<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tong-savnet-sav-enhanced-by-controller-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="SAV Enhanced by Controller">Source Address Validation Enhanced by Network Controller</title>
    <seriesInfo name="Internet-Draft" value="draft-tong-savnet-sav-enhanced-by-controller-02"/>
    <author initials="T." surname="Tong" fullname="Tian Tong">
      <organization>China Unicom</organization>
      <address>
        <email>tongt5@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>
    <author initials="N." surname="Wang" fullname="Nan Wang">
      <organization>China Unicom</organization>
      <address>
        <email>wangn161@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>Routing</area>
    <workgroup>Source Address Validation in Intra-domain and Inter-domain Networks</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 53?>

<t>Many newly proposed Source Address Validation (SAV) mechanisms such as IGP-based and BGP-based SAVNET solutions take a distributed manner to generate SAV rules, but they are faced with accuracy and managability challenges in incremental/partial deployment scenarios.
This document proposes a network controller-based solution for enhancing SAVNET capability in intra-domain and inter-domain networks, which supports accurate verification, automated configuration, threat analysis, traceability and visualization.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-tong-savnet-sav-enhanced-by-controller/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Source Address Validation in Intra-domain and Inter-domain Networks Working Group mailing list (<eref target="mailto:savnet@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/savnet/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/savnet/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Distributed SAVNET solutions utilize protocol message exchanges among SAVNET routers to acquire source prefix information related to other subnets within intra-domain networks or inter-domain networks, such as Source Prefix Announcement (SPA) technology for intra-domain SAVNET, which can be transmitted by a new protocol or an extension to an existing protocol <xref target="I-D.li-savnet-source-prefix-advertisement"/>. Nonetheless, under circumstances characterized by device heterogeneity, partial upgrades, asymmetric routing, and peculiar address, these solutions face diminished accuracy in Source Address Validation (SAV). Furthermore，there are necessities for enhancement in areas such as automated configuration, threat analysis, traceability, and visualization.</t>
      <t>In this document, on the basis of distributed intra-domain and inter-domain SAVNET architecture, we propose a controller-based and centralized SAVNET enhancement solution. The distributed SAVNET solutions rely on local routing information and SAV-specific information. In this solution, the controller can generate and deliver SAV rules based on the global information, and can also obtain ROA and other external information to generate inter-domain SAV rules, so as to achieve accurate source address verification (SAV) in both intra-domain and inter-domain in a combination of centralized and distributed ways.</t>
      <t>In this solution, SAVNET routers and non-SAVNET routers can cooperate via the network controller. More accurate source address verification rules can be generated based on more comprehensive information in the scenario of partial/incremental deployment of SAVNET. Concurrently, the SAVNET can support accurate verification, automated configuration, threat analysis, traceability and visualization.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t>SAV: Source Address Validation</t>
          </li>
          <li>
            <t>AS: Autonomous System</t>
          </li>
          <li>
            <t>SAV-Specific Information: Information specialized for SAV rule generation, exchanged between routers or from the network controller.</t>
          </li>
          <li>
            <t>SAV-related Information: The information used by a router to make SAV decisions. For intra-domain SAV, SAV-related information includes both local routing information and SAV-specific information.</t>
          </li>
          <li>
            <t>SAV-specific Information Communication Mechanism: The mechanism for exchanging SAV-specific information between routers. It can be either a new protocol or an extension to an existing protocol.</t>
          </li>
          <li>
            <t/>
          </li>
          <li>
            <t>SAV Information Base: A table or data structure in a router that stores specific SAV information and local routing information.</t>
          </li>
          <li>
            <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions and is inferred from the SAV Information Base or from network controller.</t>
          </li>
          <li>
            <t>SAVNET Router:  An intra-domain router which runs intra-domain SAVNET.</t>
          </li>
          <li>
            <t>SAVNET Agent: The agent in a SAVNET router that is responsible for communicating SAV-specific information, processing SAV-related information, and generating SAV rules.</t>
          </li>
          <li>
            <t>AS Edge Router: An intra-domain router of an AS which is connected to client subnets.</t>
          </li>
          <li>
            <t>AS Border Router: An intra-domain router of an AS which is connected to other ASes.</t>
          </li>
          <li>
            <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
          </li>
          <li>
            <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
          </li>
          <li>
            <t>ISP: Internet Service Provider.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="scenarios-and-requirements-for-centralized-savnet">
      <name>Scenarios and Requirements for Centralized SAVNET</name>
      <t>This section introduces the scenarios and requirements of centralized SAVNET, including incremental/partial deployment scenario, obtain information from external systems, automated configuration, analysis and traceability requirements,etc.</t>
      <section anchor="challenges-and-limitations-of-distributed-savnet-in-incrementalpartial-deployment">
        <name>Challenges and Limitations of Distributed SAVNET in Incremental/partial deployment</name>
        <t>The current distributed solution which exchanges SAV-specific information between SAVNET routers depends on devices upgrade. Devices utilize the source prefix advertisement (SPA) information to notify other routers about their subnet and prefix information. Unique subnet ID for each subnet should be planned by network manager, and additional identification information such as subnet ID and access mode on the corresponding port of the device should be configured manually, so as to generate more accurate SAV rules.</t>
        <t>However, devices are upgraded gradually due to various limitations such as device performance、version and vendor. As a result, in an AS, there are some routers support SAVNET and others do not.</t>
        <t>Routers with distributed solution could not generate accurate SAV rules in incremental/partial deployment scenario. Refer to <xref target="I-D.li-savnet-intra-domain-architecture"/> and <xref target="I-D.li-savnet-inter-domain-architecture"/>.Though the SAVNET router can obtain routing information from the local RIB/FIB and generate SAV rules for certain prefixes, in the absence of SAV-specific information, the SAV generated based on the local RIB/FIB has the risk of the improper block and improper permit in special scenarios such as asymmetric routing scenario.</t>
        <t>Figure 1 illustrates the asymmetric routing in a multi-homing subnet scenario which has been raised in [I-D.ietf-savnet-intra-domain-problem-statement]. Subnet 1 has a prefix of 10.0.0.0/15 and is connected to two edge routers, Router 1 and Router 2. Due to the load balancing policy in the inbound direction of subnet 1, R1 can only learn subnet prefix 10.1.0.0/16 from subnet 1, while R2 can only learn subfix 10.0.0.0/16 from subnet 1. After that, R1 learns another subnet prefix through the intra-domain routing protocol, and so does R2. The FIB of R1 and R2 are shown in Figure 1. R1 is a SAVNET router and R2 is a non-SAVNET router, and R1 and R2 communicate with each other through R3, regardless of whether R3 is a SAVNET router or not, the SPA message cannot be delivered and R2 cannot generate its own SAV-specific information or recognize the SAV-specific information transmitted from R1. Therefore, R1 can only collect part of the prefix information of the subnet to generate SAV rules, and R2 uses the FIB for SAV, then improper block will occur in both R1 and R2 due to incomplete information.</t>
        <figure>
          <name>Asymmetric multi-homing scenario in incremental deployment of intra-domain</name>
          <artwork><![CDATA[
 +--------------------------------------------------------------------+
 |     AS                                                             |
 |                            +----------+                            |
 |                            | Router 3 |                            |
 | FIB on Router 1            +----------+     FIB on Router 2        |
 | Dest         Next_hop       / \     \       Dest         Next_hop  |
 | 10.1.0.0/16  Subnet 1       /        \      10.0.0.0/16  Subnet 1  |
 | 10.0.0.0/16  Router 3      /  SPA     \     10.1.0.0/16  Router 3  |
 |                        +----------+   +----------+                 |
 |                SAVNET  | Router 1 |   | Router 2 | Non-SAVNET      |
 |                        +---+#+----+   +---+#+----+                 |
 |                             \            /                         |
 |                              \          /                          |
 |                             +------------+                         |
 |                             |  Customer  |                         |
 |                             |  Network   |                         |
 |                             +------------+                         |
 |                             (10.0.0.0/15)                          |
 |                                                                    |
 +--------------------------------------------------------------------+
]]></artwork>
        </figure>
        <t>Incremental/partial deployment for inter-domain include: (1) devices partially support SAVNET in an AS; (2) some ASs support SAVNET, while others do not. Figure 2 shows that ASBR1/2/3 are SAVNET routers while ASBR4 is a non-SAVNET router, ASBR4 cannot generate accurate source address verification rules without obtaining SAV-specific information from other AS and other routers in its AS.</t>
        <figure>
          <name>Partial deployment of Savnet for inter-domain</name>
          <artwork><![CDATA[
     +-----------------------+          +------------------------+
     | AS1     +----------+  |          |  +--------- +      AS2 |
     | SAVNET  |  ASBR 1  |  | -------- |  |  ASBR 3  |  SAVNET  |
     |         +----------+  |          |  +----------+          |
     |         +----------+  |          |  +----------+          |
     | SAVNET  |  ASBR 2  |  | -------- |  |  ASBR 4  |  Non-    |
     |         +----------+  |          |  +----------+  SAVNET  |
     +-----------------------+          +------------------------+
]]></artwork>
        </figure>
        <t>As a result, there is a problem of low accuracy in partial/incremental deployment scenarios. In addition, how to improve the protection effect and enhance the incentive is also one of the enhanced capabilities.</t>
      </section>
      <section anchor="obtain-information-from-external-systems">
        <name>Obtain information from external systems</name>
        <t>ASBR in each AS collects the SAV-specific information in its AS domain and synchronizes the SAV-specific information with the ASBR of the adjacent AS domain, and also obtains the RPKI ROA and ASPA information, as well as general information such as RIB, FIB, IRR, etc.Based on the above information sources, each AS generates a relatively complete source address verification table. So each AS needs to establish an information exchange channel and mechanism with the RPKI ROA to ensure network security, but routers shouldn’t directly interact with the RPKI ROA and other external systems, and a controller is appropriate to obtain information such as RPKI ROA and ASPA.</t>
      </section>
      <section anchor="automated-configuration">
        <name>Automated configuration</name>
        <t>Due to the existence of special addresses in the network, such as anycast addresses, the existing distributed SAVNET solutions need to manually identify special addresses and adopt corresponding policies, which brings high management overhead.</t>
        <t>For example, in Figure 3, P1~P4 are common prefixes, P5 is an anycast prefix with multiple legitimate origins including customer network 1, customer network 3 and external Internet. SAVNET with whitelist to be generated on interfaces a, b, and c, and SAVNET blacklist can be generated on interfaces d and e. If subnet 1 could not recognize P5 as an anycast prefix, the blacklist of interfaces d and e includes prefix P5, causing legitimate packets with P5 as the source to be filtered by mistake when they enter from interfaces d and e. Therefore, in order not to include an anycast prefix in a blacklist, it needs to use a special flag to indicate the anycast prefix when subnet 1 advertises the prefix P5 through the SPA.  Prefix type can be obtained and configured on the edge router through the controller if centralized management is possible,.</t>
        <figure>
          <name>Impact of anycast prefix</name>
          <artwork><![CDATA[
 +----------------------------------+     +--------------+
 |  AS  1                           |     |   Other AS   |
 |            +-----------+         |     |              |
 |            |  Router 3 |         |---- |   Internet   |
 |            +-----------+         |     |              |
 |               /     \            |     |              |
 |              /       \           |     |              |
 |    +----------+   +----------+   |     | +----------+ |
 |    | Router 1 |   | Router 2 |   |     | | Router 4 | |
 |    +---+#+----+   +- -+#+---+    |     | +---+#+----+ |
 +---------|-----\--------|------\--+     +------|-------+
           |       \      |        \             |
           |         \    |          \           |
           |           \  |            \         |
      +------------+   +------------+  +------------+
      |  Customer  |   |  Customer  |  |  Customer  |
      |  Network 1 |   |  Network 2 |  |  Network 3 |
      +------------+   +------------+  +------------+
  （prefix-1 and 5）（prefix-2 and 3）（ prefix-4 and 5）
]]></artwork>
        </figure>
        <t>In addition, network providers assign access devices, access ports, and public IP addresses to users who connect to their networks, so that the address allocation system in the carrier's network contains information about the customer's network. Source address verification technology can be combined with address allocation systems to automate configuration and achieve traceability based on source prefix. Centralized network controller can switch the authentication mode of all SAVNET routers flexibly through the delivery configuration.</t>
      </section>
      <section anchor="analysis-and-traceability-requirements">
        <name>Analysis and traceability requirements</name>
        <t>Current scheme provides flexible verification modes such as dropping, rate limiting, or allow for the forged packets in the latest draft sav_table <xref target="I-D.huang-savnet-sav-table"/>. It will play a great role if the controller can collect more source address forgery information from the router, analyze and trace the source in a centralized manner, visualize the source and target of the attack and threat tracing.
Besides, with the continuous expansion of the network scale and the increasing allocation of IP addresses, IP address conflicts include IP address conflicts and IP prefix conflicts will appear, which affects the normal network operation. The controller can find whether the prefixes are reused by checking the prefixes and their binding subnet ID.</t>
      </section>
    </section>
    <section anchor="centralized-savnet-capability-enhancement-solution">
      <name>Centralized SAVNET capability enhancement solution</name>
      <t>A high-level view of the Centralized SAVNET framework, without expanding the functional entities in network controller and Savnet devices, is illustrated in Figure 4.</t>
      <figure>
        <name>SAVNET capability enhancement architecture based on network controller</name>
        <artwork><![CDATA[
     +---------------------------------------------------------+
     | Controller                                              |
     |     +----------------------------------------+          |
     |     |      SAVNET Management Plane           |          |
     |     +----------------------------------------+          |
     |     +----------------------------------------+          |
     |     |      SAVNET Control Plane              |          |
     |     +----------------------------------------+          |
     |                                                         |
     +---------------------------------------------------------+
                                /|\
                                 |
                                 |
                                \|/
     +---------------------------------------------------------+
     | Savnet Devices                                          |         
     |                  SAVNET Device Plane                    |
     +---------------------------------------------------------+
]]></artwork>
      </figure>
      <t>The following planes are defined:
SAVNET Management Plane：Responsible for monitoring, configuring and maintaining SAVNET devices and Non-SAVNET devices,including delivering configuration to the devices, displaying and managing source address prefixes and SAV rules on devices.</t>
      <t>SAVNET Control Plane: Responsible for generating SAV rules. The incoming interfaces of source address prefixes are calculated based on topology informations，the source address prefixes，roles of devices. Finally, SAVNET entries/rules are generated and sent to the corresponding network devices.</t>
      <t>SAVNET device data plane: Responsible for maintaining and updating SAVNET entries from different sources, source address verification on the data forwarding plane and forwarding packets. The SAVNET entries can have multiple sources. SAV rules may be derived from intra-domain or inter-domain control plane protocols, see [I-D. draft-ietf-savnet-intra-domain-architecture-01] and [I-D.Raft -wu-savnet-inter-domain-architecture-11] for detail. SAV rules may be from the controller as well.</t>
      <t>The following interfaces are defined:
Report the network topology:  The basic BGP-LS as specified in <xref target="RFC9552"/> applies to this document to advertise the network information to the controller.
Report source address prefixes and SAVNET capabilities of network devices: Extend BGP-LS or YANG model to report source address prefixes and SAVNET capabilities of devices. For BGP-LS extensions, see [I-D.draft-cheng-lsr-adv-savnet-capbility-00].</t>
      <t>Report SAV rules: Monitor and manage SAV rules through a centralized controller. The protocol extensions of BGP Link-State to collect source address validation (SAV) rules generated by different protocols/mechanisms in {I-D. tong-idr-bgp-ls-sav-rule} can facilitate multi-sourced SAV rule monitoring and management.</t>
      <t>Deliver SAV rules: SAV rules can be delivered through YANG [I-D.Li-savnet-sav-yang], BGP-LS[I-D.haas-savnet-bgp-sav-distribution], and BGP-FS [I-D.geng-idr-flowspec-sav]. Detailed definition of SAV rules can see [I-D.draft -huang-savnet-sav-table-07]. When some network devices do not support SAVNET, the controller can deliver other protection policies, such as ACL rules, to the corresponding network devices.</t>
      <section anchor="key-technologies-in-intra-domain-savnet-enhancement">
        <name>Key technologies in Intra-domain SAVNET enhancement</name>
        <t>This section describes the intra-Domain SAV Enhancement based on Controller. Figure 5 illustrates Centralized SAVNET capability enhancement architecture in an intra-domain network. Centralized Controller can support accurate verification, automated configuration, threat analysis, traceability and visualization.</t>
        <figure>
          <name>intra-domain SAVNET capability enhancement architecture based on network controller</name>
          <artwork><![CDATA[
     +---------------------------------------------------------+
     |                                                         |
     |                    SAVNET Controller                    |
     +---------------------------------------------------------+          
                                /|\
                                 |
                                \|/
     +---------------------------------------------------------+
     |           +--------+            +--------+              |         
     |           | ASBR1  |            | ASBR2  |              |
     |           +--------+            +--------+              |
     |               |                      |                  |
     |           +------------------------------+              |
     |           |         other Routers        |              |
     |           +------------------------------+              | 
     |             |             |            |                |
     |        +--------+    +--------+    +--------+           |
     |        |  R1    |    |  R2    |    |  R3    |           |
     |        +--------+    +--------+    +--------+           |
     +---------------------------------------------------------+    
]]></artwork>
        </figure>
        <t>As shown in the figure above, when SAVNET is deployed in the intra-domain, controller can implement different control policies based on roles of devices. For the boundary devices in the domain, the blacklist policy is adopted. For the multi-homing access devices in the domain, the controller delivers multi-homing SAV rules in a centralized manner.</t>
        <t>Deliver SAV rules in intra-domain:
(1) AS Boundary Router (ASBR): The controller collects source address prefixes of all subnets in the AS domain, removes special IP addresses or prefixes, such as anycast IP addresses, generates the SAV rules/policies（in blacklist mode） containing all source address prefixes of the AS, and sends the SAV rules/policies to the ASBR. The SAV rules are generated and delivered to the routers that support SAVNET, and other defense policies, such as ACL (filtering specific source addresses on specific incoming interfaces), are generated and delivered to the routers that do not support SAVNET.</t>
        <figure>
          <name>Deliver SAV rules to AS Border Routers</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                                                 |
     |                SAVNET Controller                |
     +-------------------------------------------------+          
                 /|\                   /|\
                  |                     |
                 \|/                   \|/
              +--------+            +--------+                      
              | ASBR1  |            | ASBR2  |              
              +--------+            +--------+              
            SAVNET Router         Non-SAVNET Router
]]></artwork>
        </figure>
        <t>(2) Access Router: If a subnet is connected to two access routers and only one router supports SAVNET and the other does not, the controller can generate the SAV entry of P2 and send it to access router R1. The prefix-interface whitelist of access router R1 includes P1 and P2 to avoid false blocking. The controller can also generate ACL entries with prefixes P1 and P2 and send them to the access interface of access router R2 which does not support SAVNET.</t>
        <figure>
          <name>Deliver SAV rules to access routers</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                                                 |
     |                SAVNET Controller                |
     +-------------------------------------------------+          
                 /|\                   /|\
                  |                     |
                 \|/                   \|/
         +---------------+      +---------------+                      
         | Access Router |      | Access Router |             
         +---------------+      +---------------+           
  SAVNET Router      \             /       Non-SAVNET Router
                  P1  \           / P2
                    +---------------+
                    |   Customer    |
                    |   Network     |
                    +---------------+

]]></artwork>
        </figure>
      </section>
      <section anchor="key-technologies-in-inter-domain-savnet-enhancement">
        <name>Key technologies in Inter-domain SAVNET enhancement</name>
        <t>In inter-domain source address verification, the controller can also play an important role.</t>
        <ul spacing="normal">
          <li>
            <t>Scenario 1: Centralized controller in single management domain including multiple ASes:</t>
          </li>
        </ul>
        <t>An ISP has multiple ASes in actual network deployment. If a unified controller manages multiple ASes, the controller can deliver SAV rules to the devices of each AS as required.</t>
        <figure>
          <name>Centralized controller in single management domain with multiple ASes</name>
          <artwork><![CDATA[
       +-------------------------------------------------+
       |               Centralized Controller            |
       +-------------------------------------------------+
           /|\               /|\                   /|\ 
            |                 |                     |
           \|/               \|/                   \|/
       +------------+    +------------+     +------------+
       |     AS1    |    |    AS2     |     |    AS3     |
       +------------+    +------------+     +------------+
]]></artwork>
        </figure>
        <t>Based on the source addresses prefixes of the entire network, relationships between ASes, and third-party authentication information such as ROA objects and ASPA objects, the controller can calculate the SAV rules of the entire management domain and deliver SAV rules to the corresponding devices. For a description of the delivery of SAV rules, see 5.1.</t>
        <ul spacing="normal">
          <li>
            <t>Scenario 2: Different ASes has different controllers</t>
          </li>
        </ul>
        <t>When different ASes have their own controllers, each controller collects the complete source address prefixes of the local AS and sends them to the ASBR. The ASBR generates the inter-domain SAV-Specific information and advertises it to the ASBR of the neighboring AS. As shown in Figure 9, not all routers in AS1 and AS2 support SAVNET，AS1 and AS2 controllers collect the complete source address prefixes and send to their own ASBRs respetively. The controller can also deliver the synchronization key to the ASBR to ensure the reliability and flexibility of inter-domain SAV-Specific information transmission.</t>
        <figure>
          <name>Centralized controller with one controller within multiple ASes</name>
          <artwork><![CDATA[
       +-------------------+       +-------------------+
       |  AS1 controller   |       |  AS2 controller   |
       +-------------------+       +-------------------+
               /|\                         /|\  
                |                           |                     
               \|/                         \|/                    
       +-------------------+       +-------------------+     
       |       AS1         | <---> |       AS2         |    
       +-------------------+       +-------------------+  
                   SAV-Specific information
]]></artwork>
        </figure>
        <t>Besides，if ASBR of an AS do not support SAVNET and can not generate the inter-domain SAV-Specific information, SAV-Specific information can be advertised through network cooperator for rapid deployment as shown in Figure 9. Each controller can generate SAV rules based on SAV-Specific information and advertise to ASBRs to achieve source address verification.</t>
        <figure>
          <name>Centralized controller with one controller within multiple ASes</name>
          <artwork><![CDATA[
       +-----------------------------------------------+
       |               network cooperator            |
       +-----------------------------------------------+    
               /|\                          /|\  
                |  SAV-Specific information  |                     
               \|/                          \|/    
       +-------------------+       +-------------------+
       |  AS1 controller   |       |  AS2 controller   |
       +-------------------+       +-------------------+
               /|\                         /|\  
                |  SAV rules                |  SAV rules                  
               \|/                         \|/                    
       +-------------------+       +-------------------+     
       |       AS1         |       |       AS2         |    
       +-------------------+       +-------------------+  
                  
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="use-case">
      <name>Use Case</name>
      <t>Several use cases will illustrate that centralized SAVNET can achieve more accurate and comprehensive SAV when SAVNET is partially deployed in network.</t>
      <section anchor="case-1-more-effective-intra-domain-edge-and-boundary-protection-in-incrementalpartial-deployment-scenario">
        <name>Case 1: More effective intra-domain edge and boundary protection in incremental/partial deployment scenario</name>
        <t>Figure 11 illustrates the asymmetric routing in a multi-homing subnet scenario. R1 and R2 serves as the edge router. R3 serves as the border egress. Partial SAVNET deployment: R1 lacks SAVNET support, while R2 and R3 are SAVNET-enabled.</t>
        <figure>
          <name>asymmetric routing in a multi-homing subnet scenario</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                   Controller                    |
     +-------------------------------------------------+          
            /|\          /|\            /|\
             |            |              |
             |           \|/ IF3         |
             |         +-----+           |
             |         | R3  |           |
             |         +-----+           |
            \|/       SAVNET Router     \|/
          +-----+                     +-----+                      
          | R1  | Non-SAVNET Router   | R2  | SAVNET Router             
          +-----+                     +-----+              
            IF1 \    Edge router      / IF2
                 \                   /
    Prefix 1 (P1) \                 /  Prefix 2 (P2)
    AS             \               /
                    +-------------+   
                    |   subnet    |
                    +-------------+ 
]]></artwork>
        </figure>
        <t>(1)Distributed SAVNET limitations:</t>
        <t>R1 (SAVNET-disabled): Fails to advertise P1 via SAVNET protocol. Thus:R2's interface IF2 cannot generate a whitelist covering both P1 and P2.R3's interface IF3 cannot create a blacklist for P1, leaving it unprotected.
R2 (SAVNET-enabled): Advertises P2 via SAVNET protocol successfully.
R3 (SAVNET-enabled): blocks P2 traffic on IF3 but allows P1 spoofing.</t>
        <t>Test Results:
Tester A sending P1/P2/P3 traffic to R1 and R2:
--R1 (IF1): No blocking (No protection).
--R2 (IF2): P1 blocked (improper block).</t>
        <t>Tester B spoofing P1/P2/P3 to R3:
--R3 (IF3): P2 blocked, P1/P3 allowed (insufficient protection).</t>
        <t>(2)SAVNET enhancement with centralized controller:</t>
        <t>Controller Actions:
--Collects subnet prefix P1 from R1 and P2 from R2.
--Delivers ACL whitelist (P1+P2) to R1's IF1 and SAV rules to R2's IF2.
--Delivers blacklist (P1+P2) to R3's IF3.</t>
        <t>Test Results:
Tester A: P1/P2 allowed on R1's IF1 and R2's IF2. P3 blocked. No improper blocking (full protection).
Tester B: P1/P2 blocked on IF3, P3 allowed (precise control).</t>
      </section>
      <section anchor="case-2-more-effective-intra-domain-boundary-protection-with-non-savnet-border-devices">
        <name>Case 2: More effective intra-domain boundary protection with Non-SAVNET Border Devices</name>
        <t>Edge routers R1/R2 support SAVNET, but border router R3 does not (Figure 12).</t>
        <figure>
          <name>More effective intra-domain boundary protection</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                   Controller                    |
     +-------------------------------------------------+          
            /|\          /|\            /|\
             |            |              |
             |           \|/ IF3         |
             |         +-----+           |
             |         | R3  |           |
             |         +-----+           |
            \|/   Non-SAVNET Router     \|/
          +-----+                     +-----+                      
          | R1  | SAVNET Router       | R2  | SAVNET Router             
          +-----+                     +-----+              
            IF1 \   Edge router       / IF2
                 \                   /
    Prefix 1 (P1) \                 /  Prefix 2 (P2)
    AS             \               /
                    +-------------+   
                    |   subnet    |
                    +-------------+ 
]]></artwork>
        </figure>
        <t>(1)Distributed SAVNET limitations:
R3 cannot process SAVNET messages from R1/R2, leaving P1/P2 unprotected.</t>
        <t>Test Results:
Tester B(spoofing P1/P2/P3 to R3): All traffic permitted (zero protection).</t>
        <t>(2)SAVNET enhancement with centralized controller:</t>
        <t>Controller Actions:
- Aggregates P1 (from R1) and P2 (from R2).
- Delivers unified blacklist (P1+P2) to R3's IF3.</t>
        <t>Test Results:
Tester B: P1/P2 blocked; P3 allowed (boundary secured).</t>
      </section>
      <section anchor="case-3-more-accurate-anycast-ip-protection">
        <name>Case 3: More accurate anycast IP protection</name>
        <t>Edge routers R1/R2 and border router R3 all support SAVNET. Subnet advertises sub prefixe P1 (anycast IP) via R1 and P2 via R2.</t>
        <figure>
          <name>More accurate anycast IP protection</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                   Controller                    |
     +-------------------------------------------------+          
            /|\          /|\            /|\
             |            |              |
             |           \|/ IF3         |
             |         +-----+           |
             |         | R3  |           |
             |         +-----+           |
            \|/   Non-SAVNET Router     \|/
          +-----+                     +-----+                      
          | R1  | SAVNET Router       | R2  | SAVNET Router             
          +-----+                     +-----+              
            IF1 \   Edge router       / IF2
   (anycast IP)  \                   /
    Prefix 1 (P1) \                 /  Prefix 2 (P2)
    AS             \               /
                    +-------------+   
                    |   subnet    |
                    +-------------+ 
]]></artwork>
        </figure>
        <t>(1)Distributed SAVNET Challenge:
Anycast conflict: P1 is also advertised by other AS, leading to ambiguous SAV rules.
Risk: Legitimate P1 traffic may be incorrectly blocked by boundary router.</t>
        <t>Test Results:
Tester B sending P1/P2 traffic to R3: P2 blocked; anycast P1 blocked (improper block).</t>
        <t>(2)SAVNET enhancement with centralized controller:
Controller Actions:
Correlates P1 with AS-specific topology data.
Generates context-aware SAV rules to distinguish legitimate anycast traffic.</t>
        <t>Test Results:
Tester B: P2 blocked; P1 permitted (Prevent improper block).</t>
      </section>
      <section anchor="case-4-enhanced-inter-domain-sav-via-sdn-controller">
        <name>Case 4: Enhanced inter-domain SAV via SDN controller</name>
        <t>Operators obtain IP blocks and AS numbers from registries, assigning them to network segments or business units.
Controller-Driven Optimization: SDN controller aggregates AS-number-to-IP mappings from carrier registries.
Delivers complete SAV tables to ASBRs (Autonomous System Border Routers).
Impact: Eliminates spoofed inter-domain traffic (e.g., forged source IPs outside assigned ranges).Achieves more accuracy in inter-domain SAVNET.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9552">
          <front>
            <title>Distribution of Link-State and Traffic Engineering Information Using BGP</title>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <date month="December" year="2023"/>
            <abstract>
              <t>In many environments, a component external to a network is called upon to perform computations based on the network topology and the current state of the connections within the network, including Traffic Engineering (TE) information. This is information typically distributed by IGP routing protocols within the network.</t>
              <t>This document describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol. This is achieved using a BGP Network Layer Reachability Information (NLRI) encoding format. The mechanism applies to physical and virtual (e.g., tunnel) IGP links. The mechanism described is subject to policy control.</t>
              <t>Applications of this technique include Application-Layer Traffic Optimization (ALTO) servers and Path Computation Elements (PCEs).</t>
              <t>This document obsoletes RFC 7752 by completely replacing that document. It makes some small changes and clarifications to the previous specification. This document also obsoletes RFC 9029 by incorporating the updates that it made to RFC 7752.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9552"/>
          <seriesInfo name="DOI" value="10.17487/RFC9552"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.li-savnet-intra-domain-problem-statement">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>   This document provides the gap analysis of existing intra-domain
   source address validation mechanisms, describes the fundamental
   problems, and defines the requirements for technical improvements.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-problem-statement-07"/>
        </reference>
        <reference anchor="I-D.li-savnet-intra-domain-architecture">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Fang Gao" initials="F." surname="Gao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>   This document proposes the intra-domain SAVNET architecture, which
   achieves accurate source address validation (SAV) in an intra-domain
   network by an automatic way.  Compared with uRPF-like SAV mechanisms
   that only depend on routers' local routing information, SAVNET
   routers generate SAV rules by using both local routing information
   and SAV-specific information exchanged among routers, resulting in
   more accurate SAV validation in asymmetric routing scenarios.
   Compared with ACL rules that require manual efforts to accommodate to
   network dynamics, SAVNET routers learn the SAV rules automatically in
   a distributed way.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-07"/>
        </reference>
        <reference anchor="I-D.li-savnet-inter-domain-architecture">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.li-savnet-source-prefix-advertisement">
          <front>
            <title>Source Prefix Advertisement for Intra-domain SAVNET</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="20" month="October" year="2024"/>
            <abstract>
              <t>   This document proposes the Source Prefix Advertisement (SPA)
   technology for intra-domain SAVNET, called SPA-based SAVNET.  SPA-
   based SAVNET allows routers in an intra-domain network to exchange
   SAV-specific information through SPA messages.  Compared with
   existing intra-domain SAV mechanisms RFC2827 [RFC3704], SPA-based
   SAVNET can generate more accurate and robust SAV rules on intra-
   domain routers in an automatic way.  This document introduces the
   content of SPA messages and the process of generating SAV rules.  SPA
   messages can be transmitted by a new protocol or an extension to an
   existing protocol.  Protocol designs and extensions are not in the
   scope of this document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-source-prefix-advertisement-01"/>
        </reference>
        <reference anchor="I-D.huang-savnet-sav-table">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <date day="10" month="December" year="2024"/>
            <abstract>
              <t>   The SAV rules of existing source address validation (SAV) mechanisms,
   are derived from other core data structures, e.g., FIB-based uRPF,
   which are not dedicatedly designed for source filtering.  Therefore
   there are some limitations related to deployable scenarios and
   traffic handling policies.

   To overcome these limitations, this document introduces the general
   SAV capabilities from data plane perspective.  How to implement the
   capabilities and how to generate SAV rules are not in the scope of
   this document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-08"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
