<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tong-savnet-sav-enhanced-by-controller-03" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.1 -->
  <front>
    <title abbrev="SAV Enhanced by Controller">Source Address Validation Enhanced by Network Controller</title>
    <seriesInfo name="Internet-Draft" value="draft-tong-savnet-sav-enhanced-by-controller-03"/>
    <author initials="T." surname="Tong" fullname="Tian Tong">
      <organization>China Unicom</organization>
      <address>
        <email>tongt5@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>
    <author initials="N." surname="Wang" fullname="Nan Wang">
      <organization>China Unicom</organization>
      <address>
        <email>wangn161@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2025" month="September" day="03"/>
    <area>Routing</area>
    <workgroup>Source Address Validation in Intra-domain and Inter-domain Networks</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 53?>

<t>Many newly proposed Source Address Validation (SAV) mechanisms such as IGP-based and BGP-based SAVNET solutions take a distributed manner to generate SAV rules, but they are faced with accuracy and managability challenges in incremental/partial deployment scenarios.
This document proposes a network controller-based solution for enhancing SAVNET capability in intra-domain and inter-domain networks, which supports accurate verification, automated configuration, threat analysis, traceability and visualization.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-tong-savnet-sav-enhanced-by-controller/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Source Address Validation in Intra-domain and Inter-domain Networks Working Group mailing list (<eref target="mailto:savnet@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/savnet/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/savnet/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Distributed SAVNET solutions utilize protocol message exchanges among SAVNET routers to acquire source prefix information related to other subnets within intra-domain networks or inter-domain networks, such as Source Prefix Announcement (SPA) technology for intra-domain SAVNET, which can be transmitted by a new protocol or an extension to an existing protocol <xref target="I-D.li-savnet-source-prefix-advertisement"/>. Nonetheless, under circumstances characterized by device heterogeneity, partial upgrades, asymmetric routing, and peculiar address, these solutions face diminished accuracy in Source Address Validation (SAV). Furthermore，there are necessities for enhancement in areas such as automated configuration, threat analysis, traceability, and visualization.</t>
      <t>In this document, on the basis of distributed intra-domain and inter-domain SAVNET architecture, we propose a controller-based and centralized SAVNET enhancement solution. The distributed SAVNET solutions rely on local routing information and SAV-specific information. In this solution, the controller can generate and deliver SAV rules based on the global information, and can also obtain ROA and other external information to generate inter-domain SAV rules, so as to achieve accurate source address verification (SAV) in both intra-domain and inter-domain in a combination of centralized and distributed ways.</t>
      <t>In this solution, SAVNET routers and non-SAVNET routers can cooperate via the network controller. More accurate source address verification rules can be generated based on more comprehensive information in the scenario of partial/incremental deployment of SAVNET. Concurrently, the SAVNET can support accurate verification, automated configuration, threat analysis, traceability and visualization.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t>SAV: Source Address Validation</t>
          </li>
          <li>
            <t>AS: Autonomous System</t>
          </li>
          <li>
            <t>SAV-Specific Information: Information specialized for SAV rule generation, exchanged between routers or from the network controller.</t>
          </li>
          <li>
            <t>SAV-related Information: The information used by a router to make SAV decisions. For intra-domain SAV, SAV-related information includes both local routing information and SAV-specific information.</t>
          </li>
          <li>
            <t>SAV-specific Information Communication Mechanism: The mechanism for exchanging SAV-specific information between routers. It can be either a new protocol or an extension to an existing protocol.</t>
          </li>
          <li>
            <t/>
          </li>
          <li>
            <t>SAV Information Base: A table or data structure in a router that stores specific SAV information and local routing information.</t>
          </li>
          <li>
            <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions and is inferred from the SAV Information Base or from network controller.</t>
          </li>
          <li>
            <t>SAVNET Router:  An intra-domain router which runs intra-domain SAVNET.</t>
          </li>
          <li>
            <t>SAVNET Agent: The agent in a SAVNET router that is responsible for communicating SAV-specific information, processing SAV-related information, and generating SAV rules.</t>
          </li>
          <li>
            <t>AS Edge Router: An intra-domain router of an AS which is connected to client subnets.</t>
          </li>
          <li>
            <t>AS Border Router: An intra-domain router of an AS which is connected to other ASes.</t>
          </li>
          <li>
            <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
          </li>
          <li>
            <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
          </li>
          <li>
            <t>ISP: Internet Service Provider.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="scenarios-and-requirements-for-centralized-savnet">
      <name>Scenarios and Requirements for Centralized SAVNET</name>
      <t>This section introduces the scenarios and requirements of centralized SAVNET, including incremental/partial deployment scenario, obtain information from external systems, automated configuration, analysis and traceability requirements,etc.</t>
      <section anchor="challenges-and-limitations-of-distributed-savnet-in-incrementalpartial-deployment">
        <name>Challenges and Limitations of Distributed SAVNET in Incremental/partial deployment</name>
        <t>The current distributed solution which exchanges SAV-specific information between SAVNET routers depends on devices upgrade. Devices utilize the source prefix advertisement (SPA) information to notify other routers about their subnet and prefix information. Unique subnet ID for each subnet should be planned by network manager, and additional identification information such as subnet ID and access mode on the corresponding port of the device should be configured manually, so as to generate more accurate SAV rules.</t>
        <t>However, devices are upgraded gradually due to various limitations such as device performance、version and vendor. As a result, in an AS, there are some routers support SAVNET and others do not.</t>
        <t>Routers with distributed solution could not generate accurate SAV rules in incremental/partial deployment scenario. Refer to <xref target="I-D.li-savnet-intra-domain-architecture"/> and <xref target="I-D.li-savnet-inter-domain-architecture"/>.Though the SAVNET router can obtain routing information from the local RIB/FIB and generate SAV rules for certain prefixes, in the absence of SAV-specific information, the SAV generated based on the local RIB/FIB has the risk of the improper block and improper permit in special scenarios such as asymmetric routing scenario.</t>
        <t>Figure 1 illustrates the asymmetric routing in a multi-homing subnet scenario which has been raised in [I-D.ietf-savnet-intra-domain-problem-statement]. Subnet 1 has a prefix of 10.0.0.0/15 and is connected to two edge routers, Router 1 and Router 2. Due to the load balancing policy in the inbound direction of subnet 1, R1 can only learn subnet prefix 10.1.0.0/16 from subnet 1, while R2 can only learn subfix 10.0.0.0/16 from subnet 1. After that, R1 learns another subnet prefix through the intra-domain routing protocol, and so does R2. The FIB of R1 and R2 are shown in Figure 1. R1 is a SAVNET router and R2 is a non-SAVNET router, and R1 and R2 communicate with each other through R3, regardless of whether R3 is a SAVNET router or not, the SPA message cannot be delivered and R2 cannot generate its own SAV-specific information or recognize the SAV-specific information transmitted from R1. Therefore, R1 can only collect part of the prefix information of the subnet to generate SAV rules, and R2 uses the FIB for SAV, then improper block will occur in both R1 and R2 due to incomplete information.</t>
        <figure>
          <name>Asymmetric multi-homing scenario in incremental deployment of intra-domain</name>
          <artwork><![CDATA[
 +--------------------------------------------------------------------+
 |     AS                                                             |
 |                            +----------+                            |
 |                            | Router 3 |                            |
 | FIB on Router 1            +----------+     FIB on Router 2        |
 | Dest         Next_hop       / \     \       Dest         Next_hop  |
 | 10.1.0.0/16  Subnet 1       /        \      10.0.0.0/16  Subnet 1  |
 | 10.0.0.0/16  Router 3      /  SPA     \     10.1.0.0/16  Router 3  |
 |                        +----------+   +----------+                 |
 |                SAVNET  | Router 1 |   | Router 2 | Non-SAVNET      |
 |                        +---+#+----+   +---+#+----+                 |
 |                             \            /                         |
 |                              \          /                          |
 |                             +------------+                         |
 |                             |  Customer  |                         |
 |                             |  Network   |                         |
 |                             +------------+                         |
 |                             (10.0.0.0/15)                          |
 |                                                                    |
 +--------------------------------------------------------------------+
]]></artwork>
        </figure>
        <t>Incremental/partial deployment for inter-domain include: (1) devices partially support SAVNET in an AS; (2) some ASs support SAVNET, while others do not. Figure 2 shows that ASBR1/2/3 are SAVNET routers while ASBR4 is a non-SAVNET router, ASBR4 cannot generate accurate source address verification rules without obtaining SAV-specific information from other AS and other routers in its AS.</t>
        <figure>
          <name>Partial deployment of Savnet for inter-domain</name>
          <artwork><![CDATA[
     +-----------------------+          +------------------------+
     | AS1     +----------+  |          |  +--------- +      AS2 |
     | SAVNET  |  ASBR 1  |  | -------- |  |  ASBR 3  |  SAVNET  |
     |         +----------+  |          |  +----------+          |
     |         +----------+  |          |  +----------+          |
     | SAVNET  |  ASBR 2  |  | -------- |  |  ASBR 4  |  Non-    |
     |         +----------+  |          |  +----------+  SAVNET  |
     +-----------------------+          +------------------------+
]]></artwork>
        </figure>
        <t>As a result, there is a problem of low accuracy in partial/incremental deployment scenarios. In addition, how to improve the protection effect and enhance the incentive is also one of the enhanced capabilities.</t>
      </section>
      <section anchor="obtain-information-from-external-systems">
        <name>Obtain information from external systems</name>
        <t>ASBR in each AS collects the SAV-specific information in its AS domain and synchronizes the SAV-specific information with the ASBR of the adjacent AS domain, and also obtains the RPKI ROA and ASPA information, as well as general information such as RIB, FIB, IRR, etc.Based on the above information sources, each AS generates a relatively complete source address verification table. So each AS needs to establish an information exchange channel and mechanism with the RPKI ROA to ensure network security, but routers shouldn’t directly interact with the RPKI ROA and other external systems, and a controller is appropriate to obtain information such as RPKI ROA and ASPA.</t>
      </section>
      <section anchor="automated-configuration">
        <name>Automated configuration</name>
        <t>Due to the existence of special addresses in the network, such as anycast addresses, the existing distributed SAVNET solutions need to manually identify special addresses and adopt corresponding policies, which brings high management overhead.</t>
        <t>For example, in Figure 3, P1~P4 are common prefixes, P5 is an anycast prefix with multiple legitimate origins including customer network 1, customer network 3 and external Internet. SAVNET with whitelist to be generated on interfaces a, b, and c, and SAVNET blacklist can be generated on interfaces d and e. If subnet 1 could not recognize P5 as an anycast prefix, the blacklist of interfaces d and e includes prefix P5, causing legitimate packets with P5 as the source to be filtered by mistake when they enter from interfaces d and e. Therefore, in order not to include an anycast prefix in a blacklist, it needs to use a special flag to indicate the anycast prefix when subnet 1 advertises the prefix P5 through the SPA.  Prefix type can be obtained and configured on the edge router through the controller if centralized management is possible,.</t>
        <figure>
          <name>Impact of anycast prefix</name>
          <artwork><![CDATA[
 +----------------------------------+     +--------------+
 |  AS  1                           |     |   Other AS   |
 |            +-----------+         |     |              |
 |            |  Router 3 |        e|---- |   Internet   |
 |            +-----------+         |     |              |
 |               /     \            |     |              |
 |              /       \           |     |              |
 |    +----------+   +----------+   |     | +----------+ |
 |    | Router 1 |   | Router 2 |   |     | | Router 4 | |
 |    +---+#+----+   +- -+#+---+    |     | +---+#+----+ |
 |       a |    \b       c|    d\   |     |      |       |
 +---------|-----\--------|------\--+     +------|-------+
           |       \      |        \             |
           |         \    |          \           |
           |           \  |            \         |
      +------------+   +------------+  +------------+
      |  Customer  |   |  Customer  |  |  Customer  |
      |  Network 1 |   |  Network 2 |  |  Network 3 |
      +------------+   +------------+  +------------+
  （prefix-1 and 5）（prefix-2 and 3）（ prefix-4 and 5）
]]></artwork>
        </figure>
        <t>In addition, network providers assign access devices, access ports, and public IP addresses to users who connect to their networks, so that the address allocation system in the carrier's network contains information about the customer's network. Source address verification technology can be combined with address allocation systems to automate configuration and achieve traceability based on source prefix. Centralized network controller can switch the authentication mode of all SAVNET routers flexibly through the delivery configuration.</t>
      </section>
      <section anchor="analysis-and-traceability-requirements">
        <name>Analysis and traceability requirements</name>
        <t>Current scheme provides flexible verification modes such as dropping, rate limiting, or allow for the forged packets in the latest draft sav_table <xref target="I-D.huang-savnet-sav-table"/>. It will play a great role if the controller can collect more source address forgery information from the router, analyze and trace the source in a centralized manner, visualize the source and target of the attack and threat tracing.
Besides, with the continuous expansion of the network scale and the increasing allocation of IP addresses, IP address conflicts include IP address conflicts and IP prefix conflicts will appear, which affects the normal network operation. The controller can find whether the prefixes are reused by checking the prefixes and their binding subnet ID.</t>
      </section>
    </section>
    <section anchor="centralized-savnet-capability-enhancement-solution">
      <name>Centralized SAVNET capability enhancement solution</name>
      <t>A high-level view of the Centralized SAVNET framework, without expanding the functional entities in network controller and Savnet devices, is illustrated in Figure 4.</t>
      <figure>
        <name>SAVNET capability enhancement architecture based on network controller</name>
        <artwork><![CDATA[
     +---------------------------------------------------------+
     | Controller                                              |
     |     +----------------------------------------+          |
     |     |      SAVNET Management Plane           |          |
     |     +----------------------------------------+          |
     |     +----------------------------------------+          |
     |     |      SAVNET Control Plane              |          |
     |     +----------------------------------------+          |
     |                                                         |
     +---------------------------------------------------------+
                                /|\
                                 |
                                 |
                                \|/
     +---------------------------------------------------------+
     | Savnet Devices                                          |         
     |                  SAVNET Device Plane                    |
     +---------------------------------------------------------+
]]></artwork>
      </figure>
      <t>The following planes are defined:
SAVNET Management Plane：Responsible for monitoring, configuring and maintaining SAVNET devices and Non-SAVNET devices,including delivering configuration to the devices, displaying and managing source address prefixes and SAV rules on devices.</t>
      <t>SAVNET Control Plane: Responsible for generating SAV rules. The incoming interfaces of source address prefixes are calculated based on topology informations，the source address prefixes，roles of devices. Finally, SAVNET entries/rules are generated and sent to the corresponding network devices.</t>
      <t>SAVNET device data plane: Responsible for maintaining and updating SAVNET entries from different sources, source address verification on the data forwarding plane and forwarding packets. The SAVNET entries can have multiple sources. SAV rules may be derived from intra-domain or inter-domain control plane protocols, see [I-D. draft-ietf-savnet-intra-domain-architecture-01] and [I-D.Raft -wu-savnet-inter-domain-architecture-11] for detail. SAV rules may be from the controller as well.</t>
      <t>The following interfaces are defined:
Report the network topology:  The basic BGP-LS as specified in <xref target="RFC9552"/> applies to this document to advertise the network information to the controller.
Report source address prefixes and SAVNET capabilities of network devices: Extend BGP-LS or YANG model to report source address prefixes and SAVNET capabilities of devices. For BGP-LS extensions, see [I-D.draft-cheng-lsr-adv-savnet-capbility].</t>
      <t>Report SAV rules: Monitor and manage SAV rules through a centralized controller. The protocol extensions of BGP Link-State to collect source address validation (SAV) rules generated by different protocols/mechanisms in [I-D.draft-tong-idr-bgp-ls-sav-rule] can facilitate multi-sourced SAV rule monitoring and management.</t>
      <t>Deliver SAV rules: SAV rules can be delivered through YANG [I-D.draft-Li-savnet-sav-yang], BGP-LS[I-D.draft-haas-savnet-bgp-sav-distribution], and BGP-FS [I-D.draft-geng-idr-flowspec-sav]. Detailed definition of SAV rules can see [I-D.draft-ietf-savnet-general-sav-capabilities]. When some network devices do not support SAVNET, the controller can deliver other protection policies, such as ACL rules, to the corresponding network devices.</t>
      <section anchor="key-technologies-in-intra-domain-savnet-enhancement">
        <name>Key technologies in Intra-domain SAVNET enhancement</name>
        <t>This section describes the intra-Domain SAV Enhancement based on Controller. Figure 5 illustrates Centralized SAVNET capability enhancement architecture in an intra-domain network. Centralized Controller can support accurate verification, automated configuration, threat analysis, traceability and visualization.</t>
        <figure>
          <name>intra-domain SAVNET capability enhancement architecture based on network controller</name>
          <artwork><![CDATA[
     +---------------------------------------------------------+
     |                                                         |
     |                    SAVNET Controller                    |
     +---------------------------------------------------------+          
                                /|\
                                 |
                                \|/
     +---------------------------------------------------------+
     |           +--------+            +--------+              |         
     |           | ASBR1  |            | ASBR2  |              |
     |           +--------+            +--------+              |
     |               |                      |                  |
     |           +------------------------------+              |
     |           |         other Routers        |              |
     |           +------------------------------+              | 
     |             |             |            |                |
     |        +--------+    +--------+    +--------+           |
     |        |  R1    |    |  R2    |    |  R3    |           |
     |        +--------+    +--------+    +--------+           |
     +---------------------------------------------------------+    
]]></artwork>
        </figure>
        <t>As shown in the figure above, when SAVNET is deployed in the intra-domain, controller can implement different control policies based on roles of devices. For the boundary devices in the domain, the blacklist policy is adopted. For the multi-homing access devices in the domain, the controller delivers multi-homing SAV rules in a centralized manner.</t>
        <t>Deliver SAV rules in intra-domain:
(1) AS Boundary Router (ASBR): The controller collects source address prefixes of all subnets in the AS domain, first removes special IP addresses or prefixes, such as anycast IP addresses, then generates the SAV rules/policies（in blacklist mode） containing all source address prefixes of the AS, and sends the SAV rules/policies to the ASBR. The SAV rules are generated and delivered to the routers that support SAVNET, and other defense policies, such as ACL (filtering specific source addresses on specific incoming interfaces), are generated and delivered to the routers that do not support SAVNET.</t>
        <figure>
          <name>Deliver SAV rules to AS Border Routers</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                                                 |
     |                SAVNET Controller                |
     +-------------------------------------------------+          
                 /|\                   /|\
                  |                     |
                 \|/                   \|/
              +--------+            +--------+                      
              | ASBR1  |            | ASBR2  |              
              +--------+            +--------+              
            SAVNET Router         Non-SAVNET Router
]]></artwork>
        </figure>
        <t>(2) Access Router: If a subnet is connected to two access routers and only one router supports SAVNET and the other does not, the controller can generate the SAV entry of P2 and send it to access router R1. The prefix-interface whitelist of access router R1 includes P1 and P2 to avoid false blocking. The controller can also generate ACL entries with prefixes P1 and P2 and send them to the access interface of access router R2 which does not support SAVNET.</t>
        <figure>
          <name>Deliver SAV rules to access routers</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                                                 |
     |                SAVNET Controller                |
     +-------------------------------------------------+          
                 /|\                   /|\
                  |                     |
                 \|/                   \|/
         +---------------+      +---------------+                      
         | Access Router |      | Access Router |             
         +---------------+      +---------------+           
  SAVNET Router      \             /       Non-SAVNET Router
                  P1  \           / P2
                    +---------------+
                    |   Customer    |
                    |   Network     |
                    +---------------+

]]></artwork>
        </figure>
      </section>
      <section anchor="key-technologies-in-inter-domain-savnet-enhancement">
        <name>Key technologies in Inter-domain SAVNET enhancement</name>
        <t>In inter-domain source address verification, the controller can also play an important role.</t>
        <ul spacing="normal">
          <li>
            <t>Generation and Receipt of Inter-domain SAV-specific Messages：</t>
          </li>
        </ul>
        <t>Inter-domain Source Address Validation (SAV) consists of a Source Autonomous System (AS) and a Validation Autonomous System (AS). And the controller of the Source AS can assist in generating and sending inter-domain SAV-specific messages, while the controller of the Validation AS can assist in receiving and propagating such inter-domain SAV-specific messages. The following takes inter-domain Source Prefix Assertion (SPA) messages as an example for illustration.</t>
        <t>A SPA message contains the AS number of the Source AS and the source prefixes included in this AS. Since the controller of the Source AS can centrally generate intra-domain SAV rules, it can conveniently obtain the source prefixes of the Source AS and further generate inter-domain SPA messages.</t>
        <t>Inter-domain SPA messages are sent from the Source AS to the Validation AS. If the designated ASBR in the Source AS or the Validation AS does not support SAVNET , the SPA messages can be sent from the controller of the Source AS to the controller of the Validation AS.</t>
        <ul spacing="normal">
          <li>
            <t>Centralized Generation of Inter-domain SAV Rules</t>
          </li>
        </ul>
        <t>Inter-domain SAV rules are generated by the Validation AS. The controller of the Validation AS can integrate information such as RIB, FIB, ROA and ASPA objects of the RPKI, IRR data, and SAV-specific information. Then it generates inter-domain SAV rules based on a priority policy, where SAV-specific information has the highest priority.</t>
        <figure>
          <name>Inter-domain SAV rules generation based on Centralized controller</name>
          <artwork><![CDATA[
       +-------------------------------+  +--------------+
       |  RPKI ROA Obj. and ASPA Obj.  |  | IRR Database |
       +-------------------------------+  +--------------+
                  /|\                       /|\
    +--------------|-------------------------|------+
    |             \|/                       \|/     |
    |  +----------------------------------------+   |   +-------------------+
    |  |         AS2 network controller         |<----->|  AS1 controller   |
    |  +----------------------------------------+   |   +-------------------+
    |          /|\                /|\        SAV-Specific information
    |           |                  |                |
    |           |  SAV rules       |  ACL           |                
    |          \|/                \|/               |              
    |  +-------------------+   +-----------------+  |      
    |  |     AS2 ASBR      |   |     AS2 ASBR    |  |
    |  +-------------------+   +-----------------+  | 
    |     SAVNET Router         Non-SAVNET Router   |
    +-----------------------------------------------+              
]]></artwork>
        </figure>
        <t>The controller of the Validation AS can distribute the centrally generated inter-domain SAV rules to ASBRs, in order to perform inter-domain source address validation. Specifically, it generates and distributes SAV rules to ASBRs that support SAVNET, and generates and distributes ACL rules to ASBRs that do not support SAVNET, which enhances the incentives in partial deployment scenarios.</t>
      </section>
    </section>
    <section anchor="use-case">
      <name>Use Case</name>
      <t>Several use cases will illustrate that centralized SAVNET can achieve more accurate and comprehensive SAV when SAVNET is partially deployed in network.</t>
      <section anchor="case-1-more-effective-intra-domain-edge-and-boundary-protection-in-incrementalpartial-deployment-scenario">
        <name>Case 1: More effective intra-domain edge and boundary protection in incremental/partial deployment scenario</name>
        <t>Figure 11 illustrates the asymmetric routing in a multi-homing subnet scenario. R1 and R2 serves as the edge router. R3 serves as the border egress. Partial SAVNET deployment: R1 lacks SAVNET support, while R2 and R3 are SAVNET-enabled.</t>
        <figure>
          <name>asymmetric routing in a multi-homing subnet scenario</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                   Controller                    |
     +-------------------------------------------------+          
            /|\          /|\            /|\
             |            |              |
             |           \|/ IF3         |
             |         +-----+           |
             |         | R3  |           |
             |         +-----+           |
            \|/       SAVNET Router     \|/
          +-----+                     +-----+                      
          | R1  | Non-SAVNET Router   | R2  | SAVNET Router             
          +-----+                     +-----+              
            IF1 \    Edge router      / IF2
                 \                   /
    Prefix 1 (P1) \                 /  Prefix 2 (P2)
    AS             \               /
                    +-------------+   
                    |   subnet    |
                    +-------------+ 
]]></artwork>
        </figure>
        <t>(1)Distributed SAVNET limitations:</t>
        <t>R1 (SAVNET-disabled): Fails to advertise P1 via SAVNET protocol. Thus:R2's interface IF2 cannot generate a whitelist covering both P1 and P2.R3's interface IF3 cannot create a blacklist for P1, leaving it unprotected.
R2 (SAVNET-enabled): Advertises P2 via SAVNET protocol successfully.
R3 (SAVNET-enabled): blocks P2 traffic on IF3 but allows P1 spoofing.</t>
        <t>Test Results:
Tester A sending P1/P2/P3 traffic to R1 and R2:
--R1 (IF1): No blocking (No protection).
--R2 (IF2): P1 blocked (improper block).</t>
        <t>Tester B spoofing P1/P2/P3 to R3:
--R3 (IF3): P2 blocked, P1/P3 allowed (insufficient protection).</t>
        <t>(2)SAVNET enhancement with centralized controller:</t>
        <t>Controller Actions:
--Collects subnet prefix P1 from R1 and P2 from R2.
--Delivers ACL whitelist (P1+P2) to R1's IF1 and SAV rules to R2's IF2.
--Delivers blacklist (P1+P2) to R3's IF3.</t>
        <t>Test Results:
Tester A: P1/P2 allowed on R1's IF1 and R2's IF2. P3 blocked. No improper blocking (full protection).
Tester B: P1/P2 blocked on IF3, P3 allowed (precise control).</t>
      </section>
      <section anchor="case-2-more-effective-inter-domain-boundary-protection-with-non-savnet-border-devices">
        <name>Case 2: More effective inter-domain boundary protection with Non-SAVNET Border Devices</name>
        <t>Edge routers R1/R2 support SAVNET, but border router R3 does not (Figure 12).</t>
        <figure>
          <name>More effective intra-domain boundary protection</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                   Controller                    |
     +-------------------------------------------------+          
            /|\          /|\            /|\
             |            |              |
             |           \|/ IF3         |
             |         +-----+           |
             |         | R3  |           |
             |         +-----+           |
            \|/   Non-SAVNET Router     \|/
          +-----+                     +-----+                      
          | R1  | SAVNET Router       | R2  | SAVNET Router             
          +-----+                     +-----+              
            IF1 \   Edge router       / IF2
                 \                   /
    Prefix 1 (P1) \                 /  Prefix 2 (P2)
    AS             \               /
                    +-------------+   
                    |   subnet    |
                    +-------------+ 
]]></artwork>
        </figure>
        <t>(1)Distributed SAVNET limitations:
R3 cannot process SAVNET messages from R1/R2, leaving P1/P2 unprotected.</t>
        <t>Test Results:
Tester B(spoofing P1/P2/P3 to R3): All traffic permitted (zero protection).</t>
        <t>(2)SAVNET enhancement with centralized controller:</t>
        <t>Controller Actions:
- Aggregates P1 (from R1) and P2 (from R2).
- Delivers unified blacklist (P1+P2) to R3's IF3.</t>
        <t>Test Results:
Tester B: P1/P2 blocked; P3 allowed (boundary secured).</t>
      </section>
      <section anchor="case-3-more-accurate-anycast-ip-protection">
        <name>Case 3: More accurate anycast IP protection</name>
        <t>Edge routers R1/R2 and border router R3 all support SAVNET. Subnet advertises sub prefixe P1 (anycast IP) via R1 and P2 via R2.</t>
        <figure>
          <name>More accurate anycast IP protection</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                   Controller                    |
     +-------------------------------------------------+          
            /|\          /|\            /|\
             |            |              |
             |           \|/ IF3         |
             |         +-----+           |
             |         | R3  |           |
             |         +-----+           |
            \|/   Non-SAVNET Router     \|/
          +-----+                     +-----+                      
          | R1  | SAVNET Router       | R2  | SAVNET Router             
          +-----+                     +-----+              
            IF1 \   Edge router       / IF2
   (anycast IP)  \                   /
    Prefix 1 (P1) \                 /  Prefix 2 (P2)
    AS             \               /
                    +-------------+   
                    |   subnet    |
                    +-------------+ 
]]></artwork>
        </figure>
        <t>(1)Distributed SAVNET Challenge:
Anycast conflict: P1 is also advertised by other AS, leading to ambiguous SAV rules.
Risk: Legitimate P1 traffic may be incorrectly blocked by boundary router.</t>
        <t>Test Results:
Tester B sending P1/P2 traffic to R3: P2 blocked; anycast P1 blocked (improper block).</t>
        <t>(2)SAVNET enhancement with centralized controller:
Controller Actions:
Correlates P1 with AS-specific topology data.
Generates context-aware SAV rules to distinguish legitimate anycast traffic.</t>
        <t>Test Results:
Tester B: P2 blocked; P1 permitted (Prevent improper block).</t>
      </section>
      <section anchor="case-4-enhanced-inter-domain-sav-via-sdn-controller">
        <name>Case 4: Enhanced inter-domain SAV via SDN controller</name>
        <t>Operators obtain IP blocks and AS numbers from registries, assigning them to network segments or business units.
Controller-Driven Optimization: SDN controller aggregates AS-number-to-IP mappings from carrier registries.Delivers complete SAV tables to ASBRs.
Impact: Eliminates spoofed inter-domain traffic (e.g., forged source IPs outside assigned ranges).Achieves more accuracy in inter-domain SAVNET.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9552">
          <front>
            <title>Distribution of Link-State and Traffic Engineering Information Using BGP</title>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <date month="December" year="2023"/>
            <abstract>
              <t>In many environments, a component external to a network is called upon to perform computations based on the network topology and the current state of the connections within the network, including Traffic Engineering (TE) information. This is information typically distributed by IGP routing protocols within the network.</t>
              <t>This document describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol. This is achieved using a BGP Network Layer Reachability Information (NLRI) encoding format. The mechanism applies to physical and virtual (e.g., tunnel) IGP links. The mechanism described is subject to policy control.</t>
              <t>Applications of this technique include Application-Layer Traffic Optimization (ALTO) servers and Path Computation Elements (PCEs).</t>
              <t>This document obsoletes RFC 7752 by completely replacing that document. It makes some small changes and clarifications to the previous specification. This document also obsoletes RFC 9029 by incorporating the updates that it made to RFC 7752.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9552"/>
          <seriesInfo name="DOI" value="10.17487/RFC9552"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.li-savnet-intra-domain-problem-statement">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="11" month="March" year="2023"/>
            <abstract>
              <t>   This document provides the gap analysis of existing intra-domain
   source address validation mechanisms, describes the fundamental
   problems, and defines the requirements for technical improvements.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-problem-statement-07"/>
        </reference>
        <reference anchor="I-D.li-savnet-intra-domain-architecture">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Fang Gao" initials="F." surname="Gao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>   This document proposes the intra-domain SAVNET architecture, which
   achieves accurate source address validation (SAV) in an intra-domain
   network by an automatic way.  Compared with uRPF-like SAV mechanisms
   that only depend on routers' local routing information, SAVNET
   routers generate SAV rules by using both local routing information
   and SAV-specific information exchanged among routers, resulting in
   more accurate SAV validation in asymmetric routing scenarios.
   Compared with ACL rules that require manual efforts to accommodate to
   network dynamics, SAVNET routers learn the SAV rules automatically in
   a distributed way.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-07"/>
        </reference>
        <reference anchor="I-D.li-savnet-inter-domain-architecture">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.li-savnet-source-prefix-advertisement">
          <front>
            <title>Source Prefix Advertisement for Intra-domain SAVNET</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="8" month="April" year="2025"/>
            <abstract>
              <t>   The new intra-domain source address validation (SAV) mechanism
   requires improving the accuracy (especially avoiding blocking
   legitimate traffic) and supporting automatic update (see
   [I-D.ietf-savnet-intra-domain-problem-statement]).  To this end, this
   document proposes an intra-domain SAV mechanism, called source prefix
   advertisement (SPA) for intra-domain SAVNET (SPA-based SAVNET for
   short), to advance the technology for intra-domain SAV.  SPA-based
   SAVNET allows routers in an intra-domain network to exchange SPA
   information.  By using SPA information and routing information,
   intra-domain routers can determine more accurate SAV rules in an
   automatic manner.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-source-prefix-advertisement-04"/>
        </reference>
        <reference anchor="I-D.huang-savnet-sav-table">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Changwang Lin" initials="C." surname="Lin">
              <organization>New H3C Technologies</organization>
            </author>
            <date day="10" month="December" year="2024"/>
            <abstract>
              <t>   The SAV rules of existing source address validation (SAV) mechanisms,
   are derived from other core data structures, e.g., FIB-based uRPF,
   which are not dedicatedly designed for source filtering.  Therefore
   there are some limitations related to deployable scenarios and
   traffic handling policies.

   To overcome these limitations, this document introduces the general
   SAV capabilities from data plane perspective.  How to implement the
   capabilities and how to generate SAV rules are not in the scope of
   this document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-08"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
