<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-08" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-08"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="21"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 90?>

<t>This document provides the gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 94?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is important for defending against source address spoofing attacks. A multi-fence architecture called Source Address Validation Architecture (SAVA) <xref target="RFC5210"/> was proposed to implement SAV at three levels: access network SAV, intra-domain SAV, and inter-domain SAV. When SAV has not been adopted by every source/host, the multi-fence architecture helps enhance the effectiveness of SAV across the whole Internet by preventing or mitigating source address spoofing.</t>
      <t>Specifically, access network SAV can ensure that a host must use the source IP address assigned to the host. By deploying access network SAV, hosts in the corresponding access network cannot forge a source address of another host. There are many mechanisms for SAV in access networks. Static ACL rules can be manually configured for validation by specifying which source addresses are acceptable or unacceptable. Dynamic ACL is another efficient mechanism which is associated with authentication servers (e.g., RADIUS and DIAMETER). The servers receive access requests and then install or enable ACL rules on the device to permit particular users' packets. SAVI <xref target="RFC7039"/> represents a kind of mechanism enforcing that the valid source IP address of a host matches the link-layer property of the host's network attachment. For example, SAVI solution for DHCP <xref target="RFC7513"/> creates a binding between a DHCPv4/DHCPv6-assigned IP address and a link-layer property (like MAC address or switch port) on a SAVI device. IP Source Guard (IPSG) <xref target="IPSG"/> combined with DHCP snooping is an implementation of SAVI solution for DHCP. Cable Source-Verify <xref target="cable-verify"/> also shares some features of SAVI and is used in cable modem networks. Cable modem termination system (CMTS) devices with Cable Source-Verify maintain the bindings of the CPE's IP address, the CPE's MAC address, and the corresponding cable modem identifier. When receiving a packet from a host, the device can check the validity of source IP address according to the bindings.</t>
      <t>Given numerous access networks managed by different operators throughout the world, it is difficult to require all access networks to deploy SAV simultaneously. Therefore, intra-domain SAV and inter-domain SAV are needed to block source-spoofed data packets from access networks as close to the source as possible. Intra-domain SAV and inter-domain SAV perform SAV at the granularity of IP prefixes, which is coarser than the granularity of access network SAV (i.e., IP address), as an IP prefix covers a range of IP addresses.</t>
      <t>This document focuses on the analysis of intra-domain SAV. In contrast to inter-domain SAV, intra-domain SAV does not require collaboration between different ASes. Intra-domain SAV rules can be generated by the AS itself. Consider an AS X which provides its host networks or customer networks with the connectivity to the rest of the Internet. Intra-domain SAV for AS X aims at achieving two goals without collaboration with other ASes: i) blocking source-spoofed packets originated from its host networks or customer networks using a source address of other networks; and ii) blocking source-spoofed packets coming from other ASes using a source address of AS X.</t>
      <t><xref target="intra-domain"/> illustrates the goals and function of intra-domain SAV with two cases. Case i shows that the host network or customer network of AS X originates source-spoofed packets using a source address of other networks. If AS X deploys intra-domain SAV, the spoofed packets can be blocked by host-facing routers or customer-facing routers of AS X (i.e., Goal i). Case ii shows that AS X receives source-spoofed packets using a source address of AS X from other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the spoofed packets from AS Y can be blocked by AS border routers of AS X (i.e., Goal ii).</t>
      <figure anchor="intra-domain">
        <name>An example for illustrating intra-domain SAV</name>
        <artwork><![CDATA[
Case i: The host network or customer network of AS X originates    
        packets spoofing source addresses of other networks        
Goal i: If AS X deploys intra-domain SAV,                          
        the spoofed packets can be blocked by AS X                 
                                                                   
                                    Spoofed packets                
                                    using source addresses         
  +-------------------------------+ of other networks     +------+ 
  | Host/Customer Network of AS X |---------------------->| AS X | 
  +-------------------------------+                       +------+ 
                                                                                                                                      
Case ii: AS X receives packets spoofing source addresses of AS X   
         from other ASes (e.g., AS Y)                              
Goal ii: If AS X deploys intra-domain SAV,                         
         the spoofed packets can be blocked by AS X                
                                                                   
           Spoofed packets                                         
           using source addresses                                  
  +------+ of AS X               +------+                          
  | AS X |<----------------------| AS Y |                          
  +------+                       +------+                          
]]></artwork>
      </figure>
      <t>The scope of intra-domain SAV includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: including both forwarding based on global routing table and CE site forwarding of VPN.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): focusing on the validation of the outer layer IP address.</t>
        </li>
        <li>
          <t>Validating both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>
          <t>Non-IP packets: including MPLS label-based forwarding and other non-IP-based forwarding.</t>
        </li>
      </ul>
      <t>There are many mechanisms for intra-domain SAV. This document provides the gap analysis of existing intra-domain SAV mechanisms. According to the gap analysis, the document concludes the main problems of existing intra-domain SAV mechanisms and describes the requirements for future ones.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions and is inferred from the SAV Information Base.</t>
        <t>Host-facing Router: An intra-domain router facing an intra-domain host network.</t>
        <t>Customer-facing Router: An intra-domain router facing an intra-domain customer network.</t>
        <t>AS Border Router: An intra-domain router facing an external AS.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Existing Mechanisms</name>
      <t>This section briefly introduces existing intra-domain SAV mechanisms. Particularly, ingress filtering (i.e., BCP38 <xref target="RFC2827"/> and BCP84 <xref target="RFC3704"/>) is the best current practice for intra-domain SAV.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering <xref target="RFC2827"/> is a typical mechanism for intra-domain SAV. It requires that network operators manually configure ACL rules on intra-domain routers to block or permit data packets using specific source addresses. This mechanism can be used on interfaces of host-facing or customer-facing routers facing an intra-domain host/customer network to prevent the corresponding host/customer network from spoofing source prefixes of other networks <xref target="manrs-antispoofing"/>. In addition, it is also usually used on interfaces of AS border routers facing an external AS to block data packets using disallowed source addresses, such as internal source addresses owned by the local AS <xref target="nist-rec"/>. In any application scenario, ACL rules must be updated in time to be consistent with the latest filtering criteria when the network changes.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> is another typical intra-domain SAV mechanism. It is typically used on interfaces of host-facing or customer-facing routers facing an intra-domain host/customer network. Routers deploying strict uRPF accept a data packet only when i) the local FIB contains a prefix covering the packet's source address and ii) the corresponding outgoing interface for the prefix in the FIB matches the packet's incoming interface. Otherwise, the packet will be blocked.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> uses a pretty looser validation method which loses the directionality. A packet will be accepted if the router's local FIB contains a prefix covering the packet's source address regardless of the interface from which the packet is received. In fact, interfaces of AS border routers facing an external AS may use loose uRPF to block incoming data packets using non-global addresses <xref target="nist-rec"/>.</t>
        </li>
        <li>
          <t>Carrier Grade NAT has some operations on the source addresses of packets, but it is not an anti-spoofing tool, as described in <xref target="manrs-antispoofing"/>. If the source address of a packet is in the INSIDE access list, the NAT rule can translate the source address to an address in the pool OUTSIDE. The NAT rule cannot determine whether the source address is spoofed or not. In addition, the packet using a spoofed source address will still be forwarded if the spoofed source address is not included in the INSIDE access list. Therefore, Carrier Grade NAT cannot help identify and block source-spoofed data packets.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>Towards the two goals of intra-domain SAV in <xref target="intra-domain"/>, intra-domain SAV is commonly deployed on host-facing routers, customer-facing routers, and AS border routers. This section elaborates the key problems of SAV on host-facing or customer-facing routers and SAV on AS border routers, respectively. Since existing intra-domain SAV mechanisms either require high operational overhead or have limitations in accuracy, they will improperly block data packets using a legitimate source address (i.e., improper block) or improperly permit data packets using a spoofed source address (i.e., improper permit).</t>
      <section anchor="sav-on-host-facing-or-customer-facing-routers">
        <name>SAV on Host-facing or Customer-facing Routers</name>
        <t>Towards Goal i in <xref target="intra-domain"/>, intra-domain SAV is typically deployed on interfaces of host-facing or customer-facing routers facing an intra-domain host/customer network to validate data packets originated from that network, since SAV is more effective when deployed closer to the source.</t>
        <t>As described previously, ACL rules can be configured on such interfaces for ingress filtering. These ACL rules must be manually updated according to prefix changes or topology changes in a timely manner. Otherwise, if ACL rules are not updated in time, improper block or improper permit problems may occur. To ensure the accuracy of ACL rules in dynamic networks, high operational overhead will be induced to achieve timely updates for ACL configurations.</t>
        <t>Strict uRPF can also be used for SAV on host-facing or customer-facing routers. It can generate and update SAV rules in an automatic way but it will cause improper blocks in the scenario of asymmetric routing or hidden prefix.</t>
        <section anchor="asymmetric-routing">
          <name>Asymmetric Routing</name>
          <t><xref target="multi-home"/> shows asymmetric routing in a multi-homing scenario. In the figure, Network 1 is a host/customer network of the AS. It owns prefix 2001:db8::/32 <xref target="RFC6890"/> and is attached to two intra-domain routers, i.e., Router 1 and Router 2. For the load balance purpose of traffic flowing to Network 1, Network 1 expects the incoming traffic destined for the sub-prefix 2001:db8:8000::/33 to come only from Router 1 and the incoming traffic destined for the other sub-prefix 2001:db8::/33 to come only from Router 2. To this end, Router 1 only learns the route to sub-prefix 2001:db8:8000::/33 from Network 1, while Router 2 only learns the route to the other sub-prefix 2001:db8::/33 from Network 1. Then, Router 1 and Router 2 distribute the sub-prefix information to routers in the AS through intra-domain routing protocols such as OSPF or IS-IS. Finally, Router 1 learns the route to 2001:db8::/33 from Router 3, and Router 2 learns the route to 2001:db8:8000::/33 from Router 3. The FIBs of Router 1 and Router 2 are shown in the figure. Although Network 1 does not expect traffic destined for 2001:db8::/33 to come from Router 1, it may send traffic with source addresses of prefix 2001:db8::/33 to Router 1 for load balance of traffic originated from Network 1. As a result, there is asymmetric routing of data packets between Network 1 and Router 1. Arrows in the figure indicate the flowing direction of traffic. Similarly, Network 1 may also send traffic with source addresses of prefix 2001:db8:8000::/33 to Router 2, resulting in asymmetric routing between Network 1 and Router 2. In addition to the traffic engineering mentioned above, other factors may also cause similar asymmetric routing between host-facing/customer-facing routers and host/customer networks.</t>
          <figure anchor="multi-home">
            <name>Asymmetric routing in multi-homing scenario</name>
            <artwork><![CDATA[
 +---------------------------------------------------------+
 |                                                      AS |
 |                     +----------+                        |
 |                     | Router 3 |                        |
 |                     +----------+                        |
 |                       /      \                          |
 |                      /        \                         |
 |                     /          \                        |
 |             +----------+     +----------+               |
 |             | Router 1 |     | Router 2 |               |
 |             +-----+#+--+     +-+#+------+               |
 |                   /\           /                        |
 |Traffic with        \          / Traffic with            |
 |source IP addresses  \        /  destination IP addresses|
 |of 2001:db8::/33      \      \/  of 2001:db8::/33        |
 |                  +----------------+                     |
 |                  |  Host/Customer |                     |
 |                  |    Network 1   |                     |
 |                  |(2001:db8::/32) |                     |
 |                  +----------------+                     |
 |                                                         |
 +---------------------------------------------------------+

 FIB of Router 1                 FIB of Router 2
 Dest               Next_hop     Dest               Next_hop
 2001:db8:8000::/33 Network 1    2001:db8:8000::/33 Router 3
 2001:db8::/33      Router 3     2001:db8::/33      Network 1

 The legitimate traffic originated from Network 1 with source IP 
 addresses of 2001:db8::/33 will be improperly blocked by Router 1 
 if Router 1 uses strict uRPF.
]]></artwork>
          </figure>
          <t>Strict uRPF takes the entries in FIB for SAV. It will improperly block data packets which use legitimate source addresses when asymmetric routing exists. In the figure, if Router 1 uses strict uRPF on interface '#', the SAV rule is that Router 1 only accepts packets with source addresses of 2001:db8:8000::/33 from Network 1. Therefore, when Network 1 sends packets with source addresses of 2001:db8::/33 to Router 1, strict uRPF at Router 1 will improperly block these legitimate packets. Similarly, when Router 2 uses strict uRPF on its interface '#' and receives packets with source addresses of prefix 2001:db8:8000::/33 from Network 1, it will also improperly block these legitimate packets because strict uRPF at Router 2 will only accept packets from Network 1 using source addresses of prefix 2001:db8::/33.</t>
        </section>
        <section anchor="hidden-prefix">
          <name>Hidden Prefix</name>
          <t>For special business purposes, a host/customer network will originate data packets using a source address that is not distributed through intra-domain routing protocol. In other words, the IP address/prefix is hidden from intra-domain routing protocol and intra-domain routers. In this scenario, strict uRPF on host-facing or customer-facing routers will improperly block data packets from the host/customer network using source addresses in a hidden prefix.</t>
          <figure anchor="hidden">
            <name>Hidden prefix in CDN and DSR scenario</name>
            <artwork><![CDATA[
          +-------------------------+                             
          |          AS Y           | AS Y announces the route    
          |   (where the anycast    | for anycast prefix P3
          |    server is located)   | in BGP                            
          +-----------+-------------+                             
                      |                                           
                      |                                           
          +-----------+-------------+                             
          |       Other ASes        |                             
          +-------------------------+                             
             /                    \                               
            /                      \                              
           /                        \                             
+------------------+   +---------------------------------------+   
|      AS Z        |   |         +----------+             AS X |   
| (where the user  |   |         | Router 4 |                  |   
|    is located)   |   |         +----------+                  |   
+------------------+   |              |                        |   
                       |              |                        |   
                       |         +----+-----+                  |   
                       |         | Router 5 |                  |   
                       |         +----#-----+                  |   
                       |              /\    DSR responses with |   
                       |              |     source IP addresses|   
                       |              |     of P3              |   
                       |       +---------------+               |   
                       |       | Host/Customer |               |   
                       |       |   Network 2   |               |   
                       |       |     (P2)      |               |   
                       |       +---------------+               |   
                       | (where the edge server is located)    |   
                       +---------------------------------------+   
DSR response packets from edge server in Network 2 with 
source IP addresses of P3 (i.e., the anycast prefix) will 
be improperly blocked by Router 5 if Router 5 uses strict uRPF.
]]></artwork>
          </figure>
          <t>The Content Delivery Networks (CDN) and Direct Server Return (DSR) scenario is a representative example of hidden prefix. In this scenario, the edge server in an AS will send DSR response packets using a source address of the anycast server which is located in another remote AS. However, the source address of anycast server is hidden from intra-domain routing protocol and intra-domain routers in the local AS. While this is an inter-domain scenario, we note that DSR response packets may also be improperly blocked by strict uRPF when edge server is located in the host/customer network. For example, in <xref target="hidden"/>, assume edge server is located in Host/Customer Network 2 and Router 5 only learns the route to P2 from Network 2. When edge server receives the request from the remote anycast server, it will directly return DSR response packets using the source address of anycast server (i.e., P3). If Router 5 uses strict uRPF on interface '#', the SAV rule is that Router 5 only accepts packets with source addresses of P2 from Network 2. As a result, DSR response packets will be blocked by strict uRPF on interface '#'. In addition, loose uRPF on this interface will also improperly block DSR response packets if prefix P3 is not in the FIB of Router 5.</t>
        </section>
      </section>
      <section anchor="sav-on-as-border-routers">
        <name>SAV on AS Border Routers</name>
        <t>Towards Goal ii in <xref target="intra-domain"/>, intra-domain SAV is typically deployed on interfaces of AS border routers facing an external AS to validate packets arriving from other ASes. <xref target="inbound-SAV"/> shows an example of SAV on AS border routers. In the figure, Router 3 and Router 4 deploy intra-domain SAV on interface '#' for validating data packets coming from external ASes.</t>
        <figure anchor="inbound-SAV">
          <name>An example of SAV on AS border routers</name>
          <artwork><![CDATA[
 Packets with +              Packets with +
 spoofed P1/P2|              spoofed P1/P2|
+-------------|---------------------------|---------+
|   AS        \/                          \/        |
|         +--+#+-----+               +---+#+----+   |
|         | Router 3 +---------------+ Router 4 |   |
|         +----------+               +----+-----+   |
|          /        \                     |         |
|         /          \                    |         |
|        /            \                   |         |
| +----------+     +----------+      +----+-----+   |
| | Router 1 |     | Router 2 |      | Router 5 |   |
| +----------+     +----------+      +----+-----+   |
|        \             /                  |         |
|         \           /                   |         |
|          \         /                    |         |
|       +---------------+         +-------+-------+ |
|       |   Customer    |         |     Host      | |
|       |   Network     |         |   Network     | |
|       |     (P1)      |         |     (P2)      | |
|       +---------------+         +---------------+ |
|                                                   |
+---------------------------------------------------+
]]></artwork>
        </figure>
        <t>ACL-based ingress filtering is usually used for this purpose. By configuring specified ACL rules, data packets that use disallowed source addresses (e.g., non-global addresses or internal source addresses) can be blocked at AS border routers. As mentioned above, ACL-based ingress filtering requires manual updates when internal source prefixes change dynamically. If ACL rules are not updated in time, there may be improper block or improper permit problems. The operational overhead of maintaining updated ACL rules will be extremely high when there are multiple AS border routers adopting SAV as shown in <xref target="inbound-SAV"/>.</t>
        <t>In addition to ACL-based ingress filtering, loose uRPF is also often used for SAV on AS border routers and is more adaptive than ACL-based rules. But it sacrifices the directionality of SAV and has limited blocking capability, because it allows packets with source addresses that exist in the FIB table on all router interfaces.</t>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>Accurate validation and low operational overhead are two important design goals of intra-domain SAV mechanisms. However, as analyzed above, existing intra-domain SAV mechanisms have problems of inaccurate validation or high operational overhead.</t>
      <t>ACL-based ingress filtering relies on manual configurations and thus requires high operational overhead in dynamic networks. To guarantee accuracy of ACL-based SAV, network operators have to manually update the ACL-based filtering rules in time when the prefix or topology changes. Otherwise, improper block or improper permit problems may appear.</t>
      <t>Strict uRPF can automatically update SAV rules, but may improperly block legitimate traffic under asymmetric routing scenario or hidden prefix scenario. The root cause is that strict uRPF uses the router's local FIB to determine the valid incoming interface for a specific source address, which may not match the real incoming direction from the source, due to the existence of asymmetric routes. Hence, it may mistakenly consider a valid incoming interface as invalid, resulting in improper block problems; or it may mistakenly consider an invalid incoming interface as valid, resulting in improper permit problems.</t>
      <t>Loose uRPF is also an automated SAV mechanism but its SAV rules are overly loose. Most spoofed packets will be improperly permitted by loose uRPF.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section lists the requirements which can be a guidance for narrowing the gaps of existing intra-domain SAV mechanisms. The requirements can be fully or partially fulfilled when designing new intra-domain SAV mechanisms. The new intra-domain SAV mechanisms <bcp14>SHOULD</bcp14> avoid data-plane packet modification. Existing architectures or protocols or mechanisms can be used in the new SAV mechanisms to achieve better SAV function.</t>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be able to automatically adapt to network dynamics such as routing changes or prefix changes, instead of purely relying on manual update.</t>
      </section>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanism need to improve the validation accuracy upon existing intra-domain SAV mechanisms. In a static network, improper block <bcp14>MUST</bcp14> be avoided to guarantee that legitimate traffic will not be blocked. Improper permit <bcp14>SHOULD</bcp14> be reduced as much as possible so that the malicious packets with forged source addresses can be efficiently filtered. When there are network changes, the new mechanisms <bcp14>MUST</bcp14> update SAV rules efficiently for keeping the high accuracy of validation.</t>
      </section>
      <section anchor="working-in-incrementalpartial-deployment">
        <name>Working in Incremental/Partial Deployment</name>
        <t>The new intra-domain SAV mechanism <bcp14>SHOULD NOT</bcp14> assume pervasive adoption, and some routers that intend to adopt the new mechanism may not be able to be upgraded immediately. The new intra-domain SAV mechanism <bcp14>SHOULD</bcp14> be able to provide incremental protection when it is incrementally deployed. The effectiveness of the new intra-domain SAV mechanism under incremental deployment <bcp14>SHOULD</bcp14> be no worse than existing ones.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> adapt to prefix changes, route changes, and topology changes in an intra-domain network, and update SAV rules in a timely manner. In addition, it <bcp14>MUST</bcp14> consider how to update SAV rules proactively or reactively so as to minimize improper blocks during convergence.</t>
      </section>
      <section anchor="necessary-security-guarantee">
        <name>Necessary Security Guarantee</name>
        <t>Necessary security tools <bcp14>SHOULD</bcp14> be considered in the new intra-domain SAV mechanism. These security tools can help protect the SAV rule generation process. <xref target="sec-security"/> details the security scope and considerations for the new intra-domain SAV mechanism.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The new intra-domain SAV mechanisms should not introduce additional security vulnerabilities or confusion to the existing intra-domain architectures or control or management plane protocols.</t>
      <t>Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanisms should ensure integrity and authentication of protocol messages that deliver the required SAV information, and consider avoiding unintentional misconfiguration. It is not necessary to provide protection against compromised or malicious intra-domain routers which poison existing control or management plane protocols. Compromised or malicious intra-domain routers may not only affect SAV, but also disrupt the whole intra-domain routing domain. Security solutions to prevent these attacks are beyond the capability of intra-domain SAV.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Barry Greene, Fang Gao, Kotikalapudi Sriram, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, Libin Liu, John O'Brien, Roland Dobbins, Xiangqing Chang, Tony Przygienda, Yingzhen Qu, Changwang Lin, etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="RFC6890" target="https://www.rfc-editor.org/info/rfc6890" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6890.xml">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="nist-rec" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation&quot;">
          <front>
            <title>Resilient Interdomain Traffic Exchange - BGP Security and DDoS Mitigation</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 382?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
