<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-05" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-05"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2024" month="August" day="05"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 90?>

<t>This document provides the gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 94?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is important for defending against source address spoofing attacks and allowing accurate traceback. A multi-fence architecture called Source Address Validation Architecture (SAVA) <xref target="RFC5210"/> was proposed to validate source addresses at three levels: access network SAV, intra-domain SAV, and inter-domain SAV. When SAV is not fully enabled at the edge of the Internet, the multi-fence architecture can help enhance the validation across the whole Internet and thus reduce the opportunities of launching source address spoofing attacks.</t>
      <t>Particularly, access network SAV ensures that a host uses a valid address assigned to the host statically or dynamically. In this way, the host cannot use the source address of another host. There are many mechanisms for SAV in access networks. Static ACL rules can be manually configured for validation by specifying which source addresses are acceptable or unacceptable. Dynamic ACL is another efficient mechanism which is associated with authentication servers (e.g., RADIUS and DIAMETER). The servers receive access requests and then install or enable ACL rules on the device to permit particular users' packets. SAVI <xref target="RFC7039"/> represents a kind of mechanism enforcing that the legitimate IP address of a host matches the link-layer property of the host's network attachment. For example, SAVI solution for DHCP <xref target="RFC7513"/> creates a binding between a DHCPv4/DHCPv6-assigned IP address and a link-layer property (like MAC address or switch port) on a SAVI device. IP Source Guard (IPSG) <xref target="IPSG"/> combined with DHCP snooping is an implementation of SAVI solution for DHCP. Cable Source-Verify <xref target="cable-verify"/> also shares some features of SAVI and is used in cable modem networks. Cable modem termination system (CMTS) devices with Cable Source-Verify maintain the bindings of the CPE's IP address, the CPE's MAC address, and the corresponding cable modem identifier. When receiving packets, the device will check the validity of the packets according to the bindings.</t>
      <t>Given numerous access networks managed by different operators throughout the world, it is difficult to require all access networks to effectively deploy SAV. Therefore, intra-domain SAV and inter-domain SAV are needed to block spoofing traffic as close to the source as possible. Both intra-domain SAV and inter-domain SAV usually perform validation at the granularity of IP prefixes, which is coarser than the validation granularity of access network SAV, as an IP prefix covers a range of IP addresses.</t>
      <t>This document focuses on the analysis of intra-domain SAV. In contrast to inter-domain SAV, intra-domain SAV does not require collaboration between different ASes. The SAV rules can be generated by the AS itself. Consider an AS X which provides its host networks or customer networks with the connectivity to other ASes. The intra-domain SAV for AS X has two goals: i) blocking the illegitimate packets originating from its host networks or customer networks with spoofed source addresses; and ii) blocking the illegitimate packets coming from other ASes which spoof the source addresses of AS X.</t>
      <t><xref target="intra-domain"/> illustrates the function of intra-domain SAV with two cases. Case i shows that AS X forwards source-spoofed packets originating from its host networks or customer networks to other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the source-spoofed packets from its host networks or customer networks can be blocked by AS X itself (i.e., Goal i). Case ii shows that AS X receives the packets which spoof AS X's source addresses from other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the spoofed packets from AS Y can be blocked by AS X (i.e., Goal ii).</t>
      <figure anchor="intra-domain">
        <name>An example for illustrating intra-domain SAV</name>
        <artwork><![CDATA[
Case i: AS X forwards spoofed packets originating from its 
        host networks or customer networks to other ASes (e.g., AS Y)
Goal i: If AS X deploys intra-domain SAV, 
        the spoofed packets can be blocked by AS X

  +------+  Spoofed packets  +------+
  | AS X |------------------>| AS Y |
  +------+                   +------+


Case ii: AS X receives packets spoofing 
         AS X's source addresses from other ASes (e.g., AS Y)
Goal ii: If AS X deploys intra-domain SAV,
         the spoofed packets can be blocked by AS X

  +------+  Spoofed packets  +------+
  | AS X |<------------------| AS Y |
  +------+                   +------+
]]></artwork>
      </figure>
      <t>There are many mechanisms for intra-domain SAV. This document provides the gap analysis of existing intra-domain SAV mechanisms. According to the gap analysis, the document concludes the main problems of existing mechanisms and describes the requirements for future intra-domain SAV mechanisms.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions and is inferred from the SAV Information Base.</t>
        <t>SAV Table: The table or data structure that implements the SAV rules and is used for source address validation in the data plane.</t>
        <t>Host-facing Router: An intra-domain router of an AS which is connected to a host network (i.e., a layer-2 network).</t>
        <t>Customer-facing Router: An intra-domain router of an AS which is connected to a customer network running the routing protocol (i.e., a layer-3 network).</t>
        <t>AS Border Router: An intra-domain router of an AS which is connected to other ASes.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Existing Mechanisms</name>
      <t>Ingress filtering <xref target="RFC2827"/><xref target="RFC3704"/> is the current practice of intra-domain SAV. This section briefly introduces the existing intra-domain SAV mechanisms.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering <xref target="RFC2827"/><xref target="RFC3704"/> is a typical mechanism for intra-domain SAV. ACL rules can be configured for blocking or permitting packets with specific source addresses. This mechanism can be applied at the downstream interfaces of host-facing routers or customer-facing routers <xref target="manrs-antispoofing"/>. The validation at downstream interfaces will prevent the corresponding host networks or customer networks from spoofing source prefixes of other networks. In addition, at the upstream interfaces of AS border routers, ACL can be enabled for blocking packets with disallowed source prefixes, such as the internal source prefixes owned by the AS <xref target="nist-rec"/>. In any application scenario, ACL rules should be updated in time to be consistent with the latest filtering criteria.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> is another commonly used mechanism for SAV in intra-domain networks. Routers deploying strict uRPF accept a data packet only when i) the local FIB contains a prefix encompassing the packet's source address and ii) the corresponding outgoing interface for the prefix in the FIB matches the packet's incoming interface. Otherwise, the packet will be blocked. Strict uRPF is usually used at downstream interfaces of host-facing routers or customer-facing routers.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> takes a looser validation mechanism than strict uRPF to avoid improper block. A packet will be accepted if the local FIB contains a prefix encompassing the packet's source address regardless of the interface from which the packet is received. Upstream interfaces of AS border routers can enable loose uRPF for blocking non-global addresses <xref target="nist-rec"/>.</t>
        </li>
        <li>
          <t>Carrier Grade NAT has some operations on the source addresses of packets, but is not an anti-spoofing tool, as described in <xref target="manrs-antispoofing"/>. If the source address of a packet is in the INSIDE access list, the NAT rule can translate the source address to an address in the pool OUTSIDE. The NAT rule cannot judge whether the source address is spoofed or not. In addition, the packet with a spoofed source address will be forwarded directly if the spoofed source address is not included in the INSIDE access list. Therefore, Carrier Grade NAT cannot help block or traceback spoofed packets, and other SAV mechanisms are still needed.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>Existing intra-domain SAV mechanisms either require high operational overhead or have limitations in accuracy. They may improperly block the traffic with legitimate source addresses (i.e., improper block) or improperly permit the traffic with spoofed source addresses (i.e., improper permit).</t>
      <section anchor="sav-on-host-facing-or-customer-facing-routers">
        <name>SAV on Host-facing or Customer-facing Routers</name>
        <t>Towards the Goal i in <xref target="intra-domain"/>, intra-domain SAV is typically adopted at downstream interfaces of host-facing or customer-facing routers to validate packets from intra-domain host networks or customer networks, since it is most effective closer to the edges of the Internet. As described previously, ACL rules can be configured at downstream interfaces for ingress filtering. These rules need to be updated when prefixes or topologies of host networks or customer networks change. If ACL rules are not updated in time, improper block or improper permit may occur. To ensure the accuracy of SAV in dynamic networks, high operational overhead will be induced to achieve timely updates for ACL configurations.</t>
        <t>Strict uRPF can also be used for SAV on host-facing or customer-facing routers, but there may be improper block problem in multi-homing and asymmetric routing scenario. <xref target="multi-home"/> shows such a case. In the figure, Network 1 is a host/customer network of the AS. It owns prefix 192.0.2.0/24 <xref target="RFC6890"/> and is attached to two intra-domain edge routers, i.e., Router 1 and Router 2. For the load balance purpose of traffic flowing to Network 1, Network 1 expects the incoming traffic destined for the sub-prefix 192.0.2.128/25 to come only from Router 1 and the incoming traffic destined for the other sub-prefix 192.0.2.0/25 to come only from Router 2. To this end, Router 1 only learns the route to sub-prefix 192.0.2.128/25 from Network 1, while Router 2 only learns the route to the other sub-prefix 192.0.2.0/25 from Network 1. Then, Router 1 and Router 2 advertise the sub-prefix information to routers in the AS through intra-domain routing protocols such as OSPF or IS-IS. Finally, Router 1 learns the route to 192.0.2.0/25 from Router 3, and Router 2 learns the route to 192.0.2.128/25 from Router 3. The FIBs of Router 1 and Router 2 are shown in the figure. Although Network 1 does not expect traffic destined for 192.0.2.0/25 to come from Router 1, it may send traffic with source addresses of prefix 192.0.2.0/25 to Router 1 for load balance of traffic originating from Network 1. As a result, there is asymmetric routing of data packets between Network 1 and Router 1. Arrows in the figure indicate the direction of traffic. Similarly, Network 1 may also send traffic with source addresses of prefix 192.0.2.128/25 to Router 2, resulting in asymmetric routing between Network 1 and Router 2.</t>
        <figure anchor="multi-home">
          <name>Asymmetric routing in the multi-homing scenario</name>
          <artwork><![CDATA[
 +---------------------------------------------------------------+
 |                                                           AS  |
 |                         +----------+                          |
 |                         | Router 3 |                          |
 |FIB of Router 1          +----------+  FIB of Router 2         |
 |Dest           Next_hop    /      \    Dest           Next_hop |
 |192.0.2.128/25 Network 1  /        \   192.0.2.0/25   Network 1|
 |192.0.2.0/25   Router 3  /          \  192.0.2.128/25 Router 3 |
 |                  +----------+     +----------+                |
 |                  | Router 1 |     | Router 2 |                |
 |                  +-----+#+--+     +-+#+------+                |
 |                        /\           /                         |
 |     Traffic with        \          / Traffic with             |
 |     source IP addresses  \        /  destination IP addresses |
 |     of 192.0.2.0/25       \      \/  of 192.0.2.0/25          |
 |                      +----------------+                       |
 |                      |  Host/Customer |                       |
 |                      |    Network 1   |                       |
 |                      | (192.0.2.0/24) |                       |
 |                      +----------------+                       |
 |                                                               |
 +---------------------------------------------------------------+

 The legitimate traffic originating from Network 1 with source IP 
 addresses of 192.0.2.0/25 will be improperly blocked by Router 1 
 if Router 1 uses strict uRPF.
]]></artwork>
        </figure>
        <t>Strict uRPF takes the entries in FIB for SAV. It can improperly block data packets that use legitimate source IP addresses when asymmetric routing exists. In the figure, if Router 1 applies strict uRPF at interface '#', the SAV rule is that Router 1 only accepts packets with source addresses of 192.0.2.128/25 from Network 1. Therefore, when Network 1 sends packets with source addresses of 192.0.2.0/25 to Router 1, strict uRPF at Router 1 will improperly block these legitimate packets. Similarly, when Router 2 with strict uRPF deployed receives packets with source addresses of prefix 192.0.2.128/25 from Network 1, it will also improperly block these legitimate packets because strict uRPF at Router 2 will only accept packets from Network 1 using source addressses of prefix 192.0.2.0/25. Therefore, strict uRPF may cause improper block problem in the case of asymmetric routing.</t>
      </section>
      <section anchor="sav-on-as-border-routers">
        <name>SAV on AS Border Routers</name>
        <t>Towards the Goal ii in <xref target="intra-domain"/>, intra-domain SAV is typically adopted at upstream interfaces of AS border routers to validate the packets from other ASes. <xref target="inbound-SAV"/> shows an example of SAV on AS border routers. In the figure, Router 3 and Router 4 deploy SAV mechanisms at interface '#' for validating data packets coming from external ASes.</t>
        <t>ACL-based ingress filtering is usually used for this purpose. By configuring specified ACL rules, data packets that use disallowed source addresses (e.g., non-global addresses or the internal source prefixes) can be blocked at AS border routers. As mentioned above, ACL-based ingress filtering requires timely updates when the routing status changes dynamically. When the ACL rules are not updated in time, there may be improper block or improper permit problems. The operational overhead of maintaining updated ACL rules will be extremely high when there are multiple AS border routers adopting SAV as shown in <xref target="inbound-SAV"/>.</t>
        <t>In addition to ACL-based ingress filtering, loose uRPF is also often used for SAV on AS border routers and is more adaptive than ACL-based rules. But it sacrifices the directionality of SAV and has limited blocking capability, because it allows packets with source addresses that exist in the FIB table at all router interfaces.</t>
        <figure anchor="inbound-SAV">
          <name>An example of SAV on AS border routers</name>
          <artwork><![CDATA[
 Packets with +              Packets with +
 spoofed P1/P2|              spoofed P1/P2|
+-------------|---------------------------|---------+
|   AS        \/                          \/        |
|         +--+#+-----+               +---+#+----+   |
|         | Router 3 +---------------+ Router 4 |   |
|         +----------+               +----+-----+   |
|          /        \                     |         |
|         /          \                    |         |
|        /            \                   |         |
| +----------+     +----------+      +----+-----+   |
| | Router 1 |     | Router 2 |      | Router 5 |   |
| +----------+     +----------+      +----+-----+   |
|        \             /                  |         |
|         \           /                   |         |
|          \         /                    |         |
|       +---------------+         +-------+-------+ |
|       |     Host      |         |   Customer    | |
|       |   Network     |         |   Network     | |
|       |     (P1)      |         |     (P2)      | |
|       +---------------+         +---------------+ |
|                                                   |
+---------------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>Accurate validation and low operational overhead are two important design goals of intra-domain SAV mechanisms. As analyzed above, asymmetric routing and dynamic networks are two challenging scenarios for the two goals. In these scenarios, existing SAV mechanisms have problems of inaccurate validation or high operational overhead.</t>
      <t>ACL-based SAV relies on manual configurations and thus requires high operational overhead in dynamic networks. Operators have to manually update the ACL-based filtering rules in time when the prefix or topology changes. Otherwise, improper block or improper permit problems may appear.</t>
      <t>Strict uRPF-based SAV can automatically update SAV rules, but may improperly block legitimate traffic under asymmetric routing. The root cause is that strict uRPF leverages the local FIB table to determine the incoming interface for source addresses, which may not match the real data-plane forwarding path from the source, due to the existence of asymmetric routes. Hence, it may mistakenly consider a valid incoming interface as invalid, resulting in improper block problem; or it may consider an invalid incoming interface as valid, resulting in improper permit problem.</t>
      <t>Loose uRPF is also an automated SAV mechanism but its SAV rules are overly loose. Most spoofed packets will be improperly permitted by adopting loose uRPF.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section lists the requirements which can be a guidance for narrowing the gaps of existing intra-domain SAV mechanisms. The requirements can be fully or partially fulfilled when designing new intra-domain SAV mechanisms.</t>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanisms <bcp14>MUST</bcp14> be able to automatically adapt to network dynamics such as routing change or prefix change, instead of purely relying on manual update.</t>
      </section>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanisms needs to improve the validation accuracy upon existing intra-domain SAV mechanisms. In a static network, improper block <bcp14>MUST</bcp14> be avoided to guarantee that legitimate traffic will not be blocked. Improper permit <bcp14>SHOULD</bcp14> be reduced as much as possible so that the malicious packets with forged source addresses can be efficiently filtered. When there are network changes, the new mechanisms <bcp14>MUST</bcp14> update SAV rules efficiently for keeping the high accuracy of validaiton.</t>
      </section>
      <section anchor="working-in-incrementalpartial-deployment">
        <name>Working in Incremental/Partial Deployment</name>
        <t>The new intra-domain SAV mechanisms <bcp14>SHOULD NOT</bcp14> assume pervasive adoption. Some routers may not be able to be easily upgraded for supporting the new SAV mechanism due to their limitations of capabilities, versions, or vendors. The mechanisms <bcp14>SHOULD</bcp14> be able to provide protection even when it is partially deployed. The effectiveness of protection for the new intra-domain SAV mechanisms under partial deployment <bcp14>SHOULD</bcp14> be no worse than existing mechanisms.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>Network changes may cause SAV rules to be inaccurate and need to be updated. The new intra-domain SAV mechanism <bcp14>MUST</bcp14> consider how to update SAV rules quickly so as to minimize improper block and improper permit impacts during convergence.</t>
      </section>
      <section anchor="necessary-security-guarantee">
        <name>Necessary Security Guarantee</name>
        <t>Necessary security tools <bcp14>SHOULD</bcp14> be contained in the new intra-domain SAV mechanisms. In an insecure scenario, these security tools can help protect the SAV rule generation process.</t>
      </section>
    </section>
    <section anchor="sec-scope">
      <name>Intra-domain SAV Scope</name>
      <t>The new intra-domain SAV mechanisms work in the same scenarios as existing intra-domain SAV mechanisms. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: including both forwarding based on global routing table and CE site forwarding of VPN.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): focusing on the validation of the outer layer IP address.</t>
        </li>
        <li>
          <t>Validating both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>
          <t>Non-IP packets: including MPLS label-based forwarding and other non-IP-based forwarding.</t>
        </li>
      </ul>
      <t>In addition, the new intra-domain SAV mechanisms <bcp14>SHOULD</bcp14> avoid data-plane packet modification. Existing architectures or protocols or mechanisms can be used in the new SAV mechanisms to achieve better SAV function.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The new intra-domain SAV mechanisms <bcp14>MUST NOT</bcp14> introduce additional security vulnerabilities or confusion to the existing intra-domain architectures or control or management plane protocols. Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanisms <bcp14>SHOULD</bcp14> ensure integrity and authentication of protocol packets that deliver the required SAV information.</t>
      <t>The new intra-domain SAV mechanisms do not provide protection against compromised or misconfigured routers that poison existing control plane protocols. Such routers can not only disrupt the SAV function, but also affect the entire routing domain.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Barry Greene, Fang Gao, Kotikalapudi Sriram, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, Libin Liu, John O'Brien, Roland Dobbins, Xiangqing Chang, etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="nist-rec" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation&quot;">
          <front>
            <title>Resilient Interdomain Traffic Exchange - BGP Security and DDos Mitigation</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="RFC6890" target="https://www.rfc-editor.org/info/rfc6890" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6890.xml">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
      </references>
    </references>
    <?line 326?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
