<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-10" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-10"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="January" day="21"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 92?>

<t>This document provides the gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 96?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is important for defending against source address spoofing attacks. A multi-fence architecture called Source Address Validation Architecture (SAVA) <xref target="RFC5210"/> was proposed to implement SAV at three levels: access-network SAV, intra-domain SAV, and inter-domain SAV. The multi-fence architecture helps enhance the effectiveness of SAV across the whole Internet by preventing or mitigating source address spoofing at multiple levels.</t>
      <t>Access-network SAV mechanisms (such as SAVI <xref target="RFC7039"/>, IP Source Guard (IPSG) <xref target="IPSG"/>, and Cable Source-Verify <xref target="cable-verify"/>) can ensure that a host must use the source IP address assigned to the host. Given numerous access networks managed by different operators throughout the world, it is difficult to require all access networks to deploy SAV simultaneously. Therefore, intra-domain SAV and inter-domain SAV are needed to block source-spoofed data packets from access networks as close to the source as possible. Intra-domain SAV and inter-domain SAV perform SAV at the granularity of IP prefixes, which is coarser than the granularity of access network SAV (i.e., IP address), as an IP prefix covers a range of IP addresses.</t>
      <t>This document focuses on the analysis of intra-domain SAV. In contrast to inter-domain SAV, intra-domain SAV does not require collaboration between different Autonomous Systems (ASes). Intra-domain SAV rules can be generated by the AS itself. Consider an AS X which provides its host networks or customer networks with the connectivity to the rest of the Internet. Intra-domain SAV for AS X aims at achieving two goals: i) blocking source-spoofed packets originated from its host networks or customer networks using a source address of other networks; and ii) blocking source-spoofed packets coming from other ASes using a source address of AS X.</t>
      <t><xref target="intra-domain"/> illustrates the goals and function of intra-domain SAV with two cases. Case i shows that the host network or customer network of AS X originates source-spoofed packets using a source address of other networks. If AS X deploys intra-domain SAV, the spoofed packets can be blocked by host-facing routers or customer-facing routers of AS X (i.e., Goal i). Case ii shows that AS X receives source-spoofed packets using a source address of AS X from other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the spoofed packets from AS Y can be blocked by AS border routers of AS X (i.e., Goal ii).</t>
      <figure anchor="intra-domain">
        <name>An example for illustrating intra-domain SAV</name>
        <artwork><![CDATA[
Case i: The host network or customer network of AS X originates    
        packets spoofing source addresses of other networks        
Goal i: If AS X deploys intra-domain SAV,                          
        the spoofed packets can be blocked by AS X                 
                                                                   
                                    Spoofed packets                
                                    using source addresses         
  +-------------------------------+ of other networks     +------+ 
  | Host/Customer Network of AS X |---------------------->| AS X | 
  +-------------------------------+                       +------+ 
                                                                                                                                      
Case ii: AS X receives packets spoofing source addresses of AS X   
         from other ASes (e.g., AS Y)                              
Goal ii: If AS X deploys intra-domain SAV,                         
         the spoofed packets can be blocked by AS X                
                                                                   
           Spoofed packets                                         
           using source addresses                                  
  +------+ of AS X               +------+                          
  | AS X |<----------------------| AS Y |                          
  +------+                       +------+                          
]]></artwork>
      </figure>
      <t>The scope of intra-domain SAV includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: including both forwarding based on global routing table and VPN forwarding.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec <xref target="RFC4301"/>, GRE <xref target="RFC2784"/>, SRv6 <xref target="RFC9256"/>, etc.): focusing on the validation of the outer layer IP address.</t>
        </li>
        <li>
          <t>Validating both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>
          <t>Non-IP packets: including MPLS label-based forwarding and other non-IP-based forwarding.</t>
        </li>
      </ul>
      <t>In the following, this document provides gap analysis of existing intra-domain SAV mechanisms, concludes main problems of existing intra-domain SAV mechanisms, and proposes requirements for future ones.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions.</t>
        <t>Host-facing Router: An intra-domain router facing an intra-domain host network.</t>
        <t>Customer-facing Router: An intra-domain router facing an intra-domain customer network.</t>
        <t>AS Border Router: An intra-domain router facing an external AS.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        <t>SAV-specific Information: The information specialized for SAV rule generation, which is exchanged among routers.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Existing Intra-domain SAV Mechanisms</name>
      <t>This section introduces existing intra-domain SAV mechanisms, including BCP38 <xref target="RFC2827"/> and BCP84 <xref target="RFC3704"/>.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering or BCP38 <xref target="RFC2827"/> requires that network operators manually configure ACL rules on intra-domain routers to block or permit data packets using specific source addresses. This mechanism can be used on interfaces of host-facing or customer-facing routers facing an intra-domain host/customer network to prevent the corresponding host/customer network from spoofing source prefixes of other networks <xref target="manrs-antispoofing"/>. In addition, it is also usually used on interfaces of AS border routers facing an external AS to block data packets using disallowed source addresses, such as internal source addresses owned by the local AS <xref target="nist-rec"/>. In any application scenario, ACL rules must be updated in time to be consistent with the latest filtering criteria when the network changes.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> is also typically used on interfaces of host-facing or customer-facing routers facing an intra-domain host/customer network. Routers deploying strict uRPF accept a data packet only when i) the local FIB contains a prefix covering the packet's source address and ii) the corresponding outgoing interface for the prefix in the FIB matches the packet's incoming interface. Otherwise, the packet will be blocked.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> uses a looser validation method. A packet will be accepted if the router's local FIB contains a prefix covering the packet's source address regardless of the interface from which the packet is received. In fact, interfaces of AS border routers facing an external AS may use loose uRPF to block incoming data packets using non-global addresses <xref target="nist-rec"/>.</t>
        </li>
        <li>
          <t>Carrier Grade NAT has some operations on the source addresses of packets, but it is not an anti-spoofing tool, as described in <xref target="manrs-antispoofing"/>. If the source address of a packet is in the INSIDE access list, the NAT rule can translate the source address to an address in the pool OUTSIDE. The NAT rule cannot determine whether the source address is spoofed or not. In addition, the packet using a spoofed source address will still be forwarded if the spoofed source address is not included in the INSIDE access list. Therefore, Carrier Grade NAT cannot help identify and block source-spoofed data packets.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>This section elaborates the key problems of current intra-domain SAV on host-facing or customer-facing routers and SAV on AS border routers, respectively.</t>
      <section anchor="sav-on-host-facing-or-customer-facing-routers">
        <name>SAV on Host-facing or Customer-facing Routers</name>
        <t>Towards Goal i in <xref target="intra-domain"/>, intra-domain SAV is typically deployed on interfaces of host-facing or customer-facing routers facing an intra-domain host/customer network to validate data packets originated from that network, since SAV is more effective when deployed closer to the source. ACL-based ingress filtering and strict uRPF are commonly used for this purpose.</t>
        <t>ACL rules must be manually updated according to prefix changes or topology changes in a timely manner. Otherwise, if ACL rules are not updated in time, improper block or improper permit problems may occur. To ensure the accuracy of ACL rules in dynamic networks, high operational overhead will be induced to achieve timely updates for ACL configurations.</t>
        <t>Strict uRPF can generate and update SAV rules in an automatic way but it will cause improper blocks in the scenario of asymmetric routing or hidden prefix.</t>
        <section anchor="asymmetric-routing">
          <name>Asymmetric Routing</name>
          <t><xref target="multi-home"/> shows asymmetric routing in a multi-homing scenario. In the figure, Network 1 is a host/customer network of the AS. It owns prefix 2001:db8::/32 <xref target="RFC6890"/> and is attached to two intra-domain routers, i.e., Router 1 and Router 2. For the load balance purpose of traffic flowing to Network 1, Network 1 expects the incoming traffic destined for the sub-prefix 2001:db8:8000::/33 to come only from Router 1 and the incoming traffic destined for the other sub-prefix 2001:db8::/33 to come only from Router 2. To this end, Router 1 only learns the route to sub-prefix 2001:db8:8000::/33 from Network 1, while Router 2 only learns the route to the other sub-prefix 2001:db8::/33 from Network 1. Then, Router 1 and Router 2 distribute the sub-prefix information to routers in the AS through intra-domain routing protocols such as OSPF or IS-IS. The FIBs of Router 1 and Router 2 are shown in the figure.</t>
          <t>Although Network 1 does not expect traffic destined for 2001:db8::/33 to come from Router 1, it may send traffic with source addresses of prefix 2001:db8::/33 to Router 1 for load balance of traffic originated from Network 1. As a result, there is asymmetric routing of data packets between Network 1 and Router 1. Arrows in the figure indicate the flowing direction of traffic. In addition to the traffic engineering mentioned above, other factors may also cause the similar asymmetric routing between host-facing/customer-facing routers and host/customer networks.</t>
          <figure anchor="multi-home">
            <name>Asymmetric routing in multi-homing scenario</name>
            <artwork><![CDATA[
 +---------------------------------------------------------+
 |                                                      AS |
 |                     +----------+                        |
 |                     | Router 3 |                        |
 |                     +----------+                        |
 |                       /      \                          |
 |                      /        \                         |
 |                     /          \                        |
 |             +----------+     +----------+               |
 |             | Router 1 |     | Router 2 |               |
 |             +-----+#+--+     +-+#+------+               |
 |                   /\           /                        |
 |Traffic with        \          / Traffic with            |
 |source IP addresses  \        /  destination IP addresses|
 |of 2001:db8::/33      \      \/  of 2001:db8::/33        |
 |                  +----------------+                     |
 |                  |  Host/Customer |                     |
 |                  |    Network 1   |                     |
 |                  |(2001:db8::/32) |                     |
 |                  +----------------+                     |
 |                                                         |
 +---------------------------------------------------------+

 FIB of Router 1                 FIB of Router 2
 Dest               Next_hop     Dest               Next_hop
 2001:db8:8000::/33 Network 1    2001:db8:8000::/33 Router 3
 2001:db8::/33      Router 3     2001:db8::/33      Network 1

 The legitimate traffic originated from Network 1 with source IP 
 addresses of 2001:db8::/33 will be improperly blocked by Router 1 
 if Router 1 uses strict uRPF.
]]></artwork>
          </figure>
          <t>If Router 1 uses strict uRPF on interface '#', the SAV rule is that Router 1 only accepts packets with source addresses of 2001:db8:8000::/33 from Network 1. Therefore, when Network 1 sends packets with source addresses of 2001:db8::/33 to Router 1, strict uRPF at Router 1 will improperly block these legitimate packets. Similarly, when Router 2 uses strict uRPF on its interface '#' and receives packets with source addresses of prefix 2001:db8:8000::/33 from Network 1, it will also improperly block these legitimate packets because strict uRPF at Router 2 will only accept packets from Network 1 using source addresses of prefix 2001:db8::/33.</t>
        </section>
        <section anchor="hidden-prefix">
          <name>Hidden Prefix</name>
          <t>For special business purposes, a host/customer network will originate data packets using a source address that is not distributed through intra-domain routing protocol. In other words, the IP address/prefix is hidden from intra-domain routing protocol and intra-domain routers. In this scenario, strict uRPF on host-facing or customer-facing routers will improperly block data packets from the host/customer network using source addresses in a hidden prefix.</t>
          <figure anchor="hidden">
            <name>Hidden prefix in CDN and DSR scenario</name>
            <artwork><![CDATA[
          +-------------------------+                             
          |          AS Y           | AS Y announces the route    
          |   (where the anycast    | for anycast prefix P3
          |    server is located)   | in BGP                            
          +-----------+-------------+                             
                      |                                           
                      |                                           
          +-----------+-------------+                             
          |       Other ASes        |                             
          +-------------------------+                             
             /                    \                               
            /                      \                              
           /                        \                             
+------------------+   +---------------------------------------+   
|      AS Z        |   |         +----------+             AS X |   
| (where the user  |   |         | Router 4 |                  |   
|    is located)   |   |         +----------+                  |   
+------------------+   |              |                        |   
                       |              |                        |   
                       |         +----+-----+                  |   
                       |         | Router 5 |                  |   
                       |         +----#-----+                  |   
                       |              /\    DSR responses with |   
                       |              |     source IP addresses|   
                       |              |     of P3              |   
                       |       +---------------+               |   
                       |       | Host/Customer |               |   
                       |       |   Network 2   |               |   
                       |       |     (P2)      |               |   
                       |       +---------------+               |   
                       | (where the edge server is located)    |   
                       +---------------------------------------+   
DSR response packets from edge server in Network 2 with 
source IP addresses of P3 (i.e., the anycast prefix) will 
be improperly blocked by Router 5 if Router 5 uses strict uRPF.
]]></artwork>
          </figure>
          <t>The Content Delivery Networks (CDN) and Direct Server Return (DSR) scenario is a representative example of hidden prefix. In this scenario, the edge server in an AS will send DSR response packets using a source address of the anycast server which is located in another remote AS. However, the source address of anycast server is hidden from intra-domain routing protocol and intra-domain routers in the local AS.</t>
          <t>While this is an inter-domain scenario, we note that DSR response packets may also be improperly blocked by strict uRPF when edge server is located in the host/customer network. For example, in <xref target="hidden"/>, assume edge server is located in Host/Customer Network 2 and Router 5 only learns the route to P2 from Network 2. When edge server receives the request from the remote anycast server, it will directly return DSR response packets using the source address of anycast server (i.e., P3). If Router 5 uses strict uRPF on interface '#', the SAV rule is that Router 5 only accepts packets with source addresses of P2 from Network 2. As a result, DSR response packets will be blocked by strict uRPF on interface '#'. In addition, loose uRPF on this interface will also improperly block DSR response packets if prefix P3 is not in the FIB of Router 5.</t>
        </section>
      </section>
      <section anchor="sav-on-as-border-routers">
        <name>SAV on AS Border Routers</name>
        <t>Towards Goal ii in <xref target="intra-domain"/>, intra-domain SAV is typically deployed on interfaces of AS border routers facing an external AS to validate packets arriving from other ASes. <xref target="inbound-SAV"/> shows an example of SAV on AS border routers. In the figure, Router 3 and Router 4 deploy intra-domain SAV on interface '#' for validating data packets coming from external ASes. ACL-based ingress filtering and loose uRPF are commonly used for this purpose.</t>
        <figure anchor="inbound-SAV">
          <name>An example of SAV on AS border routers</name>
          <artwork><![CDATA[
 Packets with +              Packets with +
 spoofed P1/P2|              spoofed P1/P2|
+-------------|---------------------------|---------+
|   AS        \/                          \/        |
|         +--+#+-----+               +---+#+----+   |
|         | Router 3 +---------------+ Router 4 |   |
|         +----------+               +----+-----+   |
|          /        \                     |         |
|         /          \                    |         |
|        /            \                   |         |
| +----------+     +----------+      +----+-----+   |
| | Router 1 |     | Router 2 |      | Router 5 |   |
| +----------+     +----------+      +----+-----+   |
|        \             /                  |         |
|         \           /                   |         |
|          \         /                    |         |
|       +---------------+         +-------+-------+ |
|       |   Customer    |         |     Host      | |
|       |   Network     |         |   Network     | |
|       |     (P1)      |         |     (P2)      | |
|       +---------------+         +---------------+ |
|                                                   |
+---------------------------------------------------+
]]></artwork>
        </figure>
        <t>By configuring ACL rules, data packets that use disallowed source addresses (e.g., non-global addresses or internal source addresses) can be blocked at AS border routers. However, the operational overhead of maintaining updated ACL rules will be extremely high when there are multiple AS border routers adopting SAV as shown in <xref target="inbound-SAV"/>.</t>
        <t>As for loose uRPF, it sacrifices the directionality of SAV and has limited blocking capability, because it allows packets with source addresses that exist in the FIB table on all router interfaces.</t>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>As analyzed above, existing intra-domain SAV mechanisms have significant limitations on automatic update or accurate validation.</t>
      <t>ACL-based ingress filtering relies on manual configurations and thus requires high operational overhead in dynamic networks. To guarantee accuracy of ACL-based SAV, network operators have to manually update the ACL-based filtering rules in time when the prefix or topology changes. Otherwise, improper block or improper permit problems may appear.</t>
      <t>Strict uRPF can automatically update SAV rules, but may improperly block legitimate traffic under asymmetric routing scenario or hidden prefix scenario. It may mistakenly consider a valid incoming interface as invalid, resulting in improper block problems; or it may mistakenly consider an invalid incoming interface as valid, resulting in improper permit problems.</t>
      <t>Loose uRPF is also an automated SAV mechanism but its SAV rules are overly loose. Most spoofed packets will be improperly permitted by loose uRPF.</t>
      <t>In summary, uRPF cannot guarantee the accuracy of SAV because it solely uses the router’s local FIB or RIB information to determine SAV rules. A router cannot see the asymmetric route between itself and another router/network from its own perspective. As a result, strict uRPF has improper block problems in the scenario of asymmetric route. The network operator has a comprehensive perspective so he/she can configure the correct SAV rules. However, manual configuration has limitations on automatic update.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>The key to overcoming the problems is to automatically combine perspectives of multiple routers, allowing each router to form a more comprehensive perspective. To this end, new SAV solutions can allow routers to exchange and update the asymmetric information that affects the accuracy of SAV (i.e., SAV-specific information) in an automatic way. Then, routers can use SAV-specific information and local routing information to determine accurate SAV rules.</t>
      <t>It is also important to reduce the complexity and overhead of SAV implementation. To this end, routers <bcp14>MUST NOT</bcp14> signal too much information. Only information that cannot be learned from local routing information and is necessary for SAV should be signaled. In addition, in order to better compatibility with the current intra-domain network, it is recommended that existing routing protocols can be used to implement the SAV function.</t>
      <t>Specifically, this section lists the following five requirements that should be considered when designing new intra-domain SAV mechanisms.</t>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be able to automatically adapt to network dynamics such as routing changes or prefix changes, instead of purely relying on manual update.</t>
      </section>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanism need to improve the validation accuracy upon existing intra-domain SAV mechanisms. In a static network, improper block <bcp14>MUST</bcp14> be avoided to guarantee that legitimate traffic will not be blocked. Improper permit <bcp14>SHOULD</bcp14> be reduced as much as possible so that data packets with spoofed source addresses can be effectively blocked. When the network changes, the new mechanisms <bcp14>MUST</bcp14> efficiently update SAV rules to guarantee the accuracy of SAV.</t>
      </section>
      <section anchor="working-in-incrementalpartial-deployment">
        <name>Working in Incremental/Partial Deployment</name>
        <t>The new intra-domain SAV mechanism <bcp14>SHOULD NOT</bcp14> assume pervasive adoption. Since routers scheduled to adopt the new mechanism may not be able to be upgraded simultaneously, the new intra-domain SAV mechanism <bcp14>SHOULD</bcp14> be able to provide incremental protection under incremental/partial deployment. In addition, the new intra-domain SAV mechanism <bcp14>SHOULD</bcp14> outperform the current ones in the same incremental/partial deployment scenario.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> adapt to prefix changes, route changes, and topology changes in an intra-domain network, and update SAV rules in a timely manner. In addition, it <bcp14>MUST</bcp14> consider how to update SAV rules proactively or reactively so as to minimize improper blocks during convergence.</t>
      </section>
      <section anchor="necessary-security-guarantee">
        <name>Necessary Security Guarantee</name>
        <t>Necessary security tools <bcp14>SHOULD</bcp14> be considered in the new intra-domain SAV mechanism. These security tools can help protect the SAV rule generation process. <xref target="sec-security"/> details the security scope and considerations for the new intra-domain SAV mechanism.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The new intra-domain SAV mechanisms should not introduce additional security vulnerabilities or confusion to the existing intra-domain architectures or control or management plane protocols.</t>
      <t>Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanisms should ensure integrity and authentication of protocol messages that deliver the required SAV information, and consider avoiding unintentional misconfiguration. It is not necessary to provide protection against compromised or malicious intra-domain routers which poison existing control or management plane protocols. Compromised or malicious intra-domain routers may not only affect SAV, but also disrupt the whole intra-domain routing domain. Security solutions to prevent these attacks are beyond the capability of intra-domain SAV.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Barry Greene, Fang Gao, Kotikalapudi Sriram, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, Libin Liu, John O'Brien, Roland Dobbins, Xiangqing Chang, Tony Przygienda, Yingzhen Qu, Changwang Lin, James Guichard, Linda Dunbar, Robert Sparks, Yu Fu, Stephen Farrel etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC9256" target="https://www.rfc-editor.org/info/rfc9256" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9256.xml">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC2784" target="https://www.rfc-editor.org/info/rfc2784" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2784.xml">
          <front>
            <title>Generic Routing Encapsulation (GRE)</title>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="S. Hanks" initials="S." surname="Hanks"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <date month="March" year="2000"/>
            <abstract>
              <t>This document specifies a protocol for encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2784"/>
          <seriesInfo name="DOI" value="10.17487/RFC2784"/>
        </reference>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC6890" target="https://www.rfc-editor.org/info/rfc6890" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6890.xml">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="nist-rec" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation&quot;">
          <front>
            <title>Resilient Interdomain Traffic Exchange - BGP Security and DDoS Mitigation</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 393?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
