<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-20" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-20"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="December" day="29"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 78?>

<t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the basic requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 82?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) defends against source address spoofing. Network operators can enforce SAV at the following levels (see <xref target="RFC5210"/>):</t>
      <ul spacing="normal">
        <li>
          <t>Within the access network</t>
        </li>
        <li>
          <t>Within the domain (i.e., the autonomous system)</t>
        </li>
        <li>
          <t>Between domains (i.e., autonomous systems)</t>
        </li>
      </ul>
      <t>Access networks have already deployed SAV mechanisms. These mechanisms typically are deployed on switches and prevent hosts from using the source address of another host on the Internet. Mechanisms include:</t>
      <ul spacing="normal">
        <li>
          <t>Source Address Validation Improvement (SAVI) Solution for DHCP <xref target="RFC7513"/></t>
        </li>
        <li>
          <t>IP Source Guard (IPSG) based on DHCP snooping <xref target="IPSG"/></t>
        </li>
        <li>
          <t>Cable Source-Verify <xref target="cable-verify"/></t>
        </li>
      </ul>
      <t>Sadly, access-network SAV mechanisms are not universally deployed. Therefore, intra-domain (i.e., intra-AS) SAV or/and inter-domain (i.e., inter-AS) SAV are required.</t>
      <t>This document analyzes intra-domain SAV and focuses on deployment at external interfaces for verifying incoming traffic. SAV at internal interfaces is considered out of scope. Within a domain (i.e., an autonomous system), an external interfaces may connect to a set of hosts, a non-BGP customer network, or an external AS. As illustrated in <xref target="intra-domain"/>, the goals of intra-domain SAV can be summarized as follows:</t>
      <ul spacing="normal">
        <li>
          <t>At external interfaces facing hosts or non-BGP customer networks: Prevent them from injecting packets with source addresses they are not authorized to use into the domain</t>
        </li>
        <li>
          <t>At external interfaces facing external ASes: Prevent those ASes from injecting packets with internal-use-only source addresses into the domain</t>
        </li>
      </ul>
      <figure anchor="intra-domain">
        <name>Goals of intra-domain SAV</name>
        <artwork><![CDATA[
+---------------------------------------------------+ 
|         External Autonomous Systems (ASes)        | 
+---------------------------------------------------+ 
              |                           |           
              |                           |           
              |                           |
+-------------|---------------------------|---------+ 
|Domain       \/                          \/        | 
|         +---#------+               +----#-----+   | 
|         | Router 3 +---------------+ Router 4 |   | 
|         +----------+               +----------+   | 
|          /        \                     |         | 
|         /          \                    |         | 
|        /            \                   |         | 
| +----------+     +----------+      +----------+   | 
| | Router 1 |     | Router 2 +------+ Router 5 |   | 
| +------*---+     +--*-------+      +----X-----+   | 
|        /\           /\                  /\        | 
|         \           /                   |         | 
+----------\---------/--------------------|---------+ 
       +----------------+         +---------------+  
       |Non-BGP Customer|         |     Hosts     |  
       |   Network      |         |               |  
       |     (P1)       |         |     (P2)      |  
       +----------------+         +---------------+ 
                                                    
- SAV at external interface 'X' prevents hosts from 
  sending packets with unauthorized source addresses 
  (i.e., addresses outside prefix P2).
- SAV at external interface '*' prevents the non-BGP 
  customer network from sending packets with unauthorized 
  source addresses (i.e., addresses outside prefix P1).
- SAV at external interface '#' prevents the external 
  AS from injecting packets with internal-use-only 
  source addresses (e.g., prefixes P1 and P2).
]]></artwork>
      </figure>
      <t>Building on the last goal of intra-domain SAV, inter-domain SAV additionally prevents other ASes from injecting packets with other spoofed source addresses into the domain.</t>
      <t>This document provides a gap analysis of the current operational intra-domain SAV mechanisms, identifies key problems to solve, and proposes basic requirements for solutions.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Non-BGP Customer Network: A stub network connected to one or more routers of the AS for Internet connectivity. It only originates traffic and does not participate in BGP routing exchanges with the AS.</t>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        <t>SAV-specific Information: The information specialized for SAV rule generation.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Current Operational Intra-domain SAV Mechanisms</name>
      <t>Although BCP 38 <xref target="RFC2827"/> and BCP 84 <xref target="RFC3704"/> specify several ingress filtering methods primarily intended for inter-domain SAV, some of these methods have also been applied to intra-domain SAV in operational practice. This section describes the mechanisms currently used to implement intra-domain SAV.</t>
      <ul spacing="normal">
        <li>
          <t>Access Control Lists (ACLs) <xref target="RFC2827"/> are SAV filters that check the source address of each packet against a set of permitted or prohibited prefixes. When applied on a router interface, packets that do not match the ACL entries are blocked. ACLs can be deployed on interfaces facing a non-BGP customer network or a set of hosts, permitting only packets with authorized source addresses. They are also commonly used on interfaces facing an external AS to block packets with unacceptable source addresses, such as internal-use-only prefixes. Since ACLs are typically configured and updated manually, timely updates are essential whenever the set of permitted or prohibited prefixes changes.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> provides an automated SAV filter by validating the source address of each packet against the router’s local Forwarding Information Base (FIB). A packet is accepted only if (i) the FIB contains a prefix covering the source address, and (ii) the FIB entry’s outgoing interface matches the packet’s incoming interface. Otherwise, the packet is discarded. Strict uRPF is commonly used to block spoofed packets originating from a directly connected host or non-BGP customer network.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> also relies on the local FIB for validation, but only checks for the presence of a covering prefix. A packet is accepted if the FIB contains a prefix that covers the source address, regardless of the incoming interface. Loose uRPF is typically used to block spoofed packets that use non-routable or non-global source addresses.</t>
        </li>
      </ul>
      <t>Enhanced Feasible Path uRPF (EFP-uRPF) <xref target="RFC8704"/> is an advanced SAV mechanism specifically designed for inter-domain SAV. It enforces source address validation on router interfaces facing customer ASes by leveraging BGP data received from other ASes. EFP-uRPF is not analyzed in this document, as it is outside the scope of intra-domain SAV.</t>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>This section analyzes the gaps and key challenges of the current operational intra-domain SAV mechanisms.</t>
      <section anchor="subsec-gap-1">
        <name>Intra-domain SAV for Traffic from Non-BGP Customer Networks or Directly Connected Hosts</name>
        <t>To achieve the first goal described in <xref target="sec-intro"/>, an AS operator can deploy ACL rules or strict uRPF on the appropriate routers to enforce intra-domain SAV for traffic originating from non-BGP customer networks or directly connected hosts.</t>
        <t>For example, an AS operator can configure an ACL on router interfaces facing a non-BGP customer network or directly connected hosts, specifying the set of prefixes authorized for use as source addresses. The router then blocks any packet whose source address falls outside this set. The main drawback of ACL-based SAV is its high operational overhead. Because ACLs are typically maintained manually, operators must update them promptly to reflect changes in prefixes or topology. Failure to do so may result in outdated ACLs that inadvertently block legitimate traffic.</t>
        <t>Strict uRPF automatically generates and updates SAV rules, but it may drop legitimate packets in scenarios such as asymmetric routing or hidden prefixes. The following subsections describe two specific gap scenarios that arise when using strict uRPF for intra-domain SAV.</t>
        <section anchor="asymmetric-routing">
          <name>Asymmetric Routing</name>
          <t>Asymmetric routing means a packet traverses from a source to a destination in one path and takes a different path when it returns to the source. Asymmetric routing can occur within an AS due to routing policy, traffic engineering, etc. For example, a non-BGP customer network connected to multiple routers of the AS may need to perform load balancing on incoming traffic, thereby resulting in asymmetric routing.</t>
          <t><xref target="multi-home"/> illustrates an example of asymmetric routing. The non-BGP customer network owns prefix 2001:db8::/55 <xref target="RFC6890"/> and connects to two routers of the AS, Router 1 and Router 2. Router 1, Router 2, and Router 3 exchange routing information via the intra-domain routing protocol. To achieve load balancing for inbound traffic, the non-BGP customer network expects traffic destined for 2001:db8:0::/56 to enter through Router 1, and traffic destined for 2001:db8:0:100::/56 to enter through Router 2. To this end, Router 1 advertises 2001:db8:0::/56 and Router 2 advertises 2001:db8:0:100::/56 through the intra-domain routing protocol. <xref target="multi-home"/> also shows the corresponding FIB entries of Router 1 and Router 2 for the two prefixes.</t>
          <figure anchor="multi-home">
            <name>An example of asymmetric routing</name>
            <artwork><![CDATA[
 +----------------------------------------------------------+
 |                                                       AS |
 |                      +----------+                        |
 |                      | Router 3 |                        |
 |                      +----------+                        |
 |                       /       \                          |
 |                      /         \                         |
 |                     /           \                        |
 |            +----------+       +----------+               |
 |            | Router 1 |       | Router 2 |               |
 |            +-------#--+       +----------+               |
 |                    /\           /                        |
 |Traffic with         \          / Traffic with            |
 |source IP addresses   \        /  destination IP addresses|
 |of 2001:db8:0:100::/56 \      \/  of 2001:db8:0:100::/56  |
 |                   +----------------+                     |
 |                   |Non-BGP Customer|                     |
 |                   |    Network     |                     |
 |                   |(2001:db8::/55) |                     |
 |                   +----------------+                     |
 |                                                          |
 +----------------------------------------------------------+

 FIB of Router 1                FIB of Router 2
 Dest                Next_hop   Dest                Next_hop
 2001:db8:0::/56     Non-BGP    2001:db8:0:100::/56 Non-BGP
                     Customer                       Customer
                     Nestwork                       Network
 2001:db8:0:100::/56 Router 3   2001:db8:0::/56     Router 3

 The legitimate traffic originated from non-BGP customer network 
 with source addresses in 2001:db8:0:100::/56 will be improperly 
 blocked by strict uRPF on Router 1.
]]></artwork>
          </figure>
          <t>While the non-BGP customer network does not expect traffic destined for the prefix 2001:db8:0:100::/56 to arrive via Router 1, it can still send traffic with source addresses within 2001:db8:0:100::/56 to Router 1. As a result, data packets between the non-BGP customer network and Router 1 may follow asymmetric paths. Arrows in the figure indicate the direction of traffic flow.</t>
          <t>If Router 1 enforces strict uRPF by checking the FIB entry for the prefix 2001:db8:0:100::/56, the corresponding SAV rule would only allow packets with a source address from 2001:db8:0:100::/56 that arrive via Router 3. Consequently, when the non-BGP customer network sends packets with a source address in 2001:db8:0:100::/56 to Router 1, strict uRPF would incorrectly drop these legitimate packets. Similarly, if Router 2 enforces strict uRPF, it would incorrectly block legitimate packets from the non-BGP customer network that use source addresses within the prefix 2001:db8:0::/56.</t>
        </section>
        <section anchor="hidden-prefix">
          <name>Hidden Prefix</name>
          <t>The intra-domain hidden prefix scenario refers to two situations in which a host or non-BGP customer legitimately originates traffic using source addresses that are not visible to the intra-domain routing protocol:</t>
          <ul spacing="normal">
            <li>
              <t>A host (for example, a cloud server instance operated by a tenant) that originates traffic with a source address not allocated by the AS operator, for legitimate purposes such as Direct Server Return (DSR) deployments.</t>
            </li>
            <li>
              <t>A non-BGP customer network that originates traffic with a source address not advertised to the AS operator, also for valid operational reasons.</t>
            </li>
          </ul>
          <t>For ACL-based SAV, enforcing correct filtering in these scenarios requires authoritative information that explicitly specifies which source addresses the host or non-BGP customer is authorized to use. In practice, such authoritative information is often missing.</t>
          <t>Existing uRPF-based mechanisms (strict uRPF or loose uRPF) also fail in hidden prefix scenarios. They will drop packets from hidden prefixes because the source addresses are absent from the router's FIB or are received from unexpected interfaces.</t>
        </section>
      </section>
      <section anchor="subsec-gap-2">
        <name>Intra-domain SAV for Traffic from External ASes</name>
        <t>To achieve the second goal described in <xref target="sec-intro"/>, intra-domain SAV is typically deployed on router interfaces facing external ASes to block packets carrying internal-use-only source addresses (see <xref target="inbound-SAV"/>). ACL-based SAV is commonly used for this purpose. The AS operator can configure ACL rules containing a set of unacceptable prefixes (for example, internal-use-only prefixes) to block any packet with a source address within these prefixes. However, the operational overhead of maintaining ACL rules can be extremely high, particularly when multiple router interfaces require such configurations, as illustrated in <xref target="inbound-SAV"/>.</t>
        <figure anchor="inbound-SAV">
          <name>Intra-domain SAV for traffic from external ASes</name>
          <artwork><![CDATA[
+---------------------------------------------------+ 
|             Other Autonomous Systems              | 
+---------------------------------------------------+ 
              | Traffic using internal-   |           
              | use-only source addresses |           
              | (e.g., P1 or P2)          |
+-------------|---------------------------|---------+ 
|   AS        \/                          \/        | 
|         +---#------+               +----#-----+   | 
|         | Router 3 +---------------+ Router 4 |   | 
|         +----------+               +----------+   | 
|          /        \                     |         | 
|         /          \                    |         | 
|        /            \                   |         | 
| +----------+     +----------+      +----------+   | 
| | Router 1 |     | Router 2 +------+ Router 5 |   | 
| +----------+     +----------+      +----------+   | 
|        \             /                  |         | 
|         \           /                   |         | 
|          \         /                    |         | 
|      +----------------+         +---------------+ | 
|      |Non-BGP Customer|         |     Hosts     | | 
|      |   Network      |         |               | | 
|      |     (P1)       |         |     (P2)      | | 
|      +----------------+         +---------------+ | 
|                                                   | 
+---------------------------------------------------+ 
]]></artwork>
        </figure>
        <t>In addition, loose uRPF can be used in this context to block packets from external ASes that carry non-global or non-routed source addresses. However, it may allow spoofed packets using internal-use-only source addresses, since internal-use-only prefixes exist in the router's local FIB.</t>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>As discussed above, current operational intra-domain SAV mechanisms have significant limitations with respect to automatic updates and accurate validation.</t>
      <t>ACL-based SAV relies entirely on manual maintenance, resulting in high operational overhead in dynamic networks. To ensure the accuracy of ACL-based SAV, AS operators must manually update ACL rules whenever prefixes or topology change; otherwise, packets may be improperly blocked or permitted.</t>
      <t>Strict uRPF can automatically update SAV rules, but it may block legitimate traffic in the asymmetric routing or hidden prefix scenarios. As discussed in <xref target="subsec-gap-1"/>, strict uRPF may mistakenly consider a valid incoming interface as invalid, resulting in legitimate packets being dropped (i.e., an improper block problem).</t>
      <t>Loose uRPF is also an automated SAV mechanism, but its rules are overly permissive. As discussed in <xref target="subsec-gap-2"/>, any spoofed packet with a source address present in the FIB may be accepted by loose uRPF (i.e., an improper permit problem).</t>
      <t>In summary, even if an AS operator has a comprehensive view and can configure correct ACL rules, manual maintenance imposes high operational overhead and may result in improper blocks due to operator oversight. uRPF cannot guarantee the accuracy of SAV because it relies solely on the router’s local FIB to determine SAV rules, which may not correspond to the incoming interfaces of legitimate packets. Consequently, strict uRPF may block legitimate traffic in asymmetric routing and hidden prefix scenarios, while loose uRPF has limited effectiveness against source address spoofing, as it only blocks non-global or non-routed addresses. For hidden prefix scenarios, the key challenge remains how to provide authoritative information that allows the host or non-BGP customer to legitimately use such source addresses.</t>
      <t>Another consideration is that uRPF-based mechanisms rely on routing information to make SAV decisions, assuming that the routing information in the local FIB is correct. If the routing information is incorrect, SAV decisions may also be incorrect, potentially resulting in improper blocks or permits. It should be emphasized that ensuring the correctness of routing information is the responsibility of mechanisms or operational processes outside the scope of SAV. Network operators and SAV mechanisms are encouraged to leverage such solutions to validate the routing information used by SAV.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section outlines five general requirements for technical improvements that should be considered when designing future intra-domain SAV architectures and solutions. These informational requirements can not be used to initiate standards-track protocol changes.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> improve the accuracy of existing intra-domain SAV mechanisms. It <bcp14>MUST</bcp14> achieve the goals described in <xref target="sec-intro"/>, preventing spoofed traffic from entering the domain. At the same time, it <bcp14>MUST</bcp14> avoid blocking legitimate packets, particularly in the presence of prefix changes, asymmetric routes, or hidden prefixes. To overcome the improper block problems, routers may need to use additional information (e.g., SAV-specific information) beyond the local FIB information to make SAV decisions. By integrating such information, routers can account for asymmetric routes and hidden prefixes, resulting in more accurate SAV rules.</t>
      </section>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be capable of automatically generating and updating SAV rules on routers, rather than relying entirely on manual updates as in ACL-based SAV. Although some initial configuration may be necessary to improve SAV accuracy, automation reduces the subsequent operational overhead for the AS operator.</t>
      </section>
      <section anchor="working-in-incremental-deployment">
        <name>Working in Incremental Deployment</name>
        <t>The new mechanism <bcp14>MUST</bcp14> support incremental deployment and <bcp14>MUST</bcp14> provide incremental benefits under such partial deployment. In an incremental deployment scenario, the mechanism <bcp14>MUST</bcp14> avoid improper blocks and <bcp14>MUST</bcp14> clearly specify the extent to which the goals described in <xref target="sec-intro"/> can be partially achieved.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>The new intra-domain SAV mechanism <bcp14>MUST</bcp14> be able to update SAV rules promptly when prefixes, routes, or topology change within an AS. If SAV-specific information is communicated via a protocol, two considerations are essential. First, the mechanism <bcp14>MUST</bcp14> allow routers to learn updated SAV-specific information in a timely manner. Second, the mechanism <bcp14>MUST NOT</bcp14> transmit excessive SAV-specific information, as this could significantly increase the burden on the routers’ control planes and potentially degrade the performance of existing protocols.</t>
      </section>
      <section anchor="security">
        <name>Security</name>
        <t>Intra-domain SAV mechanisms <bcp14>MUST NOT</bcp14> introduce additional security vulnerabilities to existing intra-domain architectures or protocols. They <bcp14>MUST</bcp14> ensure the authentication of any SAV-specific information they rely on. Protecting against compromised or malicious intra-domain routers is out of scope, as such routers can compromise not only SAV but the entire intra-domain routing domain.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document discusses the limitations of existing intra-domain SAV practices and identifies problems and informational requirements for improved intra-domain SAV mechanisms. It does not specify new protocols or mechanisms and, as such, does not introduce any new security considerations.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Joel Halpern, Aijun Wang, Michael Richardson, Gert Doering, Libin Liu, Li Chen, Tony Przygienda, Yingzhen Qu, James Guichard, Linda Dunbar, Robert Sparks, Stephen Farrel, Ron Bonica, etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC6890" target="https://www.rfc-editor.org/info/rfc6890" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6890.xml">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
      </references>
    </references>
    <?line 360?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
