<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-09" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-09"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="January" day="03"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 93?>

<t>This document provides the gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 97?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is important for defending against source address spoofing attacks. A multi-fence architecture called Source Address Validation Architecture (SAVA) <xref target="RFC5210"/> was proposed to implement SAV at three levels: access network SAV, intra-domain SAV, and inter-domain SAV. The multi-fence architecture helps enhance the effectiveness of SAV across the whole Internet by preventing or mitigating source address spoofing at multiple levels.</t>
      <t>Specifically, access network SAV can ensure that a host must use the source IP address assigned to the host. By deploying access network SAV, hosts in the corresponding access network cannot forge a source address of another host. There are many mechanisms for SAV in access networks. Static ACL rules can be manually configured for validation by specifying which source addresses are acceptable or unacceptable. Dynamic ACL is another efficient mechanism which is associated with authentication servers (e.g., RADIUS and DIAMETER). The servers receive access requests and then install or enable ACL rules on the device to permit particular users' packets. SAVI <xref target="RFC7039"/> represents a kind of mechanism enforcing that the valid source IP address of a host matches the link-layer property of the host's network attachment. For example, SAVI solution for DHCP <xref target="RFC7513"/> creates a binding between a DHCPv4/DHCPv6-assigned IP address and a link-layer property (like MAC address or switch port) on a SAVI device. IP Source Guard (IPSG) <xref target="IPSG"/> combined with DHCP snooping is an implementation of SAVI solution for DHCP. Cable Source-Verify <xref target="cable-verify"/> also shares some features of SAVI and is used in cable modem networks. Cable modem termination system (CMTS) devices with Cable Source-Verify maintain the bindings of the CPE's IP address, the CPE's MAC address, and the corresponding cable modem identifier. When receiving a packet from a host, the device can check the validity of source IP address according to the bindings.</t>
      <t>Given numerous access networks managed by different operators throughout the world, it is difficult to require all access networks to deploy SAV simultaneously. Therefore, intra-domain SAV and inter-domain SAV are needed to block source-spoofed data packets from access networks as close to the source as possible. Intra-domain SAV and inter-domain SAV perform SAV at the granularity of IP prefixes, which is coarser than the granularity of access network SAV (i.e., IP address), as an IP prefix covers a range of IP addresses.</t>
      <t>This document focuses on the analysis of intra-domain SAV. In contrast to inter-domain SAV, intra-domain SAV does not require collaboration between different Autonomous Systems (ASes). Intra-domain SAV rules can be generated by the AS itself. Consider an AS X which provides its host networks or customer networks with the connectivity to the rest of the Internet. Intra-domain SAV for AS X aims at achieving two goals without collaboration with other ASes: i) blocking source-spoofed packets originated from its host networks or customer networks using a source address of other networks; and ii) blocking source-spoofed packets coming from other ASes using a source address of AS X.</t>
      <t><xref target="intra-domain"/> illustrates the goals and function of intra-domain SAV with two cases. Case i shows that the host network or customer network of AS X originates source-spoofed packets using a source address of other networks. If AS X deploys intra-domain SAV, the spoofed packets can be blocked by host-facing routers or customer-facing routers of AS X (i.e., Goal i). Case ii shows that AS X receives source-spoofed packets using a source address of AS X from other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the spoofed packets from AS Y can be blocked by AS border routers of AS X (i.e., Goal ii).</t>
      <figure anchor="intra-domain">
        <name>An example for illustrating intra-domain SAV</name>
        <artwork><![CDATA[
Case i: The host network or customer network of AS X originates    
        packets spoofing source addresses of other networks        
Goal i: If AS X deploys intra-domain SAV,                          
        the spoofed packets can be blocked by AS X                 
                                                                   
                                    Spoofed packets                
                                    using source addresses         
  +-------------------------------+ of other networks     +------+ 
  | Host/Customer Network of AS X |---------------------->| AS X | 
  +-------------------------------+                       +------+ 
                                                                                                                                      
Case ii: AS X receives packets spoofing source addresses of AS X   
         from other ASes (e.g., AS Y)                              
Goal ii: If AS X deploys intra-domain SAV,                         
         the spoofed packets can be blocked by AS X                
                                                                   
           Spoofed packets                                         
           using source addresses                                  
  +------+ of AS X               +------+                          
  | AS X |<----------------------| AS Y |                          
  +------+                       +------+                          
]]></artwork>
      </figure>
      <t>The scope of intra-domain SAV includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: including both forwarding based on global routing table and VPN forwarding.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec <xref target="RFC4301"/>, GRE <xref target="RFC2784"/>, SRv6 <xref target="RFC9256"/>, etc.): focusing on the validation of the outer layer IP address.</t>
        </li>
        <li>
          <t>Validating both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>
          <t>Non-IP packets: including MPLS label-based forwarding and other non-IP-based forwarding.</t>
        </li>
      </ul>
      <t>There are many mechanisms for intra-domain SAV. This document provides the gap analysis of existing intra-domain SAV mechanisms. According to the gap analysis, the document concludes the main problems of existing intra-domain SAV mechanisms and describes the requirements for future ones.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions.</t>
        <t>Host-facing Router: An intra-domain router facing an intra-domain host network.</t>
        <t>Customer-facing Router: An intra-domain router facing an intra-domain customer network.</t>
        <t>AS Border Router: An intra-domain router facing an external AS.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Existing Mechanisms</name>
      <t>This section briefly introduces existing intra-domain SAV mechanisms. Particularly, ingress filtering (i.e., BCP38 <xref target="RFC2827"/> and BCP84 <xref target="RFC3704"/>) is the best current practice for intra-domain SAV.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering <xref target="RFC2827"/> is a typical mechanism for intra-domain SAV. It requires that network operators manually configure ACL rules on intra-domain routers to block or permit data packets using specific source addresses. This mechanism can be used on interfaces of host-facing or customer-facing routers facing an intra-domain host/customer network to prevent the corresponding host/customer network from spoofing source prefixes of other networks <xref target="manrs-antispoofing"/>. In addition, it is also usually used on interfaces of AS border routers facing an external AS to block data packets using disallowed source addresses, such as internal source addresses owned by the local AS <xref target="nist-rec"/>. In any application scenario, ACL rules must be updated in time to be consistent with the latest filtering criteria when the network changes.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> is another typical intra-domain SAV mechanism. It is typically used on interfaces of host-facing or customer-facing routers facing an intra-domain host/customer network. Routers deploying strict uRPF accept a data packet only when i) the local FIB contains a prefix covering the packet's source address and ii) the corresponding outgoing interface for the prefix in the FIB matches the packet's incoming interface. Otherwise, the packet will be blocked.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> uses a looser validation method which loses the directionality. A packet will be accepted if the router's local FIB contains a prefix covering the packet's source address regardless of the interface from which the packet is received. In fact, interfaces of AS border routers facing an external AS may use loose uRPF to block incoming data packets using non-global addresses <xref target="nist-rec"/>.</t>
        </li>
        <li>
          <t>Carrier Grade NAT has some operations on the source addresses of packets, but it is not an anti-spoofing tool, as described in <xref target="manrs-antispoofing"/>. If the source address of a packet is in the INSIDE access list, the NAT rule can translate the source address to an address in the pool OUTSIDE. The NAT rule cannot determine whether the source address is spoofed or not. In addition, the packet using a spoofed source address will still be forwarded if the spoofed source address is not included in the INSIDE access list. Therefore, Carrier Grade NAT cannot help identify and block source-spoofed data packets.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>Towards the two goals of intra-domain SAV in <xref target="intra-domain"/>, intra-domain SAV is commonly deployed on host-facing routers, customer-facing routers, and AS border routers. This section elaborates the key problems of SAV on host-facing or customer-facing routers and SAV on AS border routers, respectively. Since existing intra-domain SAV mechanisms either require high operational overhead or have limitations in accuracy, they will improperly block data packets using a legitimate source address (i.e., improper block) or improperly permit data packets using a spoofed source address (i.e., improper permit).</t>
      <section anchor="sav-on-host-facing-or-customer-facing-routers">
        <name>SAV on Host-facing or Customer-facing Routers</name>
        <t>Towards Goal i in <xref target="intra-domain"/>, intra-domain SAV is typically deployed on interfaces of host-facing or customer-facing routers facing an intra-domain host/customer network to validate data packets originated from that network, since SAV is more effective when deployed closer to the source.</t>
        <t>As described previously, ACL rules can be configured on such interfaces for ingress filtering. These ACL rules must be manually updated according to prefix changes or topology changes in a timely manner. Otherwise, if ACL rules are not updated in time, improper block or improper permit problems may occur. To ensure the accuracy of ACL rules in dynamic networks, high operational overhead will be induced to achieve timely updates for ACL configurations.</t>
        <t>Strict uRPF can also be used for SAV on host-facing or customer-facing routers. It can generate and update SAV rules in an automatic way but it will cause improper blocks in the scenario of asymmetric routing or hidden prefix.</t>
        <section anchor="asymmetric-routing">
          <name>Asymmetric Routing</name>
          <t><xref target="multi-home"/> shows asymmetric routing in a multi-homing scenario. In the figure, Network 1 is a host/customer network of the AS. It owns prefix 2001:db8::/32 <xref target="RFC6890"/> and is attached to two intra-domain routers, i.e., Router 1 and Router 2. For the load balance purpose of traffic flowing to Network 1, Network 1 expects the incoming traffic destined for the sub-prefix 2001:db8:8000::/33 to come only from Router 1 and the incoming traffic destined for the other sub-prefix 2001:db8::/33 to come only from Router 2. To this end, Router 1 only learns the route to sub-prefix 2001:db8:8000::/33 from Network 1, while Router 2 only learns the route to the other sub-prefix 2001:db8::/33 from Network 1. Then, Router 1 and Router 2 distribute the sub-prefix information to routers in the AS through intra-domain routing protocols such as OSPF or IS-IS. Finally, Router 1 learns the route to 2001:db8::/33 from Router 3, and Router 2 learns the route to 2001:db8:8000::/33 from Router 3. The FIBs of Router 1 and Router 2 are shown in the figure. Although Network 1 does not expect traffic destined for 2001:db8::/33 to come from Router 1, it may send traffic with source addresses of prefix 2001:db8::/33 to Router 1 for load balance of traffic originated from Network 1. As a result, there is asymmetric routing of data packets between Network 1 and Router 1. Arrows in the figure indicate the flowing direction of traffic. Similarly, Network 1 may also send traffic with source addresses of prefix 2001:db8:8000::/33 to Router 2, resulting in asymmetric routing between Network 1 and Router 2. In addition to the traffic engineering mentioned above, other factors may also cause similar asymmetric routing between host-facing/customer-facing routers and host/customer networks.</t>
          <figure anchor="multi-home">
            <name>Asymmetric routing in multi-homing scenario</name>
            <artwork><![CDATA[
 +---------------------------------------------------------+
 |                                                      AS |
 |                     +----------+                        |
 |                     | Router 3 |                        |
 |                     +----------+                        |
 |                       /      \                          |
 |                      /        \                         |
 |                     /          \                        |
 |             +----------+     +----------+               |
 |             | Router 1 |     | Router 2 |               |
 |             +-----+#+--+     +-+#+------+               |
 |                   /\           /                        |
 |Traffic with        \          / Traffic with            |
 |source IP addresses  \        /  destination IP addresses|
 |of 2001:db8::/33      \      \/  of 2001:db8::/33        |
 |                  +----------------+                     |
 |                  |  Host/Customer |                     |
 |                  |    Network 1   |                     |
 |                  |(2001:db8::/32) |                     |
 |                  +----------------+                     |
 |                                                         |
 +---------------------------------------------------------+

 FIB of Router 1                 FIB of Router 2
 Dest               Next_hop     Dest               Next_hop
 2001:db8:8000::/33 Network 1    2001:db8:8000::/33 Router 3
 2001:db8::/33      Router 3     2001:db8::/33      Network 1

 The legitimate traffic originated from Network 1 with source IP 
 addresses of 2001:db8::/33 will be improperly blocked by Router 1 
 if Router 1 uses strict uRPF.
]]></artwork>
          </figure>
          <t>Strict uRPF takes the entries in FIB for SAV. It will improperly block data packets which use legitimate source addresses when asymmetric routing exists. In the figure, if Router 1 uses strict uRPF on interface '#', the SAV rule is that Router 1 only accepts packets with source addresses of 2001:db8:8000::/33 from Network 1. Therefore, when Network 1 sends packets with source addresses of 2001:db8::/33 to Router 1, strict uRPF at Router 1 will improperly block these legitimate packets. Similarly, when Router 2 uses strict uRPF on its interface '#' and receives packets with source addresses of prefix 2001:db8:8000::/33 from Network 1, it will also improperly block these legitimate packets because strict uRPF at Router 2 will only accept packets from Network 1 using source addresses of prefix 2001:db8::/33.</t>
        </section>
        <section anchor="hidden-prefix">
          <name>Hidden Prefix</name>
          <t>For special business purposes, a host/customer network will originate data packets using a source address that is not distributed through intra-domain routing protocol. In other words, the IP address/prefix is hidden from intra-domain routing protocol and intra-domain routers. In this scenario, strict uRPF on host-facing or customer-facing routers will improperly block data packets from the host/customer network using source addresses in a hidden prefix.</t>
          <figure anchor="hidden">
            <name>Hidden prefix in CDN and DSR scenario</name>
            <artwork><![CDATA[
          +-------------------------+                             
          |          AS Y           | AS Y announces the route    
          |   (where the anycast    | for anycast prefix P3
          |    server is located)   | in BGP                            
          +-----------+-------------+                             
                      |                                           
                      |                                           
          +-----------+-------------+                             
          |       Other ASes        |                             
          +-------------------------+                             
             /                    \                               
            /                      \                              
           /                        \                             
+------------------+   +---------------------------------------+   
|      AS Z        |   |         +----------+             AS X |   
| (where the user  |   |         | Router 4 |                  |   
|    is located)   |   |         +----------+                  |   
+------------------+   |              |                        |   
                       |              |                        |   
                       |         +----+-----+                  |   
                       |         | Router 5 |                  |   
                       |         +----#-----+                  |   
                       |              /\    DSR responses with |   
                       |              |     source IP addresses|   
                       |              |     of P3              |   
                       |       +---------------+               |   
                       |       | Host/Customer |               |   
                       |       |   Network 2   |               |   
                       |       |     (P2)      |               |   
                       |       +---------------+               |   
                       | (where the edge server is located)    |   
                       +---------------------------------------+   
DSR response packets from edge server in Network 2 with 
source IP addresses of P3 (i.e., the anycast prefix) will 
be improperly blocked by Router 5 if Router 5 uses strict uRPF.
]]></artwork>
          </figure>
          <t>The Content Delivery Networks (CDN) and Direct Server Return (DSR) scenario is a representative example of hidden prefix. In this scenario, the edge server in an AS will send DSR response packets using a source address of the anycast server which is located in another remote AS. However, the source address of anycast server is hidden from intra-domain routing protocol and intra-domain routers in the local AS. While this is an inter-domain scenario, we note that DSR response packets may also be improperly blocked by strict uRPF when edge server is located in the host/customer network. For example, in <xref target="hidden"/>, assume edge server is located in Host/Customer Network 2 and Router 5 only learns the route to P2 from Network 2. When edge server receives the request from the remote anycast server, it will directly return DSR response packets using the source address of anycast server (i.e., P3). If Router 5 uses strict uRPF on interface '#', the SAV rule is that Router 5 only accepts packets with source addresses of P2 from Network 2. As a result, DSR response packets will be blocked by strict uRPF on interface '#'. In addition, loose uRPF on this interface will also improperly block DSR response packets if prefix P3 is not in the FIB of Router 5.</t>
        </section>
      </section>
      <section anchor="sav-on-as-border-routers">
        <name>SAV on AS Border Routers</name>
        <t>Towards Goal ii in <xref target="intra-domain"/>, intra-domain SAV is typically deployed on interfaces of AS border routers facing an external AS to validate packets arriving from other ASes. <xref target="inbound-SAV"/> shows an example of SAV on AS border routers. In the figure, Router 3 and Router 4 deploy intra-domain SAV on interface '#' for validating data packets coming from external ASes.</t>
        <figure anchor="inbound-SAV">
          <name>An example of SAV on AS border routers</name>
          <artwork><![CDATA[
 Packets with +              Packets with +
 spoofed P1/P2|              spoofed P1/P2|
+-------------|---------------------------|---------+
|   AS        \/                          \/        |
|         +--+#+-----+               +---+#+----+   |
|         | Router 3 +---------------+ Router 4 |   |
|         +----------+               +----+-----+   |
|          /        \                     |         |
|         /          \                    |         |
|        /            \                   |         |
| +----------+     +----------+      +----+-----+   |
| | Router 1 |     | Router 2 |      | Router 5 |   |
| +----------+     +----------+      +----+-----+   |
|        \             /                  |         |
|         \           /                   |         |
|          \         /                    |         |
|       +---------------+         +-------+-------+ |
|       |   Customer    |         |     Host      | |
|       |   Network     |         |   Network     | |
|       |     (P1)      |         |     (P2)      | |
|       +---------------+         +---------------+ |
|                                                   |
+---------------------------------------------------+
]]></artwork>
        </figure>
        <t>ACL-based ingress filtering is usually used for this purpose. By configuring specified ACL rules, data packets that use disallowed source addresses (e.g., non-global addresses or internal source addresses) can be blocked at AS border routers. As mentioned above, ACL-based ingress filtering requires manual updates when internal source prefixes change dynamically. If ACL rules are not updated in time, there may be improper block or improper permit problems. The operational overhead of maintaining updated ACL rules will be extremely high when there are multiple AS border routers adopting SAV as shown in <xref target="inbound-SAV"/>.</t>
        <t>In addition to ACL-based ingress filtering, loose uRPF is also often used for SAV on AS border routers and is more adaptive than ACL-based rules. But it sacrifices the directionality of SAV and has limited blocking capability, because it allows packets with source addresses that exist in the FIB table on all router interfaces.</t>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>Accurate validation and low operational overhead are two important design goals of intra-domain SAV mechanisms. However, as analyzed above, existing intra-domain SAV mechanisms have problems of inaccurate validation or high operational overhead.</t>
      <t>ACL-based ingress filtering relies on manual configurations and thus requires high operational overhead in dynamic networks. To guarantee accuracy of ACL-based SAV, network operators have to manually update the ACL-based filtering rules in time when the prefix or topology changes. Otherwise, improper block or improper permit problems may appear.</t>
      <t>Strict uRPF can automatically update SAV rules, but may improperly block legitimate traffic under asymmetric routing scenario or hidden prefix scenario. The root cause is that strict uRPF uses the router's local FIB to determine the valid incoming interface for a specific source address, which may not match the real incoming direction from the source, due to the existence of asymmetric routes. Hence, it may mistakenly consider a valid incoming interface as invalid, resulting in improper block problems; or it may mistakenly consider an invalid incoming interface as valid, resulting in improper permit problems.</t>
      <t>Loose uRPF is also an automated SAV mechanism but its SAV rules are overly loose. Most spoofed packets will be improperly permitted by loose uRPF.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section lists the requirements which can be a guidance for narrowing the gaps of existing intra-domain SAV mechanisms. The requirements can be fully or partially fulfilled when designing new intra-domain SAV mechanisms. The new intra-domain SAV mechanisms <bcp14>SHOULD</bcp14> avoid data-plane packet modification. Existing architectures or protocols or mechanisms can be used in the new SAV mechanisms to achieve better SAV function.</t>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be able to automatically adapt to network dynamics such as routing changes or prefix changes, instead of purely relying on manual update.</t>
      </section>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanism need to improve the validation accuracy upon existing intra-domain SAV mechanisms. In a static network, improper block <bcp14>MUST</bcp14> be avoided to guarantee that legitimate traffic will not be blocked. Improper permit <bcp14>SHOULD</bcp14> be reduced as much as possible so that the malicious packets with forged source addresses can be efficiently filtered. When there are network changes, the new mechanisms <bcp14>MUST</bcp14> update SAV rules efficiently for keeping the high accuracy of validation.</t>
      </section>
      <section anchor="working-in-incrementalpartial-deployment">
        <name>Working in Incremental/Partial Deployment</name>
        <t>The new intra-domain SAV mechanism <bcp14>SHOULD NOT</bcp14> assume pervasive adoption, and some routers that intend to adopt the new mechanism may not be able to be upgraded immediately. The new intra-domain SAV mechanism <bcp14>SHOULD</bcp14> be able to provide incremental protection when it is incrementally deployed. The effectiveness of the new intra-domain SAV mechanism under incremental deployment <bcp14>SHOULD</bcp14> be no worse than existing ones.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> adapt to prefix changes, route changes, and topology changes in an intra-domain network, and update SAV rules in a timely manner. In addition, it <bcp14>MUST</bcp14> consider how to update SAV rules proactively or reactively so as to minimize improper blocks during convergence.</t>
      </section>
      <section anchor="necessary-security-guarantee">
        <name>Necessary Security Guarantee</name>
        <t>Necessary security tools <bcp14>SHOULD</bcp14> be considered in the new intra-domain SAV mechanism. These security tools can help protect the SAV rule generation process. <xref target="sec-security"/> details the security scope and considerations for the new intra-domain SAV mechanism.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The new intra-domain SAV mechanisms should not introduce additional security vulnerabilities or confusion to the existing intra-domain architectures or control or management plane protocols.</t>
      <t>Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanisms should ensure integrity and authentication of protocol messages that deliver the required SAV information, and consider avoiding unintentional misconfiguration. It is not necessary to provide protection against compromised or malicious intra-domain routers which poison existing control or management plane protocols. Compromised or malicious intra-domain routers may not only affect SAV, but also disrupt the whole intra-domain routing domain. Security solutions to prevent these attacks are beyond the capability of intra-domain SAV.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Barry Greene, Fang Gao, Kotikalapudi Sriram, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, Libin Liu, John O'Brien, Roland Dobbins, Xiangqing Chang, Tony Przygienda, Yingzhen Qu, Changwang Lin, James Guichard, etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC9256" target="https://www.rfc-editor.org/info/rfc9256" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9256.xml">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC2784" target="https://www.rfc-editor.org/info/rfc2784" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2784.xml">
          <front>
            <title>Generic Routing Encapsulation (GRE)</title>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="S. Hanks" initials="S." surname="Hanks"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <date month="March" year="2000"/>
            <abstract>
              <t>This document specifies a protocol for encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2784"/>
          <seriesInfo name="DOI" value="10.17487/RFC2784"/>
        </reference>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="RFC6890" target="https://www.rfc-editor.org/info/rfc6890" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6890.xml">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="nist-rec" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation&quot;">
          <front>
            <title>Resilient Interdomain Traffic Exchange - BGP Security and DDoS Mitigation</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 385?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
