<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-12" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-12"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="February" day="21"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 93?>

<t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 97?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is important for defending against source address spoofing attacks. Since it is unrealistic to expect any single SAV mechanism to be universally supported, a multiple-fence architecture called Source Address Validation Architecture (SAVA) allows for implementing SAV at multiple levels: access-network SAV, intra-domain SAV, and inter-domain SAV (See <xref target="RFC5210"/>). The "domain" used in this document means the Autonomous System (AS). Access-network SAV (e.g., SAVI <xref target="RFC7039"/>, IP Source Guard (IPSG) <xref target="IPSG"/>, and Cable Source-Verify <xref target="cable-verify"/>) is deployed inside access networks to ensure the host inside the access network cannot use the source address of another host (See <xref target="RFC5210"/>). When access-network SAV is not universally deployed, intra-domain SAV and inter-domain SAV on routers can help block spoofing traffic as close to the source as possible.</t>
      <t>This document focuses only on the analysis of intra-domain SAV. Unlike inter-domain SAV which requires information (e.g., Border Gateway Protocol (BGP) data) provided by other ASes to determine SAV rules, intra-domain SAV for an AS determines SAV rules solely by the AS itself without communication with other ASes. Intra-domain SAV for an AS aims at achieving two goals: i) blocking source-spoofed packets originated from its host networks or customer networks using a source address of other networks; and ii) blocking source-spoofed packets coming from other ASes using a source address of this AS.</t>
      <t><xref target="intra-domain"/> illustrates the goals and function of intra-domain SAV with two cases. Case i shows that the host network or customer network of AS X originates source-spoofed packets using a source address of other networks. If AS X deploys intra-domain SAV, the spoofed packets can be blocked by host-facing routers or customer-facing routers of AS X (i.e., Goal i). Case ii shows that AS X receives source-spoofed packets using a source address of AS X from other ASes (e.g., AS Y). If AS X deploys intra-domain SAV, the spoofed packets from AS Y can be blocked by AS border routers of AS X (i.e., Goal ii).</t>
      <figure anchor="intra-domain">
        <name>Goals and function of intra-domain SAV</name>
        <artwork><![CDATA[
Case i: The host network or customer network of AS X originates    
        packets spoofing source addresses of other networks        
Goal i: If AS X deploys intra-domain SAV,                          
        the spoofed packets can be blocked by AS X                 
                                                                   
                                    Spoofed packets                
                                    using source addresses         
  +-------------------------------+ of other networks     +------+ 
  | Host/Customer Network of AS X |---------------------->| AS X | 
  +-------------------------------+                       +------+ 
                                                                                                                                      
Case ii: AS X receives packets spoofing source addresses of AS X   
         from other ASes (e.g., AS Y)                              
Goal ii: If AS X deploys intra-domain SAV,                         
         the spoofed packets can be blocked by AS X                
                                                                   
           Spoofed packets                                         
           using source addresses                                  
  +------+ of AS X               +------+                          
  | AS X |<----------------------| AS Y |                          
  +------+                       +------+                          
]]></artwork>
      </figure>
      <t>This document clarifies that the scope of SAV is to check the validity of the source address of data packets in IP-encapsulated scenarios including:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: including global routing table forwarding and VPN forwarding scenarios.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec <xref target="RFC4301"/>, GRE <xref target="RFC2784"/>, SRv6 <xref target="RFC9256"/>, etc.): focusing on the validation of the outer layer IP address.</t>
        </li>
        <li>
          <t>Both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>SAV does not check non-IP packets in MPLS label-based forwarding and other non-IP-based forwarding scenarios.</t>
      <t>In the following, this document provides a gap analysis of existing intra-domain SAV mechanisms, concludes key problems to solve, and proposes requirements for future ones.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions.</t>
        <t>Host Network: An intra-domain stub network that consists of hosts.</t>
        <t>Host-facing Router: An intra-domain router facing a host network.</t>
        <t>Customer Network: An intra-domain stub network that consists of hosts and routers.</t>
        <t>Customer-facing Router: An intra-domain router facing a customer network.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        <t>SAV-specific Information: The information specialized for SAV rule generation, which is exchanged among intra-domain routers.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Existing Intra-domain SAV Mechanisms</name>
      <t>This section introduces existing intra-domain SAV mechanisms, including BCP38 <xref target="RFC2827"/> and BCP84 <xref target="RFC3704"/>.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering or BCP38 <xref target="RFC2827"/> requires that network operators manually configure ACL rules on routers to block or permit data packets with specific source addresses. This mechanism can be used on interfaces of host-facing or customer-facing routers facing a host/customer network to prevent the corresponding host/customer network from spoofing source prefixes of other networks <xref target="manrs-antispoofing"/>. In addition, it is also usually used on interfaces of AS border routers facing an external AS to block data packets using disallowed source addresses, such as internal source addresses owned by the local AS <xref target="nist-rec"/>. In any application scenario, ACL rules must be updated in time to be consistent with the latest filtering criteria when the network changes.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> is also typically used on interfaces of host-facing or customer-facing routers facing a host/customer network. Routers deploying strict uRPF accept a data packet only when i) the local FIB contains a prefix covering the packet's source address and ii) the corresponding outgoing interface for the prefix in the FIB matches the packet's incoming interface. Otherwise, the packet will be blocked.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> uses a looser validation method. A packet will be accepted if the router's local FIB contains a prefix covering the packet's source address regardless of the interface from which the packet is received. In fact, interfaces of AS border routers facing an external AS may use loose uRPF to block incoming data packets using non-global addresses <xref target="nist-rec"/>. EFP-uRPF <xref target="RFC8704"/> is another SAV mechanism which can be used on AS border routers as well. This document does not analyze EFP-uRPF because it is an inter-domain SAV mechanism with a different goal from those described in <xref target="sec-intro"/>.</t>
        </li>
        <li>
          <t>Carrier Grade NAT has some operations on the source addresses of packets, but it is not an anti-spoofing tool, as described in <xref target="manrs-antispoofing"/>. If the source address of a packet is in the INSIDE access list, the NAT rule can translate the source address to an address in the pool OUTSIDE. The NAT rule cannot determine whether the source address is spoofed or not. In addition, the packet using a spoofed source address will still be forwarded if the spoofed source address is not included in the INSIDE access list. Therefore, Carrier Grade NAT cannot help identify and block source-spoofed data packets.</t>
        </li>
      </ul>
      <t>In summary, ACL-based ingress filtering and uRPF are the two most commonly used intra-domain SAV mechanisms. This document provides a gap analysis of these two mechanisms in <xref target="sec-gap"/>.</t>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>This section elaborates the key problems of current intra-domain SAV on host-facing or customer-facing routers and intra-domain SAV on AS border routers, respectively.</t>
      <section anchor="intra-domain-sav-on-host-facing-or-customer-facing-routers">
        <name>Intra-domain SAV on Host-facing or Customer-facing Routers</name>
        <t>Towards Goal i in <xref target="intra-domain"/>, intra-domain SAV is typically deployed on interfaces of host-facing or customer-facing routers facing an intra-domain host/customer network to validate data packets originated from that network, since SAV is more effective when deployed closer to the source. ACL-based ingress filtering and strict uRPF are commonly used for this purpose.</t>
        <t>ACL rules must be manually updated according to prefix changes or topology changes in a timely manner. Otherwise, if ACL rules are not updated in time, improper block or improper permit problems may occur. To ensure the accuracy of ACL rules in dynamic networks, high operational overhead will be induced to achieve timely updates for ACL configurations.</t>
        <t>Strict uRPF can generate and update SAV rules in an automatic way but it will cause improper blocks in the scenario of asymmetric routing or hidden prefix.</t>
        <section anchor="asymmetric-routing">
          <name>Asymmetric Routing</name>
          <t><xref target="multi-home"/> shows asymmetric routing in a multi-homing scenario. In the figure, Network 1 is a host/customer network of the AS. It owns prefix 2001:db8::/32 <xref target="RFC6890"/> and is attached to two intra-domain routers, i.e., Router 1 and Router 2. For the load balance purpose of traffic flowing to Network 1, Network 1 expects the incoming traffic destined for the sub-prefix 2001:db8:8000::/33 to come only from Router 1 and the incoming traffic destined for the other sub-prefix 2001:db8::/33 to come only from Router 2. To this end, Router 1 only learns the route to sub-prefix 2001:db8:8000::/33 from Network 1, while Router 2 only learns the route to the other sub-prefix 2001:db8::/33 from Network 1. Then, Router 1 and Router 2 distribute the sub-prefix information to routers in the AS through intra-domain routing protocols such as OSPF or IS-IS. The FIBs of Router 1 and Router 2 are shown in the figure.</t>
          <t>Although Network 1 does not expect traffic destined for 2001:db8::/33 to come from Router 1, it may send traffic with source addresses of prefix 2001:db8::/33 to Router 1 for load balance of traffic originated from Network 1. As a result, there is asymmetric routing of data packets between Network 1 and Router 1. Arrows in the figure indicate the flowing direction of traffic. In addition to the traffic engineering mentioned above, other factors may also cause the similar asymmetric routing between host-facing/customer-facing routers and host/customer networks.</t>
          <figure anchor="multi-home">
            <name>Asymmetric routing in multi-homing scenario</name>
            <artwork><![CDATA[
 +---------------------------------------------------------+
 |                                                      AS |
 |                     +----------+                        |
 |                     | Router 3 |                        |
 |                     +----------+                        |
 |                       /      \                          |
 |                      /        \                         |
 |                     /          \                        |
 |             +----------+     +----------+               |
 |             | Router 1 |     | Router 2 |               |
 |             +-----+#+--+     +-+#+------+               |
 |                   /\           /                        |
 |Traffic with        \          / Traffic with            |
 |source IP addresses  \        /  destination IP addresses|
 |of 2001:db8::/33      \      \/  of 2001:db8::/33        |
 |                  +----------------+                     |
 |                  |  Host/Customer |                     |
 |                  |    Network 1   |                     |
 |                  |(2001:db8::/32) |                     |
 |                  +----------------+                     |
 |                                                         |
 +---------------------------------------------------------+

 FIB of Router 1                 FIB of Router 2
 Dest               Next_hop     Dest               Next_hop
 2001:db8:8000::/33 Network 1    2001:db8:8000::/33 Router 3
 2001:db8::/33      Router 3     2001:db8::/33      Network 1

 The legitimate traffic originated from Network 1 with source IP 
 addresses of 2001:db8::/33 will be improperly blocked by Router 1 
 if Router 1 uses strict uRPF.
]]></artwork>
          </figure>
          <t>If Router 1 uses strict uRPF on interface '#', the SAV rule is that Router 1 only accepts packets with source addresses of 2001:db8:8000::/33 from Network 1. Therefore, when Network 1 sends packets with source addresses of 2001:db8::/33 to Router 1, strict uRPF at Router 1 will improperly block these legitimate packets. Similarly, when Router 2 uses strict uRPF on its interface '#' and receives packets with source addresses of prefix 2001:db8:8000::/33 from Network 1, it will also improperly block these legitimate packets because strict uRPF at Router 2 will only accept packets from Network 1 using source addresses of prefix 2001:db8::/33.</t>
        </section>
        <section anchor="hidden-prefix">
          <name>Hidden Prefix</name>
          <t>For special business purposes, a host/customer network will originate data packets using a source address that is not distributed through intra-domain routing protocol. In other words, the IP address/prefix is hidden from intra-domain routing protocol and intra-domain routers. In this scenario, strict uRPF on host-facing or customer-facing routers will improperly block data packets from the host/customer network using source addresses in a hidden prefix.</t>
          <figure anchor="hidden">
            <name>Hidden prefix in CDN and DSR scenario</name>
            <artwork><![CDATA[
          +-------------------------+                             
          |          AS Y           | AS Y announces the route    
          |   (where the anycast    | for anycast prefix P3
          |    server is located)   | in BGP                            
          +-----------+-------------+                             
                      |                                           
                      |                                           
          +-----------+-------------+                             
          |       Other ASes        |                             
          +-------------------------+                             
             /                    \                               
            /                      \                              
           /                        \                             
+------------------+   +---------------------------------------+   
|      AS Z        |   |         +----------+             AS X |   
| (where the user  |   |         | Router 4 |                  |   
|    is located)   |   |         +----------+                  |   
+------------------+   |              |                        |   
                       |              |                        |   
                       |         +----+-----+                  |   
                       |         | Router 5 |                  |   
                       |         +----#-----+                  |   
                       |              /\    DSR responses with |   
                       |              |     source IP addresses|   
                       |              |     of P3              |   
                       |       +---------------+               |   
                       |       | Host/Customer |               |   
                       |       |   Network 2   |               |   
                       |       |     (P2)      |               |   
                       |       +---------------+               |   
                       | (where the edge server is located)    |   
                       +---------------------------------------+   
DSR response packets from edge server in Network 2 with 
source IP addresses of P3 (i.e., the anycast prefix) will 
be improperly blocked by Router 5 if Router 5 uses strict uRPF.
]]></artwork>
          </figure>
          <t>The Content Delivery Networks (CDN) and Direct Server Return (DSR) scenario is a representative example of hidden prefix. In this scenario, the edge server in an AS will send DSR response packets using a source address of the anycast server which is located in another remote AS. However, the source address of anycast server is hidden from intra-domain routing protocol and intra-domain routers in the local AS.</t>
          <t>While this is an inter-domain scenario, DSR response packets will be improperly blocked by strict uRPF when edge server is located in the host/customer network. For example, in <xref target="hidden"/>, assume edge server is located in Host/Customer Network 2 and Router 5 only learns the route to P2 from Network 2. When edge server receives the request from the remote anycast server, it will directly return DSR response packets using the source address of anycast server (i.e., P3). If Router 5 uses strict uRPF on interface '#', the SAV rule is that Router 5 only accepts packets with source addresses of P2 from Network 2. As a result, DSR response packets will be blocked by strict uRPF on interface '#'. In addition, loose uRPF on this interface will also improperly block DSR response packets if prefix P3 is not in the FIB of Router 5.</t>
        </section>
      </section>
      <section anchor="intra-domain-sav-on-as-border-routers">
        <name>Intra-domain SAV on AS Border Routers</name>
        <t>Towards Goal ii in <xref target="intra-domain"/>, intra-domain SAV is typically deployed on interfaces of AS border routers facing an external AS to validate packets arriving from other ASes. <xref target="inbound-SAV"/> shows an example of SAV on AS border routers. In the figure, Router 3 and Router 4 deploy intra-domain SAV on interface '#' for validating data packets coming from external ASes. ACL-based ingress filtering and loose uRPF are commonly used for this purpose.</t>
        <figure anchor="inbound-SAV">
          <name>An example of SAV on AS border routers</name>
          <artwork><![CDATA[
 Packets with +              Packets with +
 spoofed P1/P2|              spoofed P1/P2|
+-------------|---------------------------|---------+
|   AS        \/                          \/        |
|         +--+#+-----+               +---+#+----+   |
|         | Router 3 +---------------+ Router 4 |   |
|         +----------+               +----+-----+   |
|          /        \                     |         |
|         /          \                    |         |
|        /            \                   |         |
| +----------+     +----------+      +----+-----+   |
| | Router 1 |     | Router 2 |      | Router 5 |   |
| +----------+     +----------+      +----+-----+   |
|        \             /                  |         |
|         \           /                   |         |
|          \         /                    |         |
|       +---------------+         +-------+-------+ |
|       |   Customer    |         |     Host      | |
|       |   Network     |         |   Network     | |
|       |     (P1)      |         |     (P2)      | |
|       +---------------+         +---------------+ |
|                                                   |
+---------------------------------------------------+
]]></artwork>
        </figure>
        <t>By configuring ACL rules, data packets that use disallowed source addresses (e.g., non-global addresses or internal source addresses) can be blocked at AS border routers. However, the operational overhead of maintaining updated ACL rules will be extremely high when there are multiple AS border routers adopting SAV as shown in <xref target="inbound-SAV"/>.</t>
        <t>As for loose uRPF, it sacrifices the directionality of SAV and has limited blocking capability, because it allows packets with source addresses that exist in the FIB table on all router interfaces.</t>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>As analyzed above, existing intra-domain SAV mechanisms have significant limitations on automatic update or accurate validation.</t>
      <t>ACL-based ingress filtering relies on manual configurations and thus requires high operational overhead in dynamic networks. To guarantee accuracy of ACL-based SAV, network operators have to manually update the ACL-based filtering rules in time when the prefix or topology changes. Otherwise, improper block or improper permit problems may appear.</t>
      <t>Strict uRPF can automatically update SAV rules, but may improperly block legitimate traffic under asymmetric routing scenario or hidden prefix scenario. It may mistakenly consider a valid incoming interface as invalid, resulting in improper block problems; or it may mistakenly consider an invalid incoming interface as valid, resulting in improper permit problems.</t>
      <t>Loose uRPF is also an automated SAV mechanism but its SAV rules are overly loose. Most spoofed packets will be improperly permitted by loose uRPF.</t>
      <t>In summary, uRPF cannot guarantee the accuracy of SAV because it solely uses the router’s local FIB or RIB information to determine SAV rules. A router cannot see the asymmetric route between itself and another router/network from its own perspective. As a result, strict uRPF has improper block problems in the scenario of asymmetric forwarding or asymmetric routing. The network operator has a comprehensive perspective so he/she can configure the correct SAV rules. However, manual configuration has limitations on automatic update.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section lists the following five requirements and related discussions that should be considered when designing the new intra-domain SAV mechanism.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> improve the accuracy upon existing intra-domain SAV mechanisms. It <bcp14>MUST</bcp14> achieve the two goals described in <xref target="sec-intro"/> to prevent those spoofing traffic from flowing into the router network. Meanwhile, it <bcp14>MUST</bcp14> avoid blocking legitimate data packets, especially when there are asymmetric routes or network changes. This requires that routers exchange necessary information (i.e., SAV-specific information) to form a comprehensive perspective. By integrating SAV-specific information of other routers, routers will learn the asymmetric forwarding or routing behaviors and determine accurate SAV rules.</t>
      </section>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be able to automatically generate and update SAV rules, rather than relying entirely on manual updates like ACL-based ingress filtering. Although manual configuration may still be required in some special cases (such as in the hidden prefix scenario where only the operator knows the hidden prefix), automation can reduce considerable operational overhead in general.</t>
      </section>
      <section anchor="working-in-incremental-deployment">
        <name>Working in Incremental Deployment</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> specify the deployment scope (i.e., where this mechanism will be used) and provide incremental benefits when incrementally deployed within the specified deployment scope. That is, it <bcp14>MUST NOT</bcp14> be effective only when fully deployed. As current intra-domain SAV mechanisms already meet this requirement, the new SAV mechanism <bcp14>MUST</bcp14> meet this requirement as well. Furthermore, the new SAV mechanism <bcp14>MUST</bcp14> avoid improper blocks and identify no less spoofing traffic than the current ones in the same incremental deployment scenario.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> update SAV rules in time when prefix changes, route changes, or topology changes occur in an intra-domain network. To this end, two considerations must be taken into account when designing the new SAV mechanism. First, the mechanism <bcp14>MUST</bcp14> allow routers to exchange the updated SAV-specific information in a timely manner. Second, the mechanism <bcp14>MUST NOT</bcp14> require routers to signal too much information for the SAV function, because this will greatly increase the load on the control plane, even compromising the convergence of the current protocols.</t>
      </section>
      <section anchor="necessary-security-guarantee">
        <name>Necessary Security Guarantee</name>
        <t>Necessary security mechanisms <bcp14>SHOULD</bcp14> be considered in the new intra-domain SAV mechanism if it may face new security risks. <xref target="sec-security"/> details the security scope and security considerations for the new intra-domain SAV mechanism.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The new intra-domain SAV mechanisms should not introduce additional security vulnerabilities or confusion to the existing intra-domain architectures or control or management plane protocols.</t>
      <t>Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanisms should ensure integrity and authentication of protocol messages that deliver the required SAV-specific information, and consider avoiding unintentional misconfiguration. It is not necessary to provide protection against compromised or malicious intra-domain routers which poison existing control or management plane protocols. Compromised or malicious intra-domain routers may not only affect SAV, but also disrupt the whole intra-domain routing domain. Security mechanisms to prevent these attacks are beyond the capability of intra-domain SAV.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Barry Greene, Fang Gao, Kotikalapudi Sriram, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, Libin Liu, John O'Brien, Roland Dobbins, Xiangqing Chang, Tony Przygienda, Yingzhen Qu, Changwang Lin, James Guichard, Linda Dunbar, Robert Sparks, Yu Fu, Stephen Farrel etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC9256" target="https://www.rfc-editor.org/info/rfc9256" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9256.xml">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC2784" target="https://www.rfc-editor.org/info/rfc2784" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2784.xml">
          <front>
            <title>Generic Routing Encapsulation (GRE)</title>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="S. Hanks" initials="S." surname="Hanks"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <date month="March" year="2000"/>
            <abstract>
              <t>This document specifies a protocol for encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2784"/>
          <seriesInfo name="DOI" value="10.17487/RFC2784"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC6890" target="https://www.rfc-editor.org/info/rfc6890" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6890.xml">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
        <reference anchor="manrs-antispoofing" target="https://www.manrs.org/netops/guide/antispoofing">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="nist-rec" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation&quot;">
          <front>
            <title>Resilient Interdomain Traffic Exchange - BGP Security and DDoS Mitigation</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 390?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
