<?xml version="1.0" encoding="iso-8859-1" ?>
<!DOCTYPE rfc [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC7115 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7115.xml">
<!ENTITY RFC5210 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
<!ENTITY RFC6811 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6811.xml">
<!ENTITY RFC9319 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9319.xml">
<!ENTITY RFC3704 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
<!ENTITY RFC8704 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
<!ENTITY RFC4632 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4632.xml">
<!ENTITY RFC6480 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6480.xml">
<!ENTITY RFC7128 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7128.xml">
<!ENTITY RFC6493 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6493.xml">
<!ENTITY I-D.ietf-sidrops-aspa-verification SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-verification.xml">
<!ENTITY I-D.wu-savnet-inter-domain-architecture SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.wu-savnet-inter-domain-architecture.xml">
<!ENTITY I-D.ietf-savnet-inter-domain-problem-statement SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
<!ENTITY I-D.ietf-sidr-bgpsec-protocol SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidr-bgpsec-protocol.xml">
]>

<?rfc toc="yes" ?>
<?rfc symrefs="yes" ?>
<?rfc sortrefs="yes" ?>
<?rfc compact="yes" ?>
<?rfc subcompact="no" ?>

<rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="bcp" ipr="trust200902" docName="draft-song-savnet-inter-domain-bgp-ops-03" consensus="true" submissionType="IETF" tocInclude="true" symRefs="true" sortRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
<front>
        <title abbrev="BGP Policy for Inter-domain SAV"> BGP Operations for Inter-domain SAVNET
 </title>

  <author fullname="Xueyan Song" initials="X." surname="Song">
      <organization>ZTE Corporation</organization>
     <address>
       <postal>
         <street/>

         <!-- Reorder these if your country does things differently -->

         <city/>

         <region/>

         <code/>

         <country>China</country>
       </postal>

       <email>song.xueyan2@zte.com.cn</email>

       <!-- uri and facsimile elements may also be added -->
     </address>
    </author>
	
  <author fullname="Chunning Dai" initials="C." surname="Dai">
      <organization>ZTE Corporation</organization>
     <address>
       <postal>
         <street/>

         <!-- Reorder these if your country does things differently -->

         <city/>

         <region/>

         <code/>

         <country>China</country>
       </postal>

       <phone/>

       <email>dai.chunning@zte.com.cn</email>

       <!-- uri and facsimile elements may also be added -->
     </address>
    </author>
	
  <author fullname="Shengnan Yue" initials="S." surname="Yue">
      <organization>China Mobile</organization>
     <address>
       <postal>
         <street/>

         <!-- Reorder these if your country does things differently -->

         <city/>

         <region/>

         <code/>

         <country>China</country>
       </postal>

       <phone/>

       <email>yueshengnan@chinamobile.com</email>

       <!-- uri and facsimile elements may also be added -->
     </address>
    </author>
	
  <author fullname="Changwang Lin" initials="C." surname="Lin">
      <organization>New H3C Technologies</organization>
     <address>
       <postal>
         <street/>

         <!-- Reorder these if your country does things differently -->

         <city/>

         <region/>

         <code/>

         <country>China</country>
       </postal>

       <phone/>

       <email>linchangwang.04414@h3c.com</email>

       <!-- uri and facsimile elements may also be added -->
     </address>
    </author>
	
    <date month="October" day="9" year="2024"/>		

  
    <area>Routing</area>
    <workgroup>SAVNET Group</workgroup>

    <keyword>Request for Comments</keyword>
    <keyword>RFC</keyword>
    <keyword>Internet Draft</keyword>
    <keyword>I-D</keyword>

    <abstract>
    <t>  This document attempts to present BGP policy-based solution for source address validation in inter-domain networks.</t>
    </abstract>
    
</front>
  
<middle>

   <section title="Introduction">
  
   <t> It is well known that internet routing security challenges include: route leaks, route prefix hijacking and source address spoofing. 
   To address these challenges, Resource Public Key Infrastructure (RPKI) provides an approach to build a formally verifiable database of IP
   addresses and AS numbers as resources. And there are RPKI-based BGP Prefix Origin Validation (POV) (see <xref target="RFC7115"/>) and BGP AS path validation
   (see <xref target="I-D.ietf-sidrops-aspa-verification"/>) to mitigate route leaks. The Route Origin Authorization currently used for RPKI-ROA 
   (see <xref target="RFC6811"/>, <xref target="RFC9319"/>) prevents hijacking of route prefix. Source Address
   Validation (SAV) is one feasible way to filter invalid address and mitigate source address spoofing attacks in the data plane. </t>
   <t> To help reduce source address spoofing attacks in networks the feasible way is to validate whether the source address is spoofed or not. 
   The security requirement is the ability to validate the accuracy of incoming interface of the traffic for specific IP address prefixes. More 
   specifically, one router needs to validate that the incoming interface receiving the source IP address prefixes is in fact the right interface. 
   This document describes a BGP validation mechanism to satisfy this security requirement in inter-domain networks.</t>
  
    <t> As analyzed at <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>, there are existing urpf-like mechanisms which describe an approach to 
	build source address filtering. However, the urpf technologies may improperly permit spoofed traffic or block legitimate traffic. For example, 
	strict uRPF (see <xref target="RFC3704"/>) technology is a simple way to implement and provides a very reasonable way to single-homing scenarios
	for ingress filtering. But in asymmetrical or multi-homing scenarios it brings wrong block for logic source address prefixes. Loose URPF [RFC3704]
	takes a looser validation mechanism than strict URPF to avoid improper block but may permit improperly spoofed source address. However, the urpf
	technologies may improperly permit spoofed traffic or block legitimate traffic. The FP-uRPF (see <xref target="RFC3704"/>) attempts to strike the banlance 
	of the strict and loose uRPF but still has some shortcoming. The EFP-uRPF (see <xref target="RFC8704"/>) provides a more feasible way in overcoming 
	the improper block of strict uRPF in asymetric routing scenario, but EFP-uRPF has not been implemented in practical networks yet.</t> 
    
	<t> The BGP validation mechanism introduced in this document aims to reduce false positives regarding invalid incoming interface, mitigate 
	source address spoofing, resolve the inflexibility about directionality of strict-URPF to improve accuracy of source address validation in 
	inter-domain networks. It also provides deployment considerations for Source Address Validation using BGP in inter-domain networks.</t> 
  
   </section>
 
  <section title="Conventions">
 
  <section title="Requirements Language">  
	<t> The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", 
	"NOT RECOMMENDED", "MAY", and   "OPTIONAL" in this document are to be interpreted as described in BCP 14 
	<xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>	
  </section> 
 
   <section title="Terminology">  
	 <t> The following terms in this document are used:</t>
	 <ol spacing="compact">
     <li>Prefix: Has the content (IP address, prefix length), interpreted as customary (see <xref target="RFC4632"/>).</li>
     <li>Incoming Interface: The interface which received the traffic of source route prefixes.</li>
     <li>Route Prefix: The prefix derived from a route.</li>
     <li>Secure Domain Identifier: A tag for BGP source prefix Secure Domain Identification (SDI).</li>
     </ol>
  </section> 
  
  </section> 
 
   <section title="BGP Policy-based Solution">  
	 <t> From the perspective of BGP implementation architecture, to address the threats which includes route leaks, route prefix 
	 hijacking and source address spoofing, the key for secure communication is to protect the integrity and authenticity of BGP 
	 information. The secure technology includes origin and path authentication. The origin authentication means to protect the 
	 mapping between the prefix and its corresponding origin AS. RPKI (see <xref target="RFC6480"/>, <xref target="RFC6493"/>, 
	 <xref target="RFC7128"/>) can be used to support
	 route prefix origin authentication. The path authentication means to protect the entire AS_path of BGP route prefix. BGPsec 
	 (see <xref target="I-D.ietf-sidr-bgpsec-protocol"/>) is used to address this issue. Meanwhile, BGPsec relies on RPKI which obtains ROA 
	 (Route Origin Authentication) to verify the authenticity of prefix origins (AS numbers mapping with IP address prefixes) 
	 and router certificates to prove the router represent an AS an its public key.</t>
	 
	 <t> Refer to <xref target="RFC5210"/>, the inter-AS domain SAVNET networks are classified into 2 cases:</t>
	 <ol spacing="compact">
     <li> Two SAV-compliant ASes exchanging traffic are directly connected;</li>
     <li> Two SAVA-compliant ASes are separated by one or more intervening, non-SAVA-compliant providers.</li>
     </ol>
	 
	 <t> For case 1, it's obvious that the combined methods BGPsec as well as RPKI and ROA can be used to address source address spoofing attacks.</t>
	 <t> For case 2, the document introduces an optional new SAV method which called BGP policy-based solution for dis-adjacent AS domains. 
	 It's noted that the existing SAV methods (e.g., uRPF, ACL, etc.) can also be implemented in combination with BGP policy-based method 
	 considering the internet network area is so large.</t>
  </section> 
  
 
   <section title="General Solution Considerations">  
	 <t> This document introduces a BGP policy-based solution for inter-domain SAVNET. The main considerations are showed as follows:</t>
	 <ol spacing="compact">
	 <li> Secure Domain Indicator (SDI),Each secure domain MUST be assigned a secure domain indicator (SDI) which MUST be unique within the reachable 
	 network. The secure domain may be managed by SAVNET controller or management system, which can be ISPs or 3-party organizations. The secure 
	 domain management system is responsible for the lifecycle management of SDIs, including joining, modifying and leaving from one specific secure domains. </li>
     <li> Export policy for prefix SDI advertisement, which describes the policy for prefix advertisement. The document introduces secure domain method
	 for mapping of source prefix packets. A secure domain which is a collection of source prefixes (can also be AS, router, etc.) which communicate with 
	 confidentiality and authenticity guarantees using a shared secret. The secure domain identifier can be the same and can be different across multi-domains 
	 which may be mapped.</li>   
     <li> Import policy for interface SDI mapping, which is applied to the incoming interface of received packets for filtering through policy mapping 
	 of packets. It means the incoming interface SHOULD create the mapping policy with SDI for specific secure domain filtering.</li>
     <li> SAVNET rules gerneration, which describes the mapping rules of prefix with the incoming interface of packets. The prefix-to-interface mapping 
	 is introduced in the section 4.2.</li>  
     <li> SAV validation function, decision process which uses comparing results for validation of import policy with the ingress packets. The SAV function
	 for the decision is introduced in section 4.3. </li>
     </ol>	 
	 
   <section title="Secure Domain">	 
	 <t> A central concept for the BGP SAV method is to use secure domain for mapping of source prefix (which may also be AS, router, etc.) for 
	 secure network communication. The secure domain is added when BGP prefix is advertised to its BGP neighbor. The Secure Domain Identifier (SDI) 
	 can be managed by SAVNET controller or be configured route-map policy by SAVNET Agent.</t>

     <t> The secure domain spans from route prefix to all routers within domains. The document does not exclude the same secure domain SDI cross 
	 multiple domains. The premise here is the different secure domain identifier should be mapped or binded for validation of inter-domain SAVNET networks.</t>
	 
     <t> If one specific source prefix packets scheduled in a secure domain while need be filtered for specific secure requirement, then the existing 
	 SAV methods, for example ACL and QoS policy are considered to be in combination used with BGP policy-based solution. </t> 	 
	 
  </section> 
 
 
   <section title="Prefix-to-Interface Mapping">
	
     <t> The document assumes that Source Address Validation needs only be done by edge routers (or AS boarder routers) in a network and is deployed on current routers 
	 without significant hardware upgrades. The BGP policy-based method introduced in this document does not need to update current routers with hardware upgrades nor big software updates. 
	 The mapping policy described in this section used for SAVNET rules generation should be used in boarder routers (i.e., ASBR) from other large networks (such as small stub, 
	 enterprise, edge networks, etc.). </t>

	 <t> The deployment for prefix-to-interface mapping policy on routers is verified locally using BGP policy-based validation method which is listed as the following:</t>	 
	 <ol spacing="compact">
     <li>Create prefix-to-interface mapping policy and apply the policy to the incoming interface of the source address received from 
	 the packets of one specific address prefix. It means that the secure domain is set for the incoming interface of the traffic, the security domain identifier is matched with the 
	 SDI carried in the route prefix message entering this interface, and a mapping table (or SAVNET rule or mapping table) between this interface and the route prefix is generated.</li>
     <li>When the source prefix packets are received that will be validated whether the SDI tag carried in the BGP route prefix is mapped with the incoming interface. If mapped, 
	 the packets received are permit to transit; if not, the packets received should be discarded or redirected to other interfaces based-on the deployed route policy. 
	 The filtering SAV function is introduced in section 4.3.</li>
     </ol>
	 
  </section>  	

  <section title="SAV Function">  

	
	<t> An implementation should provide the ability to match the validation policy and set validation state of routes as part of its source address 
	validation policy SAV function. The SAV function involves 2 characters: source address prefix and incoming interface.</t>
	<t> The objectives of SAV function include (1) set prefix-to-interface mapping of BGP route prefix from BGP neighbor with the incoming interface 
	as route policy deployed at the edge routers, (2) match the validation mapping policy and (3) decide the validation state for the source address.
	When the traffic of one specific address prefix received at one interface of the edge routers, the validation policy should be deployed and filtered
	 the source address. And based-on the validation state the source address should be validated correctly.</t>
 
 
	<t> The validation state is considered to include:</t>
	<ul spacing="compact">
	<li>Valid: The address prefix of received traffic matches the incoming interface.</li>
	<li>Invalid: The address prefix of received traffic does not match the incoming interface.</li>
	<li>NotFound: The address prefix of received traffic is not found.</li>
	</ul>
	
	<t> When the source address received of traffic which prefix derived from the BGP route is not matched with the incoming interface, the validation 
	state is considered as "Invalid". Only the prefix matched with the incoming interface the validation state is set as "valid". Similarly, if no valid
	route be found its corresponding address packets should be discarded and its validation state should be set as "NotFound".</t>
 
   </section>  
  </section> 
  
	<section title="Scalability">

	<t> The secure domain can be deployed as different granularity to satisfy scalability requirements for source address validation. The document provides 
	the following policies: </t>

	<ul spacing="compact">
	<li>AS level Secure Domain Identifier (AS SDI): The AS number information which can be obtained along the prefix advertisement is used for SAV 
	filtering policy. </li>
	<li>Community level Secure Domain Identifier (Community SDI): The policy uses BGP Community feature for source address validation. It may require 
	BGP extentions to carry the necessary SDI information.</li>
	<li>Router level Secure Domain Identifier (Router SDI): This is one practical way to reuse some of the existing fields to indicate the directionality 
	or location of the source packets belong to. The policy suggests to use router-id as SDI.</li>
	<li>Prefix level Secure Domain Identifier (Prefix SDI): The policy is the smallest filtering granularity for source address validation. The traffic
	packets received at incoming interface of BGP ASBR are validated by the SDI. Considering the inter BGP domains may be managed by different operators, 
	the Prefix SDI is recommended be deployed as local policy.</li>
	</ul>		
	
    </section>
  
   <section title="Multi-homing Scenarios">  
 	<t> This section provides examples for the BGP policy-based method for inter-domain SAVNET networks. </t>  
	<section title="Scenario 1">    
   
   <t> In terms of the URPF technologies may improperly permit spoofed traffic or block legitimate traffic, the URPF enhancements for solving 
   limitations of strict URPF for inter-domain networks is mainly on improvement of ingress filtering accuracy in multi-homing scenarios.</t>
   
   <t> The following figure 1 shows an example for Content Delivery Networks (CDN) service access to Service Provider Networks (SPN) through the
   Internet Service Provider (ISP) networks. For the ISPs are outside networks of SPN, the SPN needs to verify the validity of source address 
   prefix of traffic received from ISPs. The CDN1 announces source prefix A to the ISP100 and ISP200, announces source prefix B to ISP100, and prefix
   C to ISP200. The POP1 (Point of Presence) is the point or infrastructure used for access of ISP100 and ISP200. The POP1 learns routes directly 
   connected ISPs and some non-directly connected ISPs/CDNs from multiple ISPs. The set of routes learned from the same non-directly connected
   ISP is inconsistent but overlapped.</t> 
 
   <t> It's assumed that the prefix from ISPs in the following figure are trusted.</t> 
 
<figure anchor="Figure_1" title="SAV Functions for CDN Multi-homing Scenario">
<artwork align="left"> <![CDATA[		 
                      Prefix:A,B,D,F
                      +------------+
                   /--|   ISP100   |---\
   +---------+    /   +------------+    \
   | SP      |   /1                      \ Prefix: A,B,C
   |        +----+                        +----------+
   |        |POP1|                        |   CDN1   |
   |        +----+                        +----------+
   +---------|   \2   +------------+    /
                  \---|   ISP200   |---/
                      +------------+
                      Prefix:A,C,E,F
]]>

</artwork>
 </figure>	 


    <t> It's assumed that the SDI for the prefix origin from ISP100 is set as 100, and SDI for ISP200 is set as 200. The prefix-to-interface mapping rule is 
	based-on AS level and is showed as the below table 1.</t>
	
      <table anchor="Table_1">
        <name>Prefix-to-Interface Mapping</name>
        <thead>
          <tr>
            <th align="left">Prefix</th>
            <th align="left">SDI</th>
            <th align="left">Interface</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">A</td>
            <td align="left">100,200</td>
            <td align="left">1,2</td>
          </tr>
          <tr>
            <td align="left">B</td>
            <td align="left">100</td>
            <td align="left">1</td>
          </tr>
          <tr>
            <td align="left">C</td>
            <td align="left">200</td>
            <td align="left">2</td>
          </tr>
          <tr>
            <td align="left">D</td>
            <td align="left">100</td>
            <td align="left">1</td>
          </tr>
          <tr>
            <td align="left">E</td>
            <td align="left">200</td>
            <td align="left">2</td>
          </tr>
          <tr>
            <td align="left">F</td>
            <td align="left">100,200</td>
            <td align="left">1,2</td>
          </tr>
        </tbody>
      </table>	
	
	<t> When the packets received in POP1 the source address is validated using prefix-to-interface mapping rule. For example, prefix A tagged with 
	SDI 100 and 200, respectively matched with Int1 and Int2 of POP1, so the packets of prefix A will be permitted to transit by Int1 and Int2. For 
	prefix B tagged with SDI 100 can only be permitted by Int1 according to the prefix-to-interface mapping rule. Similarly, the prefix F comes from
	both ISP1 and ISP2 will be permitted by Int1 and Int2.</t>
	<t> The SAV actions table shows as table 2.</t>
	
      <table anchor="Table_2">
        <name>SAV Action</name>
        <thead>
          <tr>
            <th align="left">Interface</th>
            <th align="left">Prefix</th>
            <th align="left">Action</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">1</td>
            <td align="left">A</td>
            <td align="left">Permit</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">B</td>
            <td align="left">Permit</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">C</td>
            <td align="left">Deny</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">D</td>
            <td align="left">Permit</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">E</td>
            <td align="left">Deny</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">F</td>
            <td align="left">Permit</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">A</td>
            <td align="left">Permit</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">B</td>
            <td align="left">Deny</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">C</td>
            <td align="left">Permit</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">D</td>
            <td align="left">Deny</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">E</td>
            <td align="left">Permit</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">F</td>
            <td align="left">Permit</td>
          </tr>
        </tbody>
      </table>		
	
	<t>In this case, the prefix from the same origin (i.e., AS number) as a whole set is trusted and the prefix-to-interface mapping rule is applied to the incoming interfaces of 
	traffic received for source validation in routers. </t>

    </section>  
	<section title="Scenario 2"> 
	<t> The following figure 2 shows an example of multipoint interconnection between multiple POP points and the same ISP. In this case, the set of
	routes learned from different POP points to the same ISP is inconsistent but overlapped. This section provides 2 SDI policies apllied in AS-level and Router-level.</t>	

<figure anchor="Figure_2" title="SAV Functions for Multiple POPs Access Scenario">
<artwork align="left"> <![CDATA[                               
        +----------------------------------+
        |              ISP200              |
        +----------------------------------+
             |            |          |
             |  Prefix:A,C|          |Prefix:A,B,C
   Prefix:A,B| 1          | 2        | 3
           +----+       +----+     +----+
        +--|POP1|-------|POP2|-----|POP3|--+
        |  +----+       +----+     +----+  |
        |     \           |          /     |
        |      \          |         /      |
        |       \         |        /       |
        |         +---------------+        |
        |         |      RR       |        |
        |         +---------------+    SP  |
        +----------------------------------+
]]></artwork></figure>

    <t> In this case, the prefix-to-interface mapping rule shows as the table 3.</t>
	
      <table anchor="Table_3">
        <name>Prefix-to-Interface Mapping</name>
        <thead>
          <tr>
            <th align="left">Prefix</th>
            <th align="left">SDI</th>
            <th align="left">Interface</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">A</td>
            <td align="left">200</td>
            <td align="left">1,2,3</td>
          </tr>
          <tr>
            <td align="left">B</td>
            <td align="left">200</td>
            <td align="left">1,3</td>
          </tr>
          <tr>
            <td align="left">C</td>
            <td align="left">200</td>
            <td align="left">2,3</td>
          </tr>
        </tbody>
      </table>	
	  
	<t> If AS SDI applied in the case the traffic packets of prefix (i.e., A, B and C in this example) received at POP1 from AS 200 are treated from
	the same trusted source. If the SDI policy replaced by router SDI the packets of prefix C will be filtered and processed as invalid source address
	at POP1 in this example.</t>

    <t> Through BGP method provided in this document, the SAV function is applied by BGP edge routers (i.e., SAV validation node) using prefix-to-interface rules to complete 
    source address validation accurately. It's obvious that the BGP method described in section 5.1 and 5.2 improves the source address validation 
    accuracy and overcomes the limitation of strict URPF method in multi-homing scenarios.</t>
 
	</section>   
	</section> 
 
	<section title="Implementation and Operation Considerations">
    <t> The source address validation is selected for filtering invalid address or mitigating source address spoofing 
    through validating the incoming interface of traffic received for one specific source prefix is in fact the right interface. The mapping policy
    as discussed in section 3 can be used to take action and based on the validation state to complete SAV function introduced in section 4 for 
    address filtering.</t>
    <t> The policies can be implemented include (1) identifying the route prefix advertised by different ISPs(i.e., BGP neighbors) as same or different SDIs.
    (2) applying Prefix-to-Interface mapping policy to the BGP Edge routers (or AS Boarder routers) and process the Source Address Validation (SAV) function. (3) making the 
    corresponding action based-on the validation state.</t>	
    <t> The validating router uses the result of source address validation to influence local policy in one network. In deployment, the policy should
    fit into the routers existing policy and allows a network to deploy incrementally or partially. The prefix-to-interface mapping rules used by the
    BGP edge routers are expected to be updated based-on the real network requirement. </t>
    <t> The following operational considerations applied to the BGP validation mechanism: </t> 
    <ul spacing="compact">
	<li>The BGP validation mechanism SHOULD support backward compatibility with existing routers. </li>
	<li>The BGP validation mechanism SHOULD be hardware friendly, does not require hardware upgrades nor big software updates.</li>
	<li>The BGP validation mechanism SHOULD comply with the routers existing policies and allow for incremental and partial network deployment.</li>
	<li>The BGP validation mechanism SHOULD support actual network implement requirement.</li>
	</ul>	  
    </section>   
	
	<section title="Security Considerations">

	<t> The BGP method introduced in this document provides a feasible way to validate address of traffic received for one specific source prefix.
	In this document, the BGP route prefix in inter-domain network is considered as trusted. If there are invalid routes which are not matched with 
	the current BGP route table should be blocked. The validation of origination AS of BGP routes is introduced in BGP POV document (see <xref target="RFC6811"/>). 
	This document attempts to verify the incoming interface is in fact the right interface for the source prefix and provide a flexible way for source address validation. 
	The inter-domain SAV security refers to <xref target="I-D.wu-savnet-inter-domain-architecture"/>. </t>

	<t> For the secure domain method introduced in this document, The secure domain may be managed by SAVNET controller or management system. 
	The secure domain management system is responsible for the life-cycle management of SDIs. It's noted that the communication of assignment and processing
	of SDIs should be secured. </t>	
	
	</section>

	<section title="IANA Considerations">
	<t> This document has no requests for IANA.</t>
	</section>  
	
	<section title="Acknowledgements">
	<t> The authors would like to acknowledge Wei Yuehua, Xiao Min, Liu Yao, Zhou Fenlin for their thorough review and feedbacks. </t>
	</section>  
  
</middle>
  
 <back>	
		
    <references title="Normative References">
    &RFC2119; 
    &RFC8174;
    </references>
    <references title="Informative References">
    &RFC7115;
    &RFC5210;
    &RFC6811;
    &RFC9319;
    &RFC3704;
    &RFC8704;
    &RFC4632;
    &RFC6480;
    &RFC6493;
    &RFC7128;	
    &I-D.ietf-sidrops-aspa-verification;
	&I-D.wu-savnet-inter-domain-architecture;
    &I-D.ietf-savnet-inter-domain-problem-statement;
	&I-D.ietf-sidr-bgpsec-protocol;
    </references>				
	
  </back>
  
</rfc>

