<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-17" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-17"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 87?>

<t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the basic requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 91?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is important for defending against source address spoofing attacks. Network operators can implement SAV mechanisms at multiple levels: access-network SAV, intra-domain SAV, and inter-domain SAV (see <xref target="RFC5210"/>). Access-network SAV (e.g., SAVI [RFC7513], IP Source Guard (IPSG) based on DHCP snooping <xref target="IPSG"/>, and Cable Source-Verify <xref target="cable-verify"/>) is typically deployed on switches inside the access network to prevent a host from using the source address of another host in the same network segment. When access-network SAV is not universally deployed, intra-domain SAV on routers of the Autonomous System (AS) can increase the defense in depth by blocking spoofing traffic as close to the source as possible.</t>
      <t>This document focuses only on the analysis of intra-domain SAV (also known as intra-AS SAV). Unlike inter-domain SAV (also known as inter-AS SAV) which requires information (e.g., Border Gateway Protocol (BGP) data) provided by other ASes to determine SAV rules, intra-domain SAV for an AS determines SAV rules solely by the AS itself with local information (e.g., local configuration or Interior Gateway Protocol (IGP) data).</t>
      <t>Specifically, as illustrated in <xref target="intra-domain"/>, intra-domain SAV for an AS achieves two goals: i) prevent a sub network from using a source address out of the sub network or prevent a host from using a source address out of the network segment; and ii) prevent spoofed data packets coming from the rest of the Internet that use a source address of the local AS. A sub network is part of the AS. It consists of routers and hosts and may run a routing protocol among its routers. It only originates traffic and is connected to one or more routers of the AS for Internet connectivity.</t>
      <figure anchor="intra-domain">
        <name>Two Goals of intra-domain SAV</name>
        <artwork><![CDATA[
Case i: A sub network or a host originates spoofed data packets 
        using a source address out of the sub network or 
        the network segment     
Goal i: If the AS deploys intra-domain SAV,                          
        the spoofed data packets can be blocked                 
                                                                   
+----------------------------------------------------------+
| AS                      Spoofed data packets using       |
|                         a source address out of          |
|+---------------------+  the sub network or               |
|| A sub network or    |  the network segment    +--------+|
|| a host              |------------------------>| Router ||
|+---------------------+                         +--------+|
+----------------------------------------------------------+
                                                                                                                                      
Case ii: The AS receives spoofed data packets using a source 
         address of the local AS from the rest of the Internet                              
Goal ii: If the AS deploys intra-domain SAV,                         
         the spoofed data packets can be blocked                
                                                                   
        Spoofed data packets                                         
        using a source address                                  
+----+  of the local AS     +--------------------------+                          
| AS |<---------------------| The rest of the Internet |                          
+----+                      +--------------------------+                          
]]></artwork>
      </figure>
      <t>In the following, this document provides a gap analysis of the current operational intra-domain SAV mechanisms, concludes key problems to solve, and proposes basic requirements for future ones.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Sub Network: A sub network may operate its own internal routing protocols (e.g., a separate IGP), but it is considered part of the AS in the global routing system. It is connected to one or more routers of the AS for Internet connectivity. It originates traffic but does not transit traffic for other networks.</t>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        <t>SAV-specific Information: The information specialized for SAV rule generation.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Current Operational Intra-domain SAV Mechanisms</name>
      <t>Although BCP38 <xref target="RFC2827"/> and BCP84 <xref target="RFC3704"/> provides multiple ingress filtering methods which are typically used for inter-domain SAV, some of them have also been used for intra-domain SAV in practice. This section introduces the current operational mechanisms used to implement intra-domain SAV.</t>
      <ul spacing="normal">
        <li>
          <t>Access Control List (ACL) <xref target="RFC2827"/> is a SAV filter that checks the source address of every data packet against a list of acceptable or unacceptable prefixes. By performing the ACL rule at a router interface, every data packet received at this interface that does not match the ACL rule will be blocked. It can be used at router interfaces facing a sub network or a set of hosts, only allowing data packets using an acceptable source address. It is also usually used on router interfaces facing the rest of the Internet, blocking data packets using an unacceptable source address, such as internal source addresses owned by the local AS <xref target="nist-rec"/>. The ACL rule is typically configured and updated manually, so it is critical to update ACL rules in time when the set of prefixes changes.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> implements a SAV filter in an automatic way by checking the source address of every data packet against the router's local Forwarding Information Base (FIB). The router deploying strict uRPF accepts a data packet only when i) the local FIB contains a prefix covering the packet's source address and ii) the corresponding outgoing interface for the prefix in the FIB matches the packet's incoming interface. Otherwise, the packet will be blocked. Strict uRPF is often used to block spoofed data packets originated from a sub network or a directly-connected host.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> also uses the local FIB to implement SAV but checks only for the existence of the prefix. Loose uRPF accepts a data packet if the router's local FIB contains a prefix covering the packet's source address regardless of the interface from which the packet is received. Routers can use loose uRPF to block spoofed data packets using a non-global or non-routed source address <xref target="nist-rec"/>.</t>
        </li>
      </ul>
      <t>EFP-uRPF <xref target="RFC8704"/> is another advanced SAV mechanism but it is specifically designed for inter-domain SAV. It implements a SAV filter on router interfaces facing a customer AS by using BGP data provided by other ASes. This document does not analyze EFP-uRPF because it is out of the scope.</t>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>This section elaborates the gap scenarios and key problems of the current operational intra-domain SAV mechanisms.</t>
      <section anchor="subsec-gap-1">
        <name>Intra-domain SAV for Traffic from Sub Networks or Directly-Connected Hosts</name>
        <t>Towards Goal i described in <xref target="sec-intro"/> and shown in <xref target="intra-domain"/>, the AS operator can use ACL rules or strict uRPF on appropriate routers to implement intra-domain SAV for traffic originated from a sub network or a directly-connected host.</t>
        <t>For example, the AS operator can configure an ACL rule on router interfaces facing a sub network or a directly-connected host, containing a set of prefixes which can be used as the source address. By using this ACL rule, the router will block any data packet using a source address out of the set of prefixes. However, the key problem of ACL-based SAV is the high operational overhead. Since the ACL rule is typically maintained manually, the AS operator must update the ACL rule according to prefix changes or topology changes timely. If the AS operator forgets to update the ACL rule when the set of prefixes changes, the outdated ACL rule may improperly block legitimate data packets.</t>
        <t>Strict uRPF can generate and update SAV rules in an automatic way but it will improperly block legitimate data packets in the scenario of asymmetric routing or hidden prefix. In the following, this section introduces two gap scenarios when using strict uRPF to implement intra-domain SAV.</t>
        <section anchor="asymmetric-routing">
          <name>Asymmetric Routing</name>
          <t>Asymmetric routing means a packet traverses from a source to a destination in one path and takes a different path when it returns to the source. Asymmetric routing can occur within an AS due to routing policy, traffic engineering, etc. For example, a sub network connected to multiple routers of the AS may need to perform load balancing on incoming traffic, thereby resulting in asymmetric routing.</t>
          <t><xref target="multi-home"/> shows an example of asymmetric routing. The sub network owns prefix 2001:db8::/55 <xref target="RFC6890"/> and is connected to two routers of the AS, i.e., Router 1 and Router 2. Router 1, Router 2, and Router 3 exchange routing information through the intra-domain routing protocol. For load balancing of traffic flowing to the sub network, the sub network expects the incoming traffic destined for prefix 2001:db8:0::/56 to come from Router 1 and the incoming traffic destined for prefix 2001:db8:0:100::/56 to come from Router 2. To this end, it requires that Router 1 advertises the route information of prefix 2001:db8:0::/56 and Router 2 advertises the routing information of prefix 2001:db8:0:100::/56 through the intra-domain routing protocol. <xref target="multi-home"/> shows the FIB entries of Router 1 and Router 2 associated with the two prefixes.</t>
          <figure anchor="multi-home">
            <name>An example of asymmetric routing</name>
            <artwork><![CDATA[
 +----------------------------------------------------------+
 |                                                       AS |
 |                      +----------+                        |
 |                      | Router 3 |                        |
 |                      +----------+                        |
 |                       /       \                          |
 |                      /         \                         |
 |                     /           \                        |
 |            +----------+       +----------+               |
 |            | Router 1 |       | Router 2 |               |
 |            +-------#--+       +----------+               |
 |                    /\           /                        |
 |Traffic with         \          / Traffic with            |
 |source IP addresses   \        /  destination IP addresses|
 |of 2001:db8:0:100::/56 \      \/  of 2001:db8:0:100::/56  |
 |                   +----------------+                     |
 |                   |     Sub        |                     |
 |                   |    Network     |                     |
 |                   |(2001:db8::/55) |                     |
 |                   +----------------+                     |
 |                                                          |
 +----------------------------------------------------------+

 FIB of Router 1                FIB of Router 2
 Dest                Next_hop   Dest                Next_hop
 2001:db8:0::/56     Sub        2001:db8:0:100::/56 Sub
                     Nestwork                       Network
 2001:db8:0:100::/56 Router 3   2001:db8:0::/56     Router 3

 The legitimate traffic originated from sub network with 
 source addresses in 2001:db8:0:100::/56 will be improperly blocked 
 by strict uRPF on Router 1.
]]></artwork>
          </figure>
          <t>While the sub network does not expect traffic destined for prefix 2001:db8:0:100::/56 to come from Router 1, it can send traffic with source addresses of prefix 2001:db8:0:100::/56 to Router 1. As a result, there is asymmetric routing of data packets between the sub network and Router 1. Arrows in the figure indicate the flowing direction of traffic. If Router 1 adopts strict uRPF, by checking the FIB entry that matches prefix 2001:db8:0:100::/56, the SAV rule is that Router 1 only accepts data packets with a source address of 2001:db8:0:100::/56 from Router 3. Therefore, when the sub network sends data packets with a source address of 2001:db8:0:100::/56 to Router 1, strict uRPF on Router 1 will improperly block these legitimate data packets. Similarly, if Router 2 adopts strict uRPF, it will improperly block legitimate data packets from the sub network that use a source address of prefix 2001:db8:0::/56.</t>
        </section>
        <section anchor="hidden-prefix">
          <name>Hidden Prefix</name>
          <t>In the hidden prefix scenario, a host originates data packets using a source address that is hidden or invisible to the intra-domain routing protocol and intra-domain routers. The Content Delivery Networks (CDN) and Direct Server Return (DSR) technology is a representative example of hidden prefix scenario.</t>
          <figure anchor="hidden">
            <name>Hidden prefix in CDN and DSR scenario</name>
            <artwork><![CDATA[
          +-------------------------+                             
          |          AS Y           | AS Y announces the route    
          |   (where the anycast    | for anycast prefix P3
          |    server is located)   | in BGP                            
          +-----------+-------------+                             
                      |                                           
                      |                                           
          +-----------+-------------+                             
          |       Other ASes        |                             
          +-------------------------+                             
             /                    \                               
            /                      \                              
           /                        \                             
+------------------+   +---------------------------------------+   
|      AS Z        |   |         +----------+             AS X |   
| (where the user  |   |         | Router 4 |                  |   
|    is located)   |   |         +----------+                  |   
+------------------+   |              |                        |   
                       |              |                        |   
                       |         +----+-----+                  |   
                       |         | Router 5 |                  |   
                       |         +----#-----+                  |   
                       |              /\    DSR responses with |   
                       |              |     source IP addresses|   
                       |              |     of P3              |   
                       |       +---------------+               |   
                       |       |     Hosts     |               |    
                       |       |     (P2)      |               |   
                       |       +---------------+               |   
                       | (where the edge server is located)    |   
                       +---------------------------------------+   
DSR response packets from edge server with source IP addresses 
of P3 (i.e., the anycast prefix) will be improperly blocked by 
Router 5 if Router 5 uses strict uRPF.
]]></artwork>
          </figure>
          <t>For example, in <xref target="hidden"/>, when the user in AS Z sends a request to the anycast server in AS Y, the anycast server will forwards the request to the edge server in AS X which is close to the user. The edge server in AS X is connected to Router 5 and is reachable only via prefix P2. However, after receiving the request, the edge server will send DSR response packets using the source address of the anycast server (i.e., a P3 address). Since prefix P3 is hidden or invisible to Router 5, DSR response packets originated from the edge server will be improperly blocked if Router 5 uses strict uRPF to implement intra-domain SAV.</t>
          <t>Specifically, if Router 5 adopts strict uRPF, the SAV rule is that Router 5 only accepts packets with a source address of prefix P2 from the edge server. As a result, when the edge server returns DSR response packets using the source address of prefix P3, DSR response packets will be improperly blocked. In addition, even if Router 5 adopts loose uRPF, it will also improperly block these DSR response packets because prefix P3 does not exist in the FIB of Router 5.</t>
        </section>
      </section>
      <section anchor="subsec-gap-2">
        <name>Intra-domain SAV for Traffic from the Rest of the Internet</name>
        <t>Towards Goal ii described in <xref target="sec-intro"/> and shown in <xref target="intra-domain"/>, intra-domain SAV is typically deployed on router interfaces facing the rest of the Internet to block data packets using an internal source address (see <xref target="inbound-SAV"/>). ACL-based SAV is often used for this purpose. The AS operator can configure an ACL rule which contains a set of unacceptable prefixes (e.g., internal prefixes) to block any data packet using a source address of these prefixes. However, the operational overhead of maintaining ACL rules will be extremely high, especially when there are multiple router interfaces that need to configure the ACL rule as shown in <xref target="inbound-SAV"/>.</t>
        <figure anchor="inbound-SAV">
          <name>Intra-domain SAV for Traffic from the Rest of the Internet</name>
          <artwork><![CDATA[
+---------------------------------------------------+ 
|             The rest of the Internet              | 
+---------------------------------------------------+ 
              |  Data packets using an    |           
              |  internal source address  |           
              |  (e.g., P1 or P2)         |
+-------------|---------------------------|---------+ 
|   AS        \/                          \/        | 
|         +---#------+               +----#-----+   | 
|         | Router 3 +---------------+ Router 4 |   | 
|         +----------+               +----------+   | 
|          /        \                     |         | 
|         /          \                    |         | 
|        /            \                   |         | 
| +----------+     +----------+      +----------+   | 
| | Router 1 |     | Router 2 +------+ Router 5 |   | 
| +----------+     +----------+      +----------+   | 
|        \             /                  |         | 
|         \           /                   |         | 
|          \         /                    |         | 
|       +---------------+         +-------+-------+ | 
|       |    Sub        |         |     Hosts     | | 
|       |   Network     |         |               | | 
|       |     (P1)      |         |     (P2)      | | 
|       +---------------+         +---------------+ | 
|                                                   | 
+---------------------------------------------------+ 
]]></artwork>
        </figure>
        <t>In addition, loose uRPF can be used in this case to block data packets from the rest of the Internet using a non-global or non-routed source address. But it will improperly permit spoofed data packets using an internal source address because internal prefixes/addresses exist in the router's local FIB.</t>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>As analyzed above, the current operational intra-domain SAV mechanisms have significant limitations in terms of automatic update or accurate validation.</t>
      <t>ACL-based SAV entirely relies on manual maintenance and thus requires high operational overhead in dynamic networks. To guarantee accuracy of ACL-based SAV, AS operators have to manually update the ACL rule in time when the prefix or topology changes. Otherwise, improper block or improper permit problems may appear.</t>
      <t>Strict uRPF can automatically update SAV rules, but may improperly block legitimate traffic under asymmetric routing scenario or hidden prefix scenario. As analyzed in <xref target="subsec-gap-1"/>, it may mistakenly consider a valid incoming interface as invalid, resulting in legitimate data packets being blocked (i.e., improper block problem).</t>
      <t>Loose uRPF is also an automated SAV mechanism but its SAV rules are overly loose. As analyzed in <xref target="subsec-gap-2"/>, any spoofed data packet using a source address covered by the FIB will be accepted by loose uRPF (i.e., improper permit problem).</t>
      <t>In summary, the AS operator has a comprehensive perspective, so it can configure the correct ACL rules. However, manual maintenance can lead to high operational overhead and improper blocks may occur due to the negligence of the AS operator. uRPF cannot guarantee the accuracy of SAV because it solely uses the router’s local FIB information to determine SAV rules, which may not match the incoming interfaces of legitimate data packets from the source. As a result, strict uRPF will improperly block legitimate data packets in the case of asymmetric routing and hidden prefix, while loose uRPF has limited effect on preventing source address spoofing because it only blocks non-global or non-routed addresses.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section lists five general requirements for technical improvements that should be considered when designing the future intra-domain SAV architecture and solution. These informational requirements can not be used to initiate standards-track protocol changes. Any protocol changes would require a standards-track requirements document, not a non-normative reference to this informational document.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> improve the accuracy upon existing intra-domain SAV mechanisms. It <bcp14>MUST</bcp14> achieve the two goals described in <xref target="sec-intro"/> to block those spoofing traffic from sub networks, hosts, and the rest of the Internet. Meanwhile, it <bcp14>MUST</bcp14> avoid blocking legitimate data packets, especially when there are prefix changes, asymmetric routes, or hidden prefixes. To overcome the improper block problems, routers may need to use more information (e.g., SAV-specific information) besides the local FIB information to determine SAV decisions. By integrating SAV-specific information, routers may learn asymmetric routes or hidden prefixes, resulting in more accurate SAV rules.</t>
      </section>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be able to automatically generate and update SAV rules on routers, rather than relying entirely on manual updates like ACL-based SAV. Even if some necessary initial configurations may be needed to improve the accuracy of SAV, automation helps reduce subsequent maintenance overhead of the AS operator.</t>
      </section>
      <section anchor="working-in-incremental-deployment">
        <name>Working in Incremental Deployment</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> specify the deployment scope (i.e., which routers the mechanism is used on) and <bcp14>MUST</bcp14> provide incremental benefits when incrementally deployed within the specified deployment scope. That is, it <bcp14>MUST NOT</bcp14> be effective only when fully deployed within the deployment scope. In the incremental deployment scenario, it <bcp14>MUST</bcp14> be able to fulfill or partially fulfill the goals described in <xref target="sec-intro"/> and <bcp14>MUST</bcp14> avoid improper blocks.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be able to update SAV rules in time when prefix changes, route changes, or topology changes occur in an AS. Two considerations must be taken into account if SAV-specific information is communicated through a protocol. First, the mechanism <bcp14>MUST</bcp14> allow routers to learn the updated SAV-specific information in a timely manner. Second, the mechanism <bcp14>MUST NOT</bcp14> communicate too much SAV-specific information for the SAV function, because this may greatly increase the burden on the control plane of routers and even compromise the performance of the current protocols.</t>
      </section>
      <section anchor="security">
        <name>Security</name>
        <t>The new intra-domain SAV mechanisms <bcp14>MUST NOT</bcp14> introduce additional security vulnerabilities or confusion to the existing intra-domain architectures or protocols. <xref target="sec-security"/> details the security scope and security considerations for the new intra-domain SAV mechanism.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanisms can ensure integrity and authentication of protocol messages that deliver the required SAV-specific information, and consider avoiding unintentional misconfiguration. It is not necessary to provide protection against compromised or malicious intra-domain routers which poison existing control or management plane protocols. Compromised or malicious intra-domain routers may not only affect SAV, but also disrupt the whole intra-domain routing domain. Security mechanisms to prevent these attacks are beyond the capability of intra-domain SAV.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Barry Greene, Fang Gao, Kotikalapudi Sriram, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, Libin Liu, John O'Brien, Roland Dobbins, Xiangqing Chang, Tony Przygienda, Yingzhen Qu, Changwang Lin, James Guichard, Linda Dunbar, Robert Sparks, Yu Fu, Stephen Farrel etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC9256" target="https://www.rfc-editor.org/info/rfc9256" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9256.xml">
          <front>
            <title>Segment Routing Policy Architecture</title>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
            <author fullname="P. Mattes" initials="P." surname="Mattes"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
              <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9256"/>
          <seriesInfo name="DOI" value="10.17487/RFC9256"/>
        </reference>
        <reference anchor="RFC2784" target="https://www.rfc-editor.org/info/rfc2784" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2784.xml">
          <front>
            <title>Generic Routing Encapsulation (GRE)</title>
            <author fullname="D. Farinacci" initials="D." surname="Farinacci"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="S. Hanks" initials="S." surname="Hanks"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <author fullname="P. Traina" initials="P." surname="Traina"/>
            <date month="March" year="2000"/>
            <abstract>
              <t>This document specifies a protocol for encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2784"/>
          <seriesInfo name="DOI" value="10.17487/RFC2784"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC7039" target="https://www.rfc-editor.org/info/rfc7039" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7039.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Framework</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="C. Vogt" initials="C." role="editor" surname="Vogt"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>Source Address Validation Improvement (SAVI) methods were developed to prevent nodes attached to the same IP link from spoofing each other's IP addresses, so as to complement ingress filtering with finer-grained, standardized IP source address validation. This document is a framework document that describes and motivates the design of the SAVI methods. Particular SAVI methods are described in other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7039"/>
          <seriesInfo name="DOI" value="10.17487/RFC7039"/>
        </reference>
        <reference anchor="RFC6890" target="https://www.rfc-editor.org/info/rfc6890" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6890.xml">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
        <reference anchor="nist-rec" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation&quot;">
          <front>
            <title>Resilient Interdomain Traffic Exchange - BGP Security and DDoS Mitigation</title>
            <author>
              <organization/>
            </author>
            <date year="2019" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 368?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
