<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.4 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-sidrops-bicone-sav-00" category="bcp" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.1 -->
  <front>
    <title abbrev="Bicone SAV">Bicone Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-li-sidrops-bicone-sav-00"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="January" day="11"/>
    <area>Operations and Management</area>
    <workgroup>SIDROPS</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 61?>

<t>The primary design goal of source address validation (SAV) is avoiding improper block (i.e., blocking legitimate traffic) while maintaining directionality, especially in partial deployment scenarios (see <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/> and <xref target="RFC8704"/>). Existing advanced SAV solutions typically generate ingress SAV allowlist filters by using information related to customer cone. This document analyzes potential improper block problems of solely using allowlist filters. To minimize improper block, this document proposes Bicone SAV, which enhances the SAV technology by additionally using blocklist filters generated based on information related to provider cone.</t>
    </abstract>
  </front>
  <middle>
    <?line 65?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source address spoofing is one of the most serious security threats to today's Internet. It serves as a main attack vector for Distributed Denial of Service (DDoS) attacks and is commonly used in reflective DDoS attacks. To mitigate source address spoofing, many source address validation (SAV) solutions (e.g., BCP38 <xref target="RFC2827"/> and BCP84 <xref target="RFC3704"/> <xref target="RFC8704"/>) have been proposed. The primary design goal of SAV solutions is avoiding improper block (i.e., blocking legitimate traffic) while maintaining directionality, especially in partial deployment scenarios (see <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/> and <xref target="RFC8704"/>). However, previous SAV solutions cannot meet the design goal due to technical limitations (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/> and <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>).</t>
      <t>Existing advanced SAV solutions (e.g., EFP-uRPF <xref target="RFC8704"/>) typically generate ingress SAV allowlist filters by using information related to customer cone. Specifically, they aim to generate an allowlist on an interface facing a customer or lateral peer AS by identifying prefixes in the customer's or lateral peer AS's customer cone.</t>
      <t>However, solely using an allowlist may cause legitimate traffic to be blocked if the allowlist fails to cover all prefixes in a customer cone. This document analyzes potential improper block problems of solely using allowlist filters, and proposes Bicone SAV to minimize improper block. Bicone SAV focuses on generating robust ingress SAV filters for an interface facing a customer or lateral peer AS. In addition to applying an allowlist like existing advanced SAV solutions, Bicone SAV applies a blocklist generated by identifying prefixes in the provider cone.</t>
      <t>The reader is encouraged to be familiar with <xref target="RFC8704"/>, <xref target="I-D.ietf-sidrops-aspa-profile"/>, <xref target="RFC6482"/>, and <xref target="I-D.ietf-sidrops-aspa-verification"/>.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>Provider cone: the set of ASes an AS can reach by using only customer-to-provider links.</t>
    </section>
    <section anchor="sec-review">
      <name>Improper Block Problems of Solely Using An Allowlist</name>
      <t>The basic idea of existing advanced SAV solutions is generating an allowlist by using information related to a customer's (or lateral peer's) customer cone. Specifically, they identify prefixes in a customer's (or lateral peer's) customer cone and only accepts data packets with source addresses belonging to these prefixes on the interface facing that customer (or lateral peer). This is because data packets received from a customer or lateral peer should use source addresses belonging to prefixes in the customer's or lateral peer's customer cone unless there is a route leak <xref target="RFC7908"/>.</t>
      <t>EFP-uRPF (BCP84 <xref target="RFC8704"/>) generates allowlists by using BGP UPDATE messages related to the customer cone. However, if a multi-homed AS in the customer cone limits the propagation of its prefixes, EFP-uRPF may miss these prefixes in the allowlist, resulting in improper block. Section 3.3 of <xref target="RFC8704"/> has given such an example of limited propagation of prefixes where a multi-homed customer AS attaches NO_EXPORT to all prefixes announced to one transit provider. <xref target="fig-example"/> illustrates a similar scenario of limited propagation of prefixes in customer cone. Since AS1 attaches NO_EXPORT to routes for P1 and P2 announced to AS2, routes for P1 and P2 are not propagated on the AS2-AS4 interface. Because AS4 never receives routes for P1 and P2 from its customer AS2, both EFP-uRPF Algorithm A and Algorithm B at AS4 will block legitimate data packets received on AS4-AS2 interface with source addresses in P1 or P2.</t>
      <figure anchor="fig-example">
        <name>An example of limited propagation of prefixes in the customer cone</name>
        <artwork><![CDATA[
                           P1[AS5 AS3 AS1]
                           P2[AS5 AS3 AS1]
               +---------+ (P2P/P2C) +---------+
               |   AS4   |<----------+   AS5   |
               +---------+           +---------+
                    /\                 /\
      P1 and P2 not /                  / P1[AS3 AS1]
       propagated  /                  /  P2[AS3 AS1]
            (C2P) /                  /   (C2P)
           +---------+       +---------+
           |   AS2   |       |   AS3   |
           +---------+       +---------+
                 /\           /\
P1[AS1] NO_EXPORT \           / P1[AS1]
P2[AS1] NO_EXPORT  \         /  P2[AS1]
            (C2P)   \       /   (C2P)
                   +---------+
                   |   AS1   |
                   +---------+
                      P1, P2 (prefixes originated)

]]></artwork>
      </figure>
      <t>Some more recent SAV solutions (e.g., BAR-SAV <xref target="I-D.ietf-sidrops-bar-sav"/>) additionally use Autonomous System Provider Authorization (ASPA) <xref target="I-D.ietf-sidrops-aspa-profile"/> and Route Origin Authorization (ROA) <xref target="RFC6482"/> to generate a more robust allowlist. However, since registering ASPAs and ROAs is optional for network operators, ASPAs and ROAs will be partially deployed for a long time. When some ASPAs and ROAs are missing, the SAV solution will still fail to discover all prefixes in a customer's or lateral peer's customer cone, leading to improper block.</t>
      <t>Overall, considering the complexity of inter-domain routing, existing SAV solutions which solely use an allowlist may fail to identify all prefixes in a customer's (or lateral peer's) customer cone. In this case, the generated allowlist may result in improper block. To minimize improper block, Bicone SAV additionally generates a blocklist on an interface facing a customer or lateral peer by using BGP UPDATE messages, ASPAs, and ROAs that are related to the provider cone.</t>
      <t>In the following, <xref target="sec-generate"/> describes how to generate the blocklist and <xref target="sec-filtering"/> describes how to perform more robust ingress SAV filtering by using both allowlist and blocklist filters.</t>
    </section>
    <section anchor="sec-generate">
      <name>Generating A Blocklist Using Information Related to Provider Cone</name>
      <t>Bicone SAV enhances the robustness of SAV through using a blocklist on an interface facing a customer or lateral peer. The provider cone of an AS is defined as the set of ASes an AS can reach by using only customer-to-provider links. Considering prefixes associated with ASes in the provider cone should not be used as source addresses in data packets received from any customer or lateral peer AS unless there is a route leak <xref target="RFC7908"/>. The blocklist should contain prefixes belonging to the provider cone.</t>
      <t>To generate a blocklist, an AS first identifies ASes in its provider cone by using ASPAs and AS-PATH in BGP UPDATE messages. Then, it discovers prefixes belonging to these ASes in provider cone and includes those prefixes in the blocklist. Data packets received from customers or lateral peers with source addresses in the blocklist should be blocked.</t>
      <t>Note that if an AS cannot identify all ASes in the provider cone when ASPAs are partially deployed, the generated blocklist will not include all prefixes in the provider cone. In this case, the generated blocklist can still block spoofing traffic received from customers and lateral peers with source addresses in the blocklist. Therefore, Bicone SAV provides immediate incremental benefits to early adopters.</t>
      <t>A detailed description of blocklist generation procedure is as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>Create the set of all directly connected Provider ASNs. Call it AS-set Z(1).</t>
        </li>
        <li>
          <t>Create the set of all unique AS_PATHs in Adj-RIBs-In of all interfaces facing Providers.</t>
        </li>
        <li>
          <t>For each unique AS_PATH with N (N&gt;1) ASNs, i.e., [ASN_{1}, ASN_{2}, ..., ASN_{i}, ASN_{i+1}, ..., ASN_{N}] where ASN_{i} is the ith ASN in AS_PATH and the first ASN (i.e., ASN_{1}) is a directly connected Provider ASN. If all unique AS_PATHs have been processed, go to Step 8.</t>
        </li>
        <li>
          <t>Let i = N</t>
        </li>
        <li>
          <t>Decrement i to i-1.</t>
        </li>
        <li>
          <t>If ASN_{i} authorizes ASN_{i+1} as a Provider in ASN_{i}'s ASPA, ASNs from ASN_{1} to ASN_{i+1} (i.e., ASN_{1}, ASN_{2}, ..., ASN_{i}, and ASN_{i+1}) are included in AS-set Z(1) and go to Step 3.</t>
        </li>
        <li>
          <t>If i == 1, go to Step 3. Else, go to Step 5.</t>
        </li>
        <li>
          <t>Let k = 1.</t>
        </li>
        <li>
          <t>Increment k to k+1.</t>
        </li>
        <li>
          <t>Create AS-set Z(k) of ASNs that are not in AS-set Z(k-1) but are authorized as Providers in ASPAs of any ASN in AS-set Z(k-1).</t>
        </li>
        <li>
          <t>If AS-set Z(k) is null, then set k_max = k-1 and go to Step 12. Else, form the union of AS-set Z(k) and AS-set Z(k-1) as AS-set Z(k) and go to Step 9.</t>
        </li>
        <li>
          <t>Select all ROAs in which the authorized origin ASN is in AS-set Z(k_max). Form the union of the sets of prefixes in the selected ROAs. Call it Prefix-set P1.</t>
        </li>
        <li>
          <t>Using the routes in Adj-RIBs-In of all interfaces facing Providers, create a set of prefixes originated by any ASN in AS-set Z(k_max). Call it Prefix-set P2.</t>
        </li>
        <li>
          <t>Form the union of Prefix-set P1 and Prefix-set P2. Apply this union set as a blocklist on every interface facing a Customer or Lateral Peer.</t>
        </li>
      </ol>
    </section>
    <section anchor="sec-filtering">
      <name>Using Both Allowlist and Blocklist Filters</name>
      <t>Although using a blocklist helps reduce improper block when an allowlist does not include all prefixes in a customer's or lateral peer's customer cone, it may also block legitimate traffic in the CDN and DSR scenario as existing SAV solutions do (see <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/> and <xref target="I-D.ietf-sidrops-bar-sav"/>). To minimize improper block, it is recommended to use both allowlist and blocklist filters. The allowlist is generated by discovering as many prefixes in the customer's or lateral peer's customer cone as possible (see <xref target="RFC8704"/> and <xref target="I-D.ietf-sidrops-bar-sav"/>) and the blocklist is generated by discovering as many prefixes in the provider cone as possible (see <xref target="sec-generate"/>).</t>
      <t>A detailed description of SAV procedure is as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>Check if source addresses of data packets received from a customer or lateral peer are included in the corresponding allowlist. If so, these data packets are accepted. If not, go to Step 2.</t>
        </li>
        <li>
          <t>Check if source addresses of data packets received from a customer or lateral peer are included in the corresponding blocklist. If so, these data packets are blocked. If not, these data packets should be accepted to avoid improper block.</t>
        </li>
      </ol>
      <t>If an AS can make sure the generated allowlist covers all prefixes in a customer's or lateral peer's customer cone, it does not need to use a blocklist on that corresponding interface and can only accept data packets received on that interface with source addresses in the allowlist.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations described in <xref target="RFC8704"/>, <xref target="I-D.ietf-sidrops-bar-sav"/>, <xref target="I-D.ietf-sidrops-aspa-profile"/>, <xref target="RFC6482"/>, and <xref target="I-D.ietf-sidrops-aspa-verification"/> also applies to this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-profile-17" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-profile.xml">
          <front>
            <title>A Profile for Autonomous System Provider Authorization</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Uskov" initials="E." surname="Uskov">
              <organization>JetLend</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <date day="7" month="November" year="2023"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for Autonomous System Provider Authorization (ASPA) objects for use with the Resource Public Key Infrastructure (RPKI). An ASPA is a digitally signed object through which the issuer (the holder of an Autonomous System identifier), can authorize one or more other Autonomous Systems (ASes) as its upstream providers. When validated, an ASPA's eContent can be used for detection and mitigation of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-profile-17"/>
        </reference>
        <reference anchor="RFC6482" target="https://www.rfc-editor.org/info/rfc6482" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6482.xml">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6482"/>
          <seriesInfo name="DOI" value="10.17487/RFC6482"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-verification" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-verification-16" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-verification.xml">
          <front>
            <title>BGP AS_PATH Verification Based on Autonomous System Provider Authorization (ASPA) Objects</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Bogomazov" initials="E." surname="Bogomazov">
              <organization>Qrator Labs</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan &amp; Arrcus, Inc.</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="29" month="August" year="2023"/>
            <abstract>
              <t>This document describes procedures that make use of Autonomous System Provider Authorization (ASPA) objects in the Resource Public Key Infrastructure (RPKI) to verify the Border Gateway Protocol (BGP) AS_PATH attribute of advertised routes. This type of AS_PATH verification provides detection and mitigation of route leaks and improbable AS paths. It also provides protection, to some degree, against prefix hijacks with forged-origin or forged-path-segment.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-verification-16"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-problem-statement-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="17" month="August" year="2023"/>
            <abstract>
              <t>This document provides the gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-02"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="22" month="August" year="2023"/>
            <abstract>
              <t>This document provides the gap analysis of existing inter-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-02"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-bar-sav" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-bar-sav-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-bar-sav.xml">
          <front>
            <title>Source Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-SAV)</title>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <author fullname="Igor Lubashev" initials="I." surname="Lubashev">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Doug Montgomery" initials="D." surname="Montgomery">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="12" month="September" year="2023"/>
            <abstract>
              <t>Designing an efficient source address validation (SAV) filter requires minimizing false positives (i.e., avoiding blocking legitimate traffic) while maintaining directionality (see RFC8704). This document advances the technology for SAV filter design through a method that makes use of BGP UPDATE messages, Autonomous System Provider Authorization (ASPA), and Route Origin Authorization (ROA). The proposed method's name is abbreviated as BAR-SAV. BAR-SAV can be used by network operators to derive more robust SAV filters and thus improve network resilience. This document updates RFC8704.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-bar-sav-02"/>
        </reference>
        <reference anchor="RFC7908" target="https://www.rfc-editor.org/info/rfc7908" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7908.xml">
          <front>
            <title>Problem Definition and Classification of BGP Route Leaks</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="B. Dickson" initials="B." surname="Dickson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>A systemic vulnerability of the Border Gateway Protocol routing system, known as "route leaks", has received significant attention in recent years. Frequent incidents that result in significant disruptions to Internet routing are labeled route leaks, but to date a common definition of the term has been lacking. This document provides a working definition of route leaks while keeping in mind the real occurrences that have received significant attention. Further, this document attempts to enumerate (though not exhaustively) different types of route leaks based on observed events on the Internet. The aim is to provide a taxonomy that covers several forms of route leaks that have been observed and are of concern to the Internet user community as well as the network operator community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7908"/>
          <seriesInfo name="DOI" value="10.17487/RFC7908"/>
        </reference>
      </references>
    </references>
    <?line 201?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
