<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-savnet-source-prefix-advertisement-02" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="SPA-based SAVNET">Source Prefix Advertisement for Intra-domain SAVNET</title>
    <seriesInfo name="Internet-Draft" value="draft-li-savnet-source-prefix-advertisement-02"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 50?>

<t>The new intra-domain source address validation (SAV) mechanism requires improving the accuracy (especially avoiding blocking legitimate traffic) and supporting automatic update (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>). To this end, this document proposes an intra-domain SAV mechanism, called source prefix advertisement (SPA) for intra-domain SAVNET (SPA-based SAVNET for short), to advance the technology for intra-domain SAV. SPA-based SAVNET allows routers in an intra-domain network to exchange SPA information. By using SPA information and routing information, intra-domain routers can determine more accurate SAV rules in an automatic manner.</t>
    </abstract>
  </front>
  <middle>
    <?line 54?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>The main purpose of intra-domain SAV for an AS is blocking spoofing data packets from host networks and customer networks that use a source address of other networks and blocking spoofing data packets from external ASes that use a source address of the local AS (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>). However, existing uRPF mechanisms <xref target="RFC3704"/> will improperly block legitimate data packets in the case of asymmetric forwarding or asymmetric routing, while ACL-based ingress filtering relies entirely on manual update (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>).</t>
      <t>To improve the accuracy and enable automatic update, this document proposes an intra-domain SAV mechanism, called source prefix advertisement (SPA) for intra-domain SAVNET (SPA-based SAVNET for short), to advance the technology for intra-domain SAV. SPA-based SAVNET allows routers in an intra-domain network to exchange SPA information. By using SPA information and routing information, intra-domain routers can determine more accurate SAV rules in an automatic manner.</t>
      <t>The reader is encouraged to be familiar with <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/> and <xref target="I-D.ietf-savnet-intra-domain-architecture"/>.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule that describes the mapping relationship between a source address (prefix) and its valid incoming router interface(s).</t>
        <t>SAVNET Router: An intra-domain router that deploys SPA-based SAVNET.</t>
        <t>Host Network: An intra-domain stub network consists of hosts.</t>
        <t>Customer Network: An intra-domain stub network consists of hosts and routers.</t>
        <t>Host-facing Router: An intra-domain router facing an intra-domain host network.</t>
        <t>Customer-facing Router: An intra-domain router facing an intra-domain customer network.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="overview-of-spa-based-savnet">
      <name>Overview of SPA-based SAVNET</name>
      <t>The deployment scope of SPA-based SAVNET for an AS includes host-facing routers, customer-facing routers, and AS border routers. SPA-based SAVNET allows these routers to exchange SPA information through the existing internal gateway protocol (IGP). By learning SPA information from other SAVNET routers, each SAVNET router can generate an allowlist SAV rule (i.e., "Interface-based prefix allowlist" mode in <xref target="I-D.huang-savnet-sav-table"/>) or a blocklist SAV rule (i.e., "Interface-based prefix blocklist" mode in <xref target="I-D.huang-savnet-sav-table"/>) on the specific router interface:</t>
      <ul spacing="normal">
        <li>
          <t>For host-facing routers, they generate an allowlist SAV rule on interfaces facing a host network. The allowlist SAV rule exactly covers the space of source IP addresses that are used by data packets of the host network.</t>
        </li>
        <li>
          <t>For customer-facing routers, they generate an allowlist SAV rule on interfaces facing a customer network. The allowlist SAV rule exactly covers the space of source IP addresses that are used by data packets of the customer network.</t>
        </li>
        <li>
          <t>For AS border routers, they generate a blocklist SAV rule on interfaces facing an external AS. The allowlist SAV rule exactly covers the space of source IP addresses that are used by data packets of the local AS.</t>
        </li>
      </ul>
      <t>SPA-based SAVNET provides incremental benefits when incrementally deployed within the deployment scope. Every SAVNET router that adopts SPA-based SAVNET can identify spoofing data packets coming from a host network, customer network, or an AS. By using allowlist SAV rules, host-facing routers and customer-facing routers that adopt SPA-based SAVNET will block spoofing data packets from host networks and customer networks that use a source address of other networks. By using blocklist SAV rules, AS border routers that adopt SPA-based SAVNET will block spoofing data packets from external ASes that use a source address of the local AS.</t>
      <t>In the following, this document describes the protocol-independent designs for SPA-based SAVNET, include procedures for SPA information generation (in <xref target="subsec-generation"/>), SPA information communication (in <xref target="subsec-communication"/>), and SAV rule generation (in <xref target="subsec-rule"/>). SPA information communication can be implemented by using an existing routing protocol. Specific protocol designs or extensions for SPA information communication are not in the scope of this document.</t>
    </section>
    <section anchor="subsec-generation">
      <name>SPA Information Generation</name>
      <t>Each SAVNET router connected to an intra-domain stub network (e.g., a host network or a customer network) generates SPA information. The content of SPA information mainly includes two parts:</t>
      <ul spacing="normal">
        <li>
          <t>Source Prefix List (SPL): This list includes prefixes learned from the router's local routes towards the stub network. Specifically, each Dest Prefix in the router's RIB that has an outgoing interface towards the stub network will be included. If there is no asymmetric route between the SAVNET router and the stub network, the generated SPL should cover the source IP address space used by data packets of the stub network. However, if the asymmetric route exists, the generated SPL may include only a portion of the source IP address space of the stub network.</t>
        </li>
        <li>
          <t>Stub Network Identifier (SNI): This identifier indicates the identity of a stub network. Every intra-domain stub network must have a unique SNI value. Each prefix in the SPL is labeled with the SNI value of the corresponding stub network.</t>
        </li>
      </ul>
    </section>
    <section anchor="subsec-communication">
      <name>SPA Information Communication</name>
      <t>After generating SPA information, each SAVNET router will provide its SPA information to other SAVNET routers. SPA information communication can be implemented by using the IGP (e.g., OSPF, IS-IS, or IBGP). During the propagation of IGP messages, SAVNET routers can learn both routing information and SPA information.</t>
    </section>
    <section anchor="subsec-rule">
      <name>SAV Rule Generation</name>
      <t>After receiving SPA information from other SAVNET router, SAVNET routers generate allowlist SAV rules or blocklist SAV rules on specific router interfaces.</t>
      <t>The detailed procedure for allowlist generation is as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>Considering all stub network connected to the router, create a set of SNI values of these stub network. Call it Set A.</t>
        </li>
        <li>
          <t>Considering all SPA information, for each SNI value in Set A, create a set of unique source prefixes that have the same SNI value. Include these prefixes into the allowlist SAV rule at router interfaces facing the stub network which has the same SNI value.</t>
        </li>
      </ol>
      <t>The detailed procedure for blocklist generation is as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>Extract unique prefixes from SPA information and routing information learned from the IGP.</t>
        </li>
        <li>
          <t>Include these prefixes into the blocklist SAV rule at router interfaces facing an external AS.</t>
        </li>
      </ol>
    </section>
    <section anchor="sec-usecases">
      <name>Use Case</name>
      <section anchor="sav-on-host-facing-routers-customer-facing-routers-and-as-border-routers">
        <name>SAV on Host-facing Routers, Customer-facing Routers, and AS Border Routers</name>
        <t>SPA-based SAVNET is used on host-facing Routers, customer-facing Routers, and AS border routers in an intra-domain network. It is a general intra-domain SAV mechanism that apply to different network topologies (e.g., mesh topology or tree topology) or routing scenarios (e.g., asymmetric routing or symmetric routing). The network operator can incrementally deploy SPA-based SAVNET in his/her AS to gradually improve the defense against source address spoofing attacks.</t>
        <t><xref target="fig-use-case1"/> shows an example. Customer Network is multi-homed to Routers A and B. Host Network is single-homed to Router C. Routers D and E are connected to external ASes. Data packets from Customer Network can use source addresses in prefixes P1 and P2. Data packets from Host Network can use source addresses in prefix P3. P' is the source IP address space for intra-domain router IPs and link IPs. Assume there is an asymmetric forwarding behavior or an asymmetric route between Router A, Router B, and Customer Network due to traffic engineering and load balance. For example, Router A forwards only data packets with destination addresses in prefix P1 to Customer Network while forwards others to Router B. Router B forwards only data packets with destination addresses in prefix P2 to Customer Network while forwards others to Router A. However, Customer Network will sends data packets with source addresses in prefixes P1 and P2 to both routers. In this case, as described in <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>, strict uRPF on Router A's Interface # will improperly block data packets with source addresses in prefix P2, and strict uRPF on Router A's Interface # will improperly block data packets with source addresses in prefix P2, and strict uRPF on Router B's Interface # will improperly block data packets with source addresses in prefix P1.</t>
        <figure anchor="fig-use-case1">
          <name>An example of the most recommended use case of SPA-based SAVNET</name>
          <artwork><![CDATA[
            +----------------------------------+                    
            |            Other ASes            |                    
            +----------------------------------+                    
               |                             |                      
+--------------|-----------------------------|--------+             
|   AS         |                             |        |             
|        +-----#----+                  +-----#----+   |             
|        | Router D | -----------------| Router E |   |             
|        +----------+                  +----------+   |             
|              |                             |        |             
|              |                             |        |             
|              |                             |        |             
|        +----------+                  +----------+   |             
|        | Router F |                  | Router G |   |             
|        +----------+                  +----------+   |             
|         /         \                        |        |             
|        /           \                       |        |             
|       /             \                      |        |             
| +----------+   +----------+          +----------+   |             
| | Router A |---| Router B +----------+ Router C |   |             
| +----#-----+   +-------#--+          +-----#----+   |             
|       \               /                    |        |             
|        \             /                     |        |             
|         \           /                      |        |             
|        +--------------+            +--------------+ |             
|        |   Customer   |            |    Host      | |             
|        |   Network    |            |   Network    | |             
|        |  (P1 and P2) |            |    (P3)      | |             
|        +--------------+            +--------------+ |             
+-----------------------------------------------------+                                   
SAV Rules generated by SPA-based SAVNET:
- Allowlist at Router A's Interface #: [P1, P2]
- Allowlist at Router B's Interface #: [P1, P2]
- Allowlist at Router C's Interface #: [P3]
- Blocklist at Router D's Interface #: [P1, P2, P3, P']
- Blocklist at Router E's Interface #: [P1, P2, P3, P']
]]></artwork>
        </figure>
        <t>When deploying SPA-based SAVNET in this AS, SAVNET Routers A, B, and C will provide SPA information to other SAVNET routers. By using the received SPA information, Routers A and B will include both prefixes P1 and P2 in the allowlist at the Interface #, because both prefixes have the SNI value of Customer Network, even if the prefix that routers A and B learn from the local route to Customer Network may be different. Router C will include prefix P3 in the allowlist at its Interface #. Routers D and E will include all internal prefixes in the blocklist at their Interfaces #.</t>
        <t>By using the generated allowlist SAV rules or blocklist SAV rules, SPA-based SAVNET effectively blocks spoofing data packets from host networks and customer networks that use a source address of other networks and blocks spoofing data packets from external ASes that use a source address of the local AS, while avoiding blocking legitimate data packets.</t>
      </section>
      <section anchor="a-special-scenario-direct-server-return-dsr">
        <name>A Special Scenario: Direct Server Return (DSR)</name>
        <t>In the case of DSR, the content server in a stub network will send data packets using source addresses of the anycast server in another AS (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>). To avoid blocking these special data packets, these specially used source addresses must be added into the allowlist SAV rule at interfaces facing a stub network where the content server locates. Since routers as well as current routing architecture do not have this information, this may requires manual configuration.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations described in <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/> and <xref target="I-D.ietf-savnet-intra-domain-architecture"/> also applies to this document.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="I-D.huang-savnet-sav-table" target="https://datatracker.ietf.org/doc/html/draft-huang-savnet-sav-table-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.huang-savnet-sav-table.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <date day="10" month="December" year="2024"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-08"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-problem-statement-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="21" month="February" year="2025"/>
            <abstract>
              <t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-12"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-architecture-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="14" month="October" year="2024"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms [RFC3704] that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL-based ingress filtering [RFC2827] that entirely requires manual efforts to accommodate to network dynamics, SAVNET routers learn SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-architecture-01"/>
        </reference>
      </references>
    </references>
    <?line 206?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
