<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-qin-savnet-authoritative-information-00" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Authoritative Information Considerations">Considerations on Authoritative Information for Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-qin-savnet-authoritative-information-00"/>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="November" day="24"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 45?>

<t>Source Address Validation (SAV) prevents source address spoofing. This document explains that SAVNET relies on authoritative information. It also describes how to handle missing or conflicting data. The guidance minimizes improper blocks and improper permits while supporting reliable SAV enforcement.</t>
    </abstract>
  </front>
  <middle>
    <?line 49?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) prevents source address spoofing and enforces BCP38 <xref target="RFC2827"/>, BCP84 <xref target="RFC3704"/>, and <xref target="RFC8704"/>. Networks rely on authoritative information to determine which source addresses are legitimate. However, networks may encounter situations where this information is missing or conflicting.</t>
      <t>This document provides a conceptual framework for understanding authoritative information in the context of SAVNET, including:</t>
      <ul spacing="normal">
        <li>
          <t>What constitutes authoritative information and which sources can be trusted.</t>
        </li>
        <li>
          <t>How networks should handle missing authoritative information.</t>
        </li>
        <li>
          <t>How to reconcile conflicting authoritative sources.</t>
        </li>
        <li>
          <t>The role of non-authoritative information as a reference in contextual or policy-based decisions.</t>
        </li>
      </ul>
      <t>By clarifying these principles, the document aims to guide the design and operation of SAV mechanisms that are both secure and operationally reliable, while minimizing improper blocks and improper permits.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="what-constitutes-authoritative-information">
      <name>What Constitutes Authoritative Information</name>
      <t>Authoritative information determines which source addresses are legitimate. To be considered authoritative, information should meet the following criteria:</t>
      <ul spacing="normal">
        <li>
          <t>Organizational authority: The source must be maintained by an entity that has recognized authority over the relevant prefixes or networks.</t>
        </li>
        <li>
          <t>Verifiability: The source must provide a mechanism to verify its correctness and authenticity, such as cryptographic validation.</t>
        </li>
        <li>
          <t>Timeliness: The information must reflect the current operational state and be updated promptly to avoid reliance on stale or outdated data.</t>
        </li>
        <li>
          <t>Integrity and security: The source must be resistant to unauthorized modifications or tampering.</t>
        </li>
      </ul>
      <t>Based on these criteria, authoritative information in SAVNET typically includes:</t>
      <ul spacing="normal">
        <li>
          <t>RPKI objects: Cryptographically verifiable objects such as ROAs (Route Origin Authorizations) <xref target="RFC9582"/>, ASPAs (Autonomous System Provider Authorizations) <xref target="I-D.ietf-sidrops-aspa-profile"/>, and TOAs (Traffic Origin Authorizations) <xref target="I-D.qin-sidrops-toa"/> that provide explicit assertions about origin authorization or transit authorization.</t>
        </li>
        <li>
          <t>Local or static configuration: Operator-defined rules specifying source address permissions for hosts, non-BGP customer networks, or external ASes.</t>
        </li>
      </ul>
      <t>Note on routing information:
Routing information from intra-domain or inter-domain protocols (e.g., IGP, BGP) may indicate reachable prefixes and their origins, but it cannot be considered authoritative by itself because it may include unauthorized or forged routes. If routing information is used to derive SAV rules, it should be validated—such as via RPKI-based Route Origin Validation (ROV)—before being treated as a trusted source.</t>
      <t>By defining authoritative information in this way, SAV mechanisms can rely on sources that provide sufficient guarantees of correctness, integrity, and timeliness, reducing the risk of improper blocks or improper permits in filtering.</t>
    </section>
    <section anchor="when-authoritative-information-is-missing">
      <name>When Authoritative Information Is Missing</name>
      <t>Networks may encounter situations where authoritative information about a particular prefix or source entity is unavailable. Such situations can arise for various reasons, including:</t>
      <ul spacing="normal">
        <li>
          <t>The relevant RPKI objects (e.g., ROAs, ASPAs, TOAs) do not exist or have not yet been published.</t>
        </li>
        <li>
          <t>Local configuration has not been defined for a newly connected host, non-BGP customer network, or external AS.</t>
        </li>
      </ul>
      <t>When authoritative information is missing, a network must decide how to handle traffic from the corresponding source addresses. Several approaches can be considered:</t>
      <ul spacing="normal">
        <li>
          <t>Conservative approach: Treat the source addresses as unauthorized and block traffic. This minimizes the risk of accepting spoofed packets but may lead to legitimate traffic being dropped.</t>
        </li>
        <li>
          <t>Permissive approach: Allow traffic from the source addresses by default. This avoids accidental disruption of legitimate communications but increases the risk of accepting spoofed packets.</t>
        </li>
        <li>
          <t>Contextual or policy-based approach: Apply local policies or heuristics to determine the appropriate action. In this approach, networks may use non-authoritative information—such as routing information, historical traffic patterns, or operational context—as a reference to make informed decisions. This allows the network to balance security and operational continuity when authoritative information is missing, while still avoiding treating non-authoritative sources as fully trusted.</t>
        </li>
      </ul>
      <t>The choice of approach depends on the operational environment, risk tolerance, and the expected reliability of other sources of authoritative information. Networks should document their chosen strategy and ensure consistency across edge interfaces to maintain predictable and secure SAV behavior.</t>
      <t>Note: Only information that meets the criteria for authoritative sources—verifiable, secure, timely, and maintained by an entity with recognized authority—should be used to make definitive filtering decisions. Missing authoritative information highlights the importance of having fallback strategies to balance security and operational continuity.</t>
    </section>
    <section anchor="when-authoritative-sources-conflict">
      <name>When Authoritative Sources Conflict</name>
      <t>Networks may encounter situations where multiple sources of authoritative information provide overlapping or apparently conflicting statements about the legitimacy of a source address or prefix. Such conflicts can arise, for example, when:</t>
      <ul spacing="normal">
        <li>
          <t>Different RPKI objects (ROAs, ASPAs, TOAs) provide overlapping assertions for the same prefix.</t>
        </li>
        <li>
          <t>Local or static configurations overlap with information from other authoritative sources.</t>
        </li>
      </ul>
      <t>Networks should treat all authoritative sources as equally credible and merge information from all sources. Any address or prefix authorized by at least one source should be considered legitimate. This approach ensures that no legitimate source address is incorrectly blocked, reducing improper blocks while maintaining reliable SAV enforcement.</t>
      <t>Fallback and reference to non-authoritative information:
When authoritative information is incomplete or missing, non-authoritative information—such as routing data—may be used as a reference within a contextual or policy-based approach (see Section 3) to help inform decisions, but it cannot be relied upon as definitive.</t>
    </section>
    <section anchor="discussion-and-next-steps">
      <name>Discussion and Next Steps</name>
      <t>This document provides a conceptual framework for understanding authoritative information in SAVNET, addressing scenarios where information is missing or conflicting. The following points highlight key considerations for SAV design and operations:</t>
      <ul spacing="normal">
        <li>
          <t>Definition of authoritative information: Networks must rely on sources that are verifiable, secure, timely, and maintained by recognized authorities, such as RPKI objects (ROAs, ASPAs, TOAs), SAV-specific signaling with security guarantees, or operator-defined local/static configuration.</t>
        </li>
        <li>
          <t>Handling missing information: When authoritative information is unavailable, fallback strategies—conservative, permissive, or contextual/policy-based using non-authoritative information as reference—should be defined.</t>
        </li>
        <li>
          <t>Conflict resolution: Conflicting authoritative sources should be merged to ensure all authorized prefixes and source addresses are preserved.</t>
        </li>
        <li>
          <t>Open questions: Additional work may include defining authoritative attributes in greater detail, coordinating with other working groups (e.g., GROW, OSPAWG) for operational guidance, and specifying mechanisms to securely exchange SAV-specific signaling information.</t>
        </li>
      </ul>
      <t>This framework provides a foundation for discussion and standardization of SAV mechanisms that rely on authoritative information, ensuring both security and operational reliability.</t>
    </section>
    <section anchor="security-and-operational-considerations">
      <name>Security and Operational Considerations</name>
      <t>Reliable SAV enforcement depends on correct identification of legitimate source addresses. Inaccurate, missing, or conflicting authoritative information can lead to operational and security risks, including:</t>
      <ul spacing="normal">
        <li>
          <t>Improper blocks: Legitimate traffic is blocked, potentially disrupting services.</t>
        </li>
        <li>
          <t>Improper permits: Spoofed or unauthorized traffic is accepted, increasing vulnerability to attacks.</t>
        </li>
      </ul>
      <t>Mitigation strategies include:</t>
      <ul spacing="normal">
        <li>
          <t>Validation and cross-checking: Ensure authoritative sources are consistent and verifiable.</t>
        </li>
        <li>
          <t>Timely updates and monitoring: Maintain freshness of authoritative information to avoid reliance on stale data.</t>
        </li>
        <li>
          <t>Documentation and operational procedures: Clearly define policies for missing, inaccurate, or conflicting authoritative information, including fallback handling.</t>
        </li>
        <li>
          <t>Fallback and reference mechanisms: Non-authoritative information (e.g., routing data) may be used as a reference in contextual or policy-based approaches but must never be treated as definitive.</t>
        </li>
        <li>
          <t>Merge strategy for conflicts: All authoritative sources should be combined, ensuring that any prefix or source address authorized by at least one source is accepted, minimizing improper blocks.</t>
        </li>
      </ul>
      <t>By implementing these practices, networks can maintain reliable SAV enforcement while reducing both security and operational risks. This approach emphasizes using authoritative information wherever possible and leveraging non-authoritative data only as a reference when necessary.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC9582" target="https://www.rfc-editor.org/info/rfc9582" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9582.xml">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9582"/>
          <seriesInfo name="DOI" value="10.17487/RFC9582"/>
        </reference>
        <reference anchor="I-D.qin-sidrops-toa" target="https://datatracker.ietf.org/doc/html/draft-qin-sidrops-toa-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.qin-sidrops-toa.xml">
          <front>
            <title>A Profile for Traffic Origin Authorizations (TOAs)</title>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <date day="25" month="June" year="2025"/>
            <abstract>
              <t>This document defines a standard profile for Traffic Origin Authorizations (TOAs), a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI). A TOA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate traffic using source IP addresses within the address block.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-qin-sidrops-toa-00"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-profile-20" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-profile.xml">
          <front>
            <title>A Profile for Autonomous System Provider Authorization</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Uskov" initials="E." surname="Uskov">
              <organization>JetLend</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders"/>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <date day="18" month="August" year="2025"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for Autonomous System Provider Authorization (ASPA) objects for use with the Resource Public Key Infrastructure (RPKI). An ASPA is a digitally signed object through which the issuer (the holder of an Autonomous System identifier), can authorize one or more other Autonomous Systems (ASes) as its upstream providers. When validated, an ASPA's eContent can be used for detection and mitigation of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-profile-20"/>
        </reference>
      </references>
    </references>
    <?line 187?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
