<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-19" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-19"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="04"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 78?>

<t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the basic requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 82?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) defends against source address spoofing. Network operators can enforce SAV at the following levels (see <xref target="RFC5210"/>):</t>
      <ul spacing="normal">
        <li>
          <t>Within the access network</t>
        </li>
        <li>
          <t>Within the domain (i.e., the autonomous system)</t>
        </li>
        <li>
          <t>Between domains (i.e., autonomous systems)</t>
        </li>
      </ul>
      <t>Access networks have already deployed SAV mechanisms. These mechanisms typically are deployed on switches and prevent hosts from using the source address of another host on the Internet. Mechanisms include:</t>
      <ul spacing="normal">
        <li>
          <t>Source Address Validation Improvement (SAVI) Solution for DHCP <xref target="RFC7513"/></t>
        </li>
        <li>
          <t>IP Source Guard (IPSG) based on DHCP snooping <xref target="IPSG"/></t>
        </li>
        <li>
          <t>Cable Source-Verify <xref target="cable-verify"/></t>
        </li>
      </ul>
      <t>Sadly, access-network SAV mechanisms are not universally deployed. Therefore, intra-domain (i.e., intra-AS) SAV or/and inter-domain (i.e., inter-AS) SAV are required.</t>
      <t>This document analyzes intra-domain SAV and focuses on deployment at external interfaces for verifying incoming traffic. SAV at internal interfaces is considered out of scope. Within a domain (i.e., an autonomous system), an external interfaces may connect to a set of hosts, a non-BGP customer network, or an external AS. As illustrated in <xref target="intra-domain"/>, the goals of intra-domain SAV can be summarized as follows:</t>
      <ul spacing="normal">
        <li>
          <t>At external interfaces facing hosts or non-BGP customer networks: Prevent them from injecting packets with source addresses they are not authorized to use into the domain</t>
        </li>
        <li>
          <t>At external interfaces facing external ASes: Prevent those ASes from injecting packets with internal-use-only source addresses into the domain</t>
        </li>
      </ul>
      <figure anchor="intra-domain">
        <name>Goals of intra-domain SAV</name>
        <artwork><![CDATA[
+---------------------------------------------------+ 
|             Other Autonomous Systems              | 
+---------------------------------------------------+ 
              |                           |           
              |                           |           
              |                           |
+-------------|---------------------------|---------+ 
|   AS        \/                          \/        | 
|         +---#------+               +----#-----+   | 
|         | Router 3 +---------------+ Router 4 |   | 
|         +----------+               +----------+   | 
|          /        \                     |         | 
|         /          \                    |         | 
|        /            \                   |         | 
| +----------+     +----------+      +----------+   | 
| | Router 1 |     | Router 2 +------+ Router 5 |   | 
| +------*---+     +--*-------+      +----X-----+   | 
|        /\           /\                  /\        | 
|         \           /                   |         | 
|          \         /                    |         | 
|      +----------------+         +---------------+ | 
|      |Non-BGP Customer|         |     Hosts     | | 
|      |   Network      |         |               | | 
|      |     (P1)       |         |     (P2)      | | 
|      +----------------+         +---------------+ | 
|                                                   | 
+---------------------------------------------------+ 

- SAV at interface 'X' prevents hosts from sending 
  packets with unauthorized source addresses (i.e., 
  addresses outside prefix P2).
- SAV at interface '*' prevents the non-BGP customer
  network from sending packets with unauthorized 
  source addresses (i.e., addresses outside prefix P1).
- SAV at interface '#' prevents the external AS from 
  injecting packets with internal-use-only source 
  addresses (e.g., prefixes P1 and P2).
]]></artwork>
      </figure>
      <t>Building on the last goal of intra-domain SAV, inter-domain SAV additionally prevents other ASes from injecting packets with other spoofed source addresses into the domain.</t>
      <t>This document provides a gap analysis of the current operational intra-domain SAV mechanisms, identifies key problems to solve, and proposes basic requirements for solutions.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Non-BGP Customer Network: A stub network connected to one or more routers of the AS for Internet connectivity. It only originates traffic and does not participate in BGP routing exchanges with the AS.</t>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        <t>SAV-specific Information: The information specialized for SAV rule generation.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Current Operational Intra-domain SAV Mechanisms</name>
      <t>Although BCP 38 <xref target="RFC2827"/> and BCP 84 <xref target="RFC3704"/> specify several ingress filtering methods primarily intended for inter-domain SAV, some of these methods have also been applied to intra-domain SAV in operational practice. This section describes the mechanisms currently used to implement intra-domain SAV.</t>
      <ul spacing="normal">
        <li>
          <t>Access Control Lists (ACLs) <xref target="RFC2827"/> are SAV filters that check the source address of each packet against a set of permitted or prohibited prefixes. When applied on a router interface, packets that do not match the ACL entries are blocked. ACLs can be deployed on interfaces facing a non-BGP customer network or a set of hosts, permitting only packets with authorized source addresses. They are also commonly used on interfaces facing an external AS to block packets with unacceptable source addresses, such as internal-use-only prefixes. Since ACLs are typically configured and updated manually, timely updates are essential whenever the set of permitted or prohibited prefixes changes.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> provides an automated SAV filter by validating the source address of each packet against the router’s local Forwarding Information Base (FIB). A packet is accepted only if (i) the FIB contains a prefix covering the source address, and (ii) the FIB entry’s outgoing interface matches the packet’s incoming interface. Otherwise, the packet is discarded. Strict uRPF is commonly used to block spoofed packets originating from a directly connected host or non-BGP customer network.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> also relies on the local FIB for validation, but only checks for the presence of a covering prefix. A packet is accepted if the FIB contains a prefix that covers the source address, regardless of the incoming interface. Loose uRPF is typically used to block spoofed packets that use non-routable or non-global source addresses.</t>
        </li>
      </ul>
      <t>Enhanced Feasible Path uRPF (EFP-uRPF) <xref target="RFC8704"/> is an advanced SAV mechanism specifically designed for inter-domain SAV. It enforces source address validation on router interfaces facing customer ASes by leveraging BGP data received from other ASes. EFP-uRPF is not analyzed in this document, as it is outside the scope of intra-domain SAV.</t>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>This section analyzes the gaps and key challenges of the current operational intra-domain SAV mechanisms.</t>
      <section anchor="subsec-gap-1">
        <name>Intra-domain SAV for Traffic from Non-BGP Customer Networks or Directly Connected Hosts</name>
        <t>To achieve the first goal described in <xref target="sec-intro"/>, an AS operator can deploy ACL rules or strict uRPF on the appropriate routers to enforce intra-domain SAV for traffic originating from non-BGP customer networks or directly connected hosts.</t>
        <t>For example, an AS operator can configure an ACL on router interfaces facing a non-BGP customer network or directly connected hosts, specifying the set of prefixes authorized for use as source addresses. The router then blocks any packet whose source address falls outside this set. The main drawback of ACL-based SAV is its high operational overhead. Because ACLs are typically maintained manually, operators must update them promptly to reflect changes in prefixes or topology. Failure to do so may result in outdated ACLs that inadvertently block legitimate traffic.</t>
        <t>Strict uRPF automatically generates and updates SAV rules, but it may drop legitimate packets in scenarios such as asymmetric routing or hidden prefixes. The following subsections describe two specific gap scenarios that arise when using strict uRPF for intra-domain SAV.</t>
        <section anchor="asymmetric-routing">
          <name>Asymmetric Routing</name>
          <t>Asymmetric routing means a packet traverses from a source to a destination in one path and takes a different path when it returns to the source. Asymmetric routing can occur within an AS due to routing policy, traffic engineering, etc. For example, a non-BGP customer network connected to multiple routers of the AS may need to perform load balancing on incoming traffic, thereby resulting in asymmetric routing.</t>
          <t><xref target="multi-home"/> illustrates an example of asymmetric routing. The non-BGP customer network owns prefix 2001:db8::/55 <xref target="RFC6890"/> and connects to two routers of the AS, Router 1 and Router 2. Router 1, Router 2, and Router 3 exchange routing information via the intra-domain routing protocol. To achieve load balancing for inbound traffic, the non-BGP customer network expects traffic destined for 2001:db8:0::/56 to enter through Router 1, and traffic destined for 2001:db8:0:100::/56 to enter through Router 2. To this end, Router 1 advertises 2001:db8:0::/56 and Router 2 advertises 2001:db8:0:100::/56 through the intra-domain routing protocol. <xref target="multi-home"/> also shows the corresponding FIB entries of Router 1 and Router 2 for the two prefixes.</t>
          <figure anchor="multi-home">
            <name>An example of asymmetric routing</name>
            <artwork><![CDATA[
 +----------------------------------------------------------+
 |                                                       AS |
 |                      +----------+                        |
 |                      | Router 3 |                        |
 |                      +----------+                        |
 |                       /       \                          |
 |                      /         \                         |
 |                     /           \                        |
 |            +----------+       +----------+               |
 |            | Router 1 |       | Router 2 |               |
 |            +-------#--+       +----------+               |
 |                    /\           /                        |
 |Traffic with         \          / Traffic with            |
 |source IP addresses   \        /  destination IP addresses|
 |of 2001:db8:0:100::/56 \      \/  of 2001:db8:0:100::/56  |
 |                   +----------------+                     |
 |                   |Non-BGP Customer|                     |
 |                   |    Network     |                     |
 |                   |(2001:db8::/55) |                     |
 |                   +----------------+                     |
 |                                                          |
 +----------------------------------------------------------+

 FIB of Router 1                FIB of Router 2
 Dest                Next_hop   Dest                Next_hop
 2001:db8:0::/56     Non-BGP    2001:db8:0:100::/56 Non-BGP
                     Customer                       Customer
                     Nestwork                       Network
 2001:db8:0:100::/56 Router 3   2001:db8:0::/56     Router 3

 The legitimate traffic originated from non-BGP customer network 
 with source addresses in 2001:db8:0:100::/56 will be improperly 
 blocked by strict uRPF on Router 1.
]]></artwork>
          </figure>
          <t>While the non-BGP customer network does not expect traffic destined for the prefix 2001:db8:0:100::/56 to arrive via Router 1, it can still send traffic with source addresses within 2001:db8:0:100::/56 to Router 1. As a result, data packets between the non-BGP customer network and Router 1 may follow asymmetric paths. Arrows in the figure indicate the direction of traffic flow.</t>
          <t>If Router 1 enforces strict uRPF by checking the FIB entry for the prefix 2001:db8:0:100::/56, the corresponding SAV rule would only allow packets with a source address from 2001:db8:0:100::/56 that arrive via Router 3. Consequently, when the non-BGP customer network sends packets with a source address in 2001:db8:0:100::/56 to Router 1, strict uRPF would incorrectly drop these legitimate packets. Similarly, if Router 2 enforces strict uRPF, it would incorrectly block legitimate packets from the non-BGP customer network that use source addresses within the prefix 2001:db8:0::/56.</t>
        </section>
        <section anchor="hidden-prefix">
          <name>Hidden Prefix</name>
          <t>The intra-domain hidden prefix scenario refers to two situations in which a host or non-BGP customer legitimately originates traffic using source addresses that are not visible to the intra-domain routing protocol:</t>
          <ul spacing="normal">
            <li>
              <t>A host (for example, a cloud server instance operated by a tenant) that originates traffic with a source address not allocated by the AS operator, for legitimate purposes such as Direct Server Return (DSR) deployments.</t>
            </li>
            <li>
              <t>A non-BGP customer network that originates traffic with a source address not advertised to the AS operator, also for valid operational reasons.</t>
            </li>
          </ul>
          <t>For ACL-based SAV, enforcing correct filtering in these scenarios requires authoritative information that explicitly specifies which source addresses the host or non-BGP customer is authorized to use. In practice, such authoritative information is often missing.</t>
          <t>Existing uRPF-based mechanisms (strict uRPF or loose uRPF) also fail in hidden prefix scenarios. They will drop packets from hidden prefixes because the source addresses are absent from the router's FIB or are received from unexpected interfaces.</t>
        </section>
      </section>
      <section anchor="subsec-gap-2">
        <name>Intra-domain SAV for Traffic from External ASes</name>
        <t>To achieve the second goal described in <xref target="sec-intro"/>, intra-domain SAV is typically deployed on router interfaces facing external ASes to block packets carrying internal-use-only source addresses (see <xref target="inbound-SAV"/>). ACL-based SAV is commonly used for this purpose. The AS operator can configure ACL rules containing a set of unacceptable prefixes (for example, internal-use-only prefixes) to block any packet with a source address within these prefixes. However, the operational overhead of maintaining ACL rules can be extremely high, particularly when multiple router interfaces require such configurations, as illustrated in <xref target="inbound-SAV"/>.</t>
        <figure anchor="inbound-SAV">
          <name>Intra-domain SAV for traffic from external ASes</name>
          <artwork><![CDATA[
+---------------------------------------------------+ 
|             Other Autonomous Systems              | 
+---------------------------------------------------+ 
              | Traffic using internal-   |           
              | use-only source addresses |           
              | (e.g., P1 or P2)          |
+-------------|---------------------------|---------+ 
|   AS        \/                          \/        | 
|         +---#------+               +----#-----+   | 
|         | Router 3 +---------------+ Router 4 |   | 
|         +----------+               +----------+   | 
|          /        \                     |         | 
|         /          \                    |         | 
|        /            \                   |         | 
| +----------+     +----------+      +----------+   | 
| | Router 1 |     | Router 2 +------+ Router 5 |   | 
| +----------+     +----------+      +----------+   | 
|        \             /                  |         | 
|         \           /                   |         | 
|          \         /                    |         | 
|      +----------------+         +---------------+ | 
|      |Non-BGP Customer|         |     Hosts     | | 
|      |   Network      |         |               | | 
|      |     (P1)       |         |     (P2)      | | 
|      +----------------+         +---------------+ | 
|                                                   | 
+---------------------------------------------------+ 
]]></artwork>
        </figure>
        <t>In addition, loose uRPF can be used in this context to block packets from external ASes that carry non-global or non-routed source addresses. However, it may allow spoofed packets using internal-use-only source addresses, since internal-use-only prefixes exist in the router's local FIB.</t>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>As discussed above, current operational intra-domain SAV mechanisms have significant limitations with respect to automatic updates and accurate validation.</t>
      <t>ACL-based SAV relies entirely on manual maintenance, resulting in high operational overhead in dynamic networks. To ensure the accuracy of ACL-based SAV, AS operators must manually update ACL rules whenever prefixes or topology change; otherwise, packets may be improperly blocked or permitted.</t>
      <t>Strict uRPF can automatically update SAV rules, but it may block legitimate traffic in the asymmetric routing or hidden prefix scenarios. As discussed in <xref target="subsec-gap-1"/>, strict uRPF may mistakenly consider a valid incoming interface as invalid, resulting in legitimate packets being dropped (i.e., an improper block problem).</t>
      <t>Loose uRPF is also an automated SAV mechanism, but its rules are overly permissive. As discussed in <xref target="subsec-gap-2"/>, any spoofed packet with a source address present in the FIB may be accepted by loose uRPF (i.e., an improper permit problem).</t>
      <t>In summary, even if an AS operator has a comprehensive view and can configure correct ACL rules, manual maintenance imposes high operational overhead and may result in improper blocks due to operator oversight. uRPF cannot guarantee the accuracy of SAV because it relies solely on the router’s local FIB to determine SAV rules, which may not correspond to the incoming interfaces of legitimate packets. Consequently, strict uRPF may block legitimate traffic in asymmetric routing and hidden prefix scenarios, while loose uRPF has limited effectiveness against source address spoofing, as it only blocks non-global or non-routed addresses. For hidden prefix scenarios, the key challenge remains how to provide authoritative information that allows the host or non-BGP customer to legitimately use such source addresses.</t>
      <t>Another consideration is that uRPF-based mechanisms rely on routing information to make SAV decisions, assuming that the routing information in the local FIB is correct. If the routing information is incorrect, SAV decisions may also be incorrect, potentially resulting in improper blocks or permits. It should be emphasized that ensuring the correctness of routing information is the responsibility of mechanisms or operational processes outside the scope of SAV. Network operators and SAV mechanisms are encouraged to leverage such solutions to validate the routing information used by SAV.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section outlines five general requirements for technical improvements that should be considered when designing future intra-domain SAV architectures and solutions. These informational requirements can not be used to initiate standards-track protocol changes.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> improve the accuracy of existing intra-domain SAV mechanisms. It <bcp14>MUST</bcp14> achieve the goals described in <xref target="sec-intro"/>, preventing spoofed traffic from entering the domain. At the same time, it <bcp14>MUST</bcp14> avoid blocking legitimate packets, particularly in the presence of prefix changes, asymmetric routes, or hidden prefixes. To overcome the improper block problems, routers may need to use additional information (e.g., SAV-specific information) beyond the local FIB information to make SAV decisions. By integrating such information, routers can account for asymmetric routes and hidden prefixes, resulting in more accurate SAV rules.</t>
      </section>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be capable of automatically generating and updating SAV rules on routers, rather than relying entirely on manual updates as in ACL-based SAV. Although some initial configuration may be necessary to improve SAV accuracy, automation reduces the subsequent operational overhead for the AS operator.</t>
      </section>
      <section anchor="working-in-incremental-deployment">
        <name>Working in Incremental Deployment</name>
        <t>The new mechanism <bcp14>MUST</bcp14> support incremental deployment and <bcp14>MUST</bcp14> provide incremental benefits under such partial deployment. In an incremental deployment scenario, the mechanism <bcp14>MUST</bcp14> avoid improper blocks and <bcp14>MUST</bcp14> clearly specify the extent to which the goals described in <xref target="sec-intro"/> can be partially achieved.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be able to update SAV rules promptly when prefixes, routes, or topology change within an AS. If SAV-specific information is communicated via a protocol, two considerations are essential. First, the mechanism <bcp14>MUST</bcp14> allow routers to learn updated SAV-specific information in a timely manner. Second, the mechanism <bcp14>MUST NOT</bcp14> transmit excessive SAV-specific information, as this could significantly increase the burden on the routers’ control planes and potentially degrade the performance of existing protocols.</t>
      </section>
      <section anchor="security">
        <name>Security</name>
        <t>The new intra-domain SAV mechanisms <bcp14>MUST NOT</bcp14> introduce additional security vulnerabilities or create confusion in existing intra-domain architectures or protocols. <xref target="sec-security"/> details the security scope and considerations for the new intra-domain SAV mechanism.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanisms can ensure the integrity and authentication of protocol messages that convey the required SAV-specific information and can help prevent unintentional misconfigurations. It is not necessary for SAV mechanisms to protect against compromised or malicious intra-domain routers that attempt to poison existing control or management plane protocols. Such compromised or malicious routers could not only affect SAV, but also disrupt the entire intra-domain routing domain. Security mechanisms to defend against these attacks are beyond the scope and capability of intra-domain SAV.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Joel Halpern, Aijun Wang, Michael Richardson, Gert Doering, Libin Liu, Li Chen, Tony Przygienda, Yingzhen Qu, James Guichard, Linda Dunbar, Robert Sparks, Stephen Farrel, Ron Bonica, etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC6890" target="https://www.rfc-editor.org/info/rfc6890" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6890.xml">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
      </references>
    </references>
    <?line 362?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
