router 4 deploy SAV mechanisms at interface '#' for validating external packets. Hence, there are multiple points for inbound traffic validation for the AS.</t>
        <t>ACL-based ingress filtering is usually used for validating inbound traffic. By configuring specified ACL rules, inbound packets with disallowed source prefixes (e.g., non-global addresses or the internal source prefixes) can be blocked. As mentioned above, ACL-based ingress filtering requires timely updates when the routing status changes dynamically. When the ACL rules are not updated in time, there may be improper block or improper permit problems. The operational overhead of maintaining updated ACL rules will be extremely high when there are multiple inbound validation points as shown in <xref target="inbound-SAV"/>.</t>
        <t>Loose uRPF is another inbound SAV mechanism and is more adaptive than ACL-based rules. But it sacrifices the directionality of SAV and has limited blocking capability, because it allows packets with source addresses that exist in the FIB table at all router interfaces.</t>
        <figure anchor="inbound-SAV">
          <name>A scenario of inbound SAV</name>
          <artwork><![CDATA[
 Packets with +              Packets with +
 spoofed P1/P2|              spoofed P1/P2|
+-------------|---------------------------|---------+
|   AS        \/                          \/        |
|         +--+#+-----+               +---+#+----+   |
|         | Router 3 +---------------+ Router 4 |   |
|         +----------+               +----+-----+   |
|          /        \                     |         |
|         /          \                    |         |
|        /            \                   |         |
| +----------+     +----------+      +----+-----+   |
| | Router 1 |     | Router 2 |      | Router 5 |   |
| +----------+     +----------+      +----+-----+   |
|        \             /                  |         |
|         \           /                   |         |
|          \         /                    |         |
|       +---------------+         +-------+-------+ |
|       |     Host      |         |   Customer    | |
|       |   Network     |         |   Network     | |
|       |     (P1)      |         |     (P2)      | |
|       +---------------+         +---------------+ |
|                                                   |
+---------------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>Accurate validation and low operational overhead are two important design goals of intra-domain SAV mechanisms. As analyzed above, asymmetric routing and dynamic networks are two challenging scenarios for the two goals. In these scenarios, existing SAV mechanisms have problems of inaccurate validation or high operational overhead.</t>
      <t>ACL-based SAV relies on manual configurations and thus requires high operational overhead in dynamic networks. Operators have to manually update the ACL-based filtering rules in time when the prefix or topology changes. Otherwise, improper block or improper permit problems may appear.</t>
      <t>Strict uRPF-based SAV can automatically update SAV rules, but may improperly block legitimate traffic under asymmetric routing. The root cause is that strict uRPF leverages the local FIB table to determine the incoming interface for source addresses, which may not match the real data-plane forwarding path from the source, due to the existence of asymmetric routes. Hence, it may mistakenly consider a valid incoming interface as invalid, resulting in improper block problem; or it may consider an invalid incoming interface as valid, resulting in improper permit problem.</t>
      <t>Loose uRPF is also an automated SAV mechanism but its SAV rules are overly loose. Most spoofed packets will be improperly permitted by adopting loose uRPF.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section lists the requirements which can be a guidance for narrowing the gaps of existing intra-domain SAV mechanisms. The requirements can be fully or partially fulfilled when designing new intra-domain SAV mechanisms.</t>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanisms <bcp14>MUST</bcp14> be able to automatically adapt to network dynamics such as routing change or prefix change, instead of purely relying on manual update.</t>
      </section>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanisms needs to improve the validation accuracy upon existing intra-domain SAV mechanisms. In a static network, improper block <bcp14>MUST</bcp14> be avoided to guarantee that legitimate traffic will not be blocked. Improper permit <bcp14>SHOULD</bcp14> be reduced as much as possible so that the malicious packets with forged source addresses can be efficiently filtered. When there are network changes, the new mechanisms <bcp14>MUST</bcp14> update SAV rules efficiently for keeping the high accuracy of validaiton.</t>
      </section>
      <section anchor="working-in-incrementalpartial-deployment">
        <name>Working in Incremental/Partial Deployment</name>
        <t>The new intra-domain SAV mechanisms <bcp14>SHOULD NOT</bcp14> assume pervasive adoption. Some routers may not be able to be easily upgraded for supporting the new SAV mechanism due to their limitations of capabilities, versions, or vendors. The mechanisms <bcp14>SHOULD</bcp14> be able to provide protection even when it is partially deployed. The effectiveness of protection for the new intra-domain SAV mechanisms under partial deployment <bcp14>SHOULD</bcp14> be no worse than existing mechanisms.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>Network changes may cause SAV rules to be inaccurate and need to be updated. The new intra-domain SAV mechanism <bcp14>MUST</bcp14> consider how to update SAV rules quickly so as to minimize improper block and improper permit impacts during convergence.</t>
      </section>
      <section anchor="necessary-security-guarantee">
        <name>Necessary Security Guarantee</name>
        <t>Necessary security tools <bcp14>SHOULD</bcp14> be contained in the new intra-domain SAV mechanisms. In an insecure scenario, these security tools can help protect the SAV rule generation process.</t>
      </section>
    </section>
    <section anchor="sec-scope">
      <name>Intra-domain SAV Scope</name>
      <t>The new intra-domain SAV mechanisms work in the same scenarios as existing intra-domain SAV mechanisms. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: including both forwarding based on global routing table and CE site forwarding of VPN.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): focusing on the validation of the outer layer IP address.</t>
        </li>
        <li>
          <t>Validating both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>
          <t>Non-IP packets: including MPLS label-based forwarding and other non-IP-based forwarding.</t>
        </li>
      </ul>
      <t>In addition, the new intra-domain SAV mechanisms <bcp14>SHOULD</bcp14> avoid data-plane packet modification. Existing architectures or protocols or mechanisms can be used in the new SAV mechanisms to achieve better SAV function.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The new intra-domain SAV mechanisms <bcp14>MUST NOT</bcp14> introduce additional security vulnerabilities or confusion to the existing intra-domain architectures or control or management plane protocols. Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanisms <bcp14>SHOULD</bcp14> ensure integrity and authentication of protocol packets that deliver the required SAV information.</t>
      <t>The new intra-domain SAV mechanisms do not provide protection against compromised or misconfigured routers that poison existing control plane protocols. Such routers can not only disrupt the SAV function, but also affect the entire routing domain.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Barry Greene, Fang Gao, Kotikalapudi Sriram, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, Libin Liu, John O'Brien, Roland Dobbins, Xiangqing Chang, etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="nist-rec" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation&quot;">
          <front>
            <title>Resilient Interdomain Traffic Exchange - BGP Security and DDos Mitigation</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="RFC6890" target="https://www.rfc-editor.org/info/rfc6890" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6890.xml">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
      </references>
    </references>
    <?line 329?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
