<?xml version="1.0" encoding="US-ASCII"?>
<!-- This template is for creating an Internet Draft using xml2rfc,
     which is available here: http://xml.resource.org. -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs), 
     please see http://xml.resource.org/authoring/README.html. -->
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation -->
<!-- control the table of contents (ToC) -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="3"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e., [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space 
     (using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of list of popular I-D processing instructions -->
<rfc category="std" docName="draft-wu-savnet-inter-domain-architecture-01"
     ipr="trust200902">
  <front>
    <title abbrev="Inter-domain SAVNET Architecture">Inter-domain Source
    Address Validation (SAVNET) Architecture</title>

    <!-- https://authors.ietf.org/en/rfcxml-vocabulary#title-4 -->

    <!--  The abbreviated title is required if the full title is longer than 39 characters -->

    <seriesInfo name="Internet-Draft"
                value="draft-wu-savnet-inter-domain-architecture"/>

    <!-- https://authors.ietf.org/en/rfcxml-vocabulary#seriesinfo -->

    <!-- Set value to the name of the draft  -->

    <author fullname="Jianping Wu" initials="J." surname="Wu">
      <organization>Tsinghua University</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code/>

          <country>China</country>
        </postal>

        <email>jianping@cernet.edu.cn</email>

        <uri/>
      </address>
    </author>

    <author fullname="Dan Li" initials="D." surname="Li">
      <organization>Tsinghua University</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <country>China</country>
        </postal>

        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>

    <author fullname="Mingqing Huang" initials="M." surname="Huang">
      <organization>Huawei</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code/>

          <country>China</country>
        </postal>

        <email>huangmingqing@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Li Chen" initials="L." surname="Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <street/>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>

    <author fullname="Nan Geng" initials="N." surname="Geng">
      <organization>Huawei</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code/>

          <country>China</country>
        </postal>

        <email>gengnan@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Libin Liu" initials="L." surname="Liu">
      <organization>Zhongguancun Laboratory</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code/>

          <country>China</country>
        </postal>

        <email>liulb@zgclab.edu.cn</email>

        <uri/>
      </address>
    </author>

    <author fullname="Lancheng Qin" initials="L." surname="Qin">
      <organization>Tsinghua University</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code/>

          <country>China</country>
        </postal>

        <email>qlc19@mails.tsinghua.edu.cn</email>

        <uri/>
      </address>
    </author>

    <date day="13" month="03" year="2023"/>

    <!---->

    <keyword/>

    <abstract>
      <t>Source address validation (SAV) is critical to preventing attacks 
      based on source IP address spoofing.
      The proposed inter-domain SAVNET architecture enables an AS to generate 
      SAV rules based on SAV-related information from multiple sources. 
      This architecture integrates existing SAV mechanisms and offers 
      ample design space for new SAV mechanisms.
      The document focuses on architectural components and SAV-related 
      information in an inter-domain SAVNET deployment, without specifying 
      any protocols or protocol extensions.</t>
    </abstract>

    <note title="Requirements Language">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref
      target="RFC8174">RFC 8174</xref>.</t>
    </note>
  </front>

  <middle>
    <section title="Introduction">

      <t>Attacks based on source IP address spoofing, such as reflective DDoS and 
      flooding attacks, continue to pose significant challenges to Internet security. 
      To mitigate such attacks in inter-domain networks, source address validation (SAV) 
      is essential.</t>
      
      <t>Although BCP84 <xref target="RFC3704"/><xref target="RFC8704"/> provides some 
      SAV solutions, such as uRPF-based mechanisms, the existing SAV mechanisms have 
      limitations in terms of validation accuracy and operational overhead 
      <xref target="draft-wu-savnet-inter-domain-problem-statement"/>. 
      These mechanisms generate SAV rules based only on the Routing Information Base (RIB) 
      of the local AS. In cases of asymmetric routing, the generated rules may not match 
      the incoming direction of packets originating from a specific source address, 
      leading to improper block or improper permit problems. Consequently, despite the deployment 
      of SAV, an AS may still suffer from source address spoofing attacks from other ASes.</t>

      <t>To address the limitations of existing SAV mechanisms, this document proposes 
      an inter-domain source address validation architecture (SAVNET) that provides a 
      framework for developing new SAV mechanisms. The inter-domain SAVNET architecture enables 
      an AS to generate precise SAV rules by leveraging SAV-related information from 
      various sources, including Manual Configurations, RPKI ROA Objects and ASPA Objects, 
      and Collaborative Messages from other ASes. 
      This information consists of legitimate or nearly legitimate 
      prefixes of the ASes, ensuring that the source addresses of the ASes providing 
      such information are also protected. 
      By incorporating this additional information, SAVNET enhances the accuracy 
      of SAV rules beyond those generated solely based on the local RIB.</t>

      <t>This document focuses on high-level architecture designs and 
      does not specify protocols or protocol extensions.</t>
    </section>

    <!---->
    <section title="Terminology">
      
      <t>SAV rule: The rule that indicates the valid incoming interfaces for a 
      specific source prefix or that indicates the valid source prefixes for a specific interface. </t>

      <t>SAV Table: The table or data structure that implements the SAV rules
      and is used for source address validation in the data plane. </t>

      <t>Improper block: The validation results that the packets with legitimate 
      source addresses are blocked improperly due to inaccurate SAV rules.</t>

      <t>Improper permit: The validation results that the packets with spoofed 
      source addresses are permitted improperly due to inaccurate SAV rules.</t>

      <t>SIB: SAV information base that is for storing SAV-related information collected from different information sources.</t>
      
      <t>SMP: SIB management protocol that represents any protocols for managing data in SIB.</t>
    </section>

    <section title="Design Goals">
      <t>The inter-domain SAVNET architecture aims to enhance SAV accuracy and 
       facilitate partial deployment with low operational overhead. Achieving 
       high accuracy requires deployment at all peer, customer, and provider interfaces 
       of the ASes, while avoiding improper block and reducing as much improper permit as possible. 
       To this end, the overall goal can be broken down into the following aspects:</t>
      <ul spacing="normal">
          <li>An AS with peer and customer interfaces should accurately and completely 
           learn the source prefixes and corresponding incoming peer or customer interfaces 
           that match the real forwarding paths. 
           The AS should then permit all learned valid source prefixes and block any unknown 
           ones at peer or customer interfaces, to avoid improper block and 
           reduce improper permit at these interfaces.</li>

          <li>An AS with provider interfaces, particularly a multi-homed AS, should 
           accurately and completely learn the source prefixes 
           of other ASes that have deployed SAVNET, along with the corresponding 
           incoming provider interfaces. The AS should then permit all the learned 
           valid prefixes and any other unknown ones, and block all other learned 
           valid prefixes associated with other interfaces at its corresponding provider interface,
           to avoid improper block and reduce improper permit.</li>

          <li>The inter-domain SAVNET architecture should adapt to dynamic networks 
           and asymmetric routing scenarios automatically.</li> 

          <li>The inter-domain SAVNET architecture should provide sufficient protection 
           for the source prefixes of those ASes that deploy it even if only a portion 
           of Internet implements the architecture.</li>
      </ul>

      <t>To achieve the above goals, relying solely on local RIB data to generate 
        SAV rules (such as FP-uRPF and EFP-uRPF) is insufficient. 
        Additional SAV-related information must be taken into account to accurately 
        learn the source prefixes and their incoming interfaces. This information can 
        be obtained locally, configured manually, or even propagated or advertised by 
        other ASes. Therefore, the inter-domain SAVNET architecture consolidates 
        SAV-related information from multiple sources and generates SAV rules automatically 
        to achieve the aforementioned goals.</t>

      <t>Some other design goals (such as low operational overhead and easy implementation, etc.) 
      are also very important and should be considered in specific protocols or protocol extensions 
      and are out of scope for this document.</t>
    </section>

    <section title="Inter-domain SAVNET Architecture">
      <figure align="center" anchor="arch">
      <name>The inter-domain SAVNET Architecture</name>
      <artwork name="The inter-domain SAVNET Architecture"><![CDATA[
                                         +----------------------+
                                         |      Other ASes      |
                                         +----------------------+
                                                     |Collaborative
                                                     |Messages
+-----------------------------------------------------------------+                                       
|    |YANG |CLI |SMP     |RIB |ROA |ASPA             |         AS |
|   \/    \/   \/       \/   \/   \/                \/            |
| +---------------+ +------------------+ +----------------------+ |
| |     Manual    | | Passive Acquired | | Active Collaboration | |
| | Configuration | |   Information    | |     Information      | |
| +---------------+ +------------------+ +----------------------+ |
|         |                   |                      |            |
|        \/                  \/                     \/            |
| +-------------------------------------------------------------+ |
| | +---------------------------------------------------------+ | |
| | |                   SAV Information Base                  | | |
| | +---------------------------------------------------------+ | |
| |                 SAV Information Base Manager                | |
| +-------------------------------------------------------------+ |
|                                |                                |
|                               \/                                |
|   +---------------------------------------------------------+   |
|   |                         SAV Table                       |   |
|   +---------------------------------------------------------+   |
+-----------------------------------------------------------------+
        ]]></artwork>
      </figure>
      <t><xref target="arch"/> shows the overview of inter-domain SAVNET architecture. 
       Inter-domain SAVNET architecture collects SAV-related information from multiple sources,
       which can be categorized into
       three types: Manual Configuration, Passive Acquired Information, and 
       Active Collaboration Information.
       SAVNET uses the SAV-related information to maintain the
       SAV Information Base (SIB).
       Then, based on the SIB, it generates SAV rules to fill out the
       SAV table in the dataplane.</t>

      <t>Manual Configuration can be conducted by network operators
       using YANG, command-line interface (CLI), and SIB Management Protocol (SMP), 
       such as remote triggered black hole (RTBH) and FlowSpec.
       The Passive Acquired Information can
       be ontained within an AS and may come from RIB, Routing Information Messages, 
       or RPKI ROA objects and ASPA objects. 
       Active Collaboration Information contains Real Forwarding Paths and 
       is transmitted using Collaborative Messages from other ASes.</t>

      <t>We note that inter-domain SAVNET architecture does not
      require all the information sources to generate SAV rules.
      All of them, including the Collaborative Messages, 
      in SAVNET are optional depending on the availability of them and operational needs.
      The SAV Information Base Manager (SIM) and SAV table
      are necessary to generate SAV rules and perform SAV.</t>

      <section title="SAV Information Base">
        <t>SAV Information Base (SIB) is consolidated by the SAV Information
          Base Manager according to the SAV-related information from
          various sources.
          In SIB, each row records the index, the prefix, the prefix's valid incoming
          interface, the prefix's incoming direction, and the corresponding information source.</t>
        <figure align="center" anchor="sib">
          <name>An Example for the SAV Information Base</name>
          <artwork name="An Example of the SAV Information Base"><![CDATA[
+-----+------+------------------+---------+---------------------------+
|Index|Prefix|AS-level Interface|Direction|     Information Source    |
+-----+------+------------------+---------+---------------------------+
|  0  |  P1  |       X.1        |Provider |   Collaborative Message,  | 
|     |      |                  |         |RPKI ASPA Obj. and ROA Obj.|
+-----+------+------------------+---------+---------------------------+
|  1  |  P1  |       X.2        |Provider |            RIB            |
+-----+------+------------------+---------+---------------------------+
|  2  |  P2  |       X.2        |Provider |    Manual Configuration   |
+-----+------+------------------+---------+---------------------------+
|  3  |  P3  |       X.3        |   Peer  |   Collaborative Message,  |
|     |      |                  |         |Routing Information Message|
+-----+------+------------------+---------+---------------------------+
|  4  |  P4  |       X.4        |Customer |Collaborative Message, RIB |
+-----+------+------------------+---------+---------------------------+
|  5  |  P4  |       X.5        |Customer |            RIB            |
+-----+------+------------------+---------+---------------------------+
|  6  |  P5  |       X.5        |Customer |Routing Information Message|
+-----+------+------------------+---------+---------------------------+
          ]]></artwork>
        </figure>
        <figure align="center" anchor="as-topo">
          <name>AS Topology</name>
          <artwork name="An Example of AS Topology"><![CDATA[
+------------+       +------------+
|  AS 1(P1)  +-------+  AS 2(P2)  |
+-------/\---+       +--/\--------+  
         \              /      
    (C2P) \            / (C2P)  
           \ X.1  X.2 /          
          +------------+   (P2P)   +-------------+
          |    AS X    +-----------+  AS 3 (P3)  |
          +-/\------/\-+ X.3       +-------------+
         X.4 |   X.5 \
             |        \
             |         \ (C2P)
             |       +------------+
             |       |  AS 5(P5)  |
             |       +-/\---------+
             |         /
       (C2P) |        /
          +-------------+
          |  AS 4 (P4)  |
          +-------------+   
          ]]></artwork>
        </figure>

        <t>In order to provide a clear illustration of the SIB, <xref target="sib"/> depicts 
            an example of an SIB established in AS X. As shown in <xref target="as-topo"/>, 
            AS X has five interfaces, each connected to a different AS. 
            Specifically, X.1 is connected to AS 1, X.2 to AS 2, X.3 to AS 3, X.4 to AS 4, 
            and X.5 to AS 5. The arrows in the figure represent the commercial relationships 
            between ASes, with AS 1 and AS 2 serving as providers for AS X, 
            AS X as the lateral peer of AS 3, AS X as the provider for AS 4 and AS 5, 
            and AS 5 as the provider for AS 4.</t>

        <t>For example, in <xref target="sib"/>, the row with index 0 indicates the prefix P1's
          valid incoming interface is X.1, the ingress direction of P1 is AS X's Provider AS, 
          and these information is from the Collaborative Messages and RPKI ASPA Objects and ROA Objects.
          Note that the SAV-related information may have multiple sources and the SIB records them all.</t>
        
        <t>In sum, the SIB can be consolidated according to the SAV-related information 
          from the following information sources:</t>

        <ul spacing="normal">
            <li>Manual Configuaration: the SIB can obtain SAV-related configurations from 
            the Manual Configurations of network operators, such as YANG, command-line interface (CLI), 
            and remote configurations using the SIM, such as RTBH. </li>

            <li>Collaborative Message: the SIB can obtain the real forwarding 
            paths from the processed Collaborative Messages from other ASes.</li>

            <li>RPKI ROA Objects and ASPA Objects: the SIB can obtain the topological information from the
            RPKI ROA objects and RPKI ASPA objects over the local Routing Instance.
            The detailed solutions for collecting these information are out of scope for this document.</li>

            <li>Routing Information Message: the SIB can obtain the prefixes and their advertised 
            routes from the Routing Information Messages.</li>

            <li>Routing Information Base (RIB): the SIB can obtain the prefixes and their permissible 
            routes including the optional ones from the RIB.</li>
        </ul>
      
        <figure align="center" anchor="sav_src">
          <name>Priority Ranking for the SAV Information Sources</name>
          <artwork name="Priority Ranking for the SAV Information Sources"><![CDATA[
+---------------------------------------+--------+
|       SAV Information Source          |Priority|
+---------------------------------------+--------+
|         Manual Configuration          |    1   | 
+---------------------------------------+--------+
|        Collaborative Message          |    2   |
+---------------------------------------+--------+
|   RPKI ROA Objects and ASPA Objects   |    3   |
+---------------------------------------+--------+
|      Routing Information Message      |    4   |
+---------------------------------------+--------+
|       Routing Information Base        |    5   |
+---------------------------------------+--------+
          ]]></artwork>
        </figure>

        <t>The SIB may be maitained according to the SAV-related information
          from all the above information sources or part of them.
          It records the sources of the SAV information explicitly and can 
          be compressed to reduce its size.
          Inter-domain SAVNET architecture can allow operators to specify how
          to use the SAV-related information in the SIB by manual configurations.
          In fact, the SAV information sources also give the indications
          about how to use the SAV-related information from them.</t>
        
        <t>Notably, the information sources are not equivalent, and finer-grained information
          sources, such as Collaborative Messages, can help generate more accurate SAV rules 
          to reduce improper permit or improper block.
          <xref target="sav_src"/> proposes the priority ranking for the SAV information
          sources in the SIB. Inter-domain SAVNET can generate SAV rules based on the 
          priorities of SAV information sources.
          For example, for the provider interfaces which can use loose SAV rules, 
          inter-domain SAVNET may use the SAV-related information
          from all sources (e.g., the rows with index 0, 1, and 2 in <xref target='sib'/>)
          to generate rules, and for the customer interfaces which need more strict SAV rules, 
          SAVNET may only use the ones (e.g., the row with index 4 and 6 in <xref target='sib'/>).
          Here, for the row with index 6, inter-domain SAVNET uses it to generate
          SAV rules since only SAV-related information from the Routing Information Message 
          is available for the prefix P5.</t>
      </section>

      <section title='Collaborative Messages'>
        <t>The Collaborative Messages propagate or originate the real
        forwarding paths of prefixes between the Collaborative Protocol Speakers.
        The Collaborative Protocol Speaker within an AS can obtain the next hop 
        of the corresponding prefixes based on the routing table from the local 
        RIB, and use the Collaborative Messages to carry the next hop of the 
        corresponding prefixes and propagate them between ASes.</t>
        <t>The Collaborative Protocol Speaker can generate the real forwarding 
         paths of prefixes. It does this by connecting to the Collaborative Protocol 
         Speakers in other ASes, receiving, processing, generating, or terminating 
         Collaborative Messages.
         The Collaborative Protocol Speaker establishes connection with other 
         Collaborative Protocol Speakers in other ASes to exchange Collaborative Messages. 
         Then, it obtains the ASN, the prefixes, and their incoming AS direction for the SIB.</t>
        <t>Besides, the preferred AS paths of an AS and the prefixes may change 
         over time due to route changes. 
         The Collaborative Protocol Speaker should launch Collaborative Messages to 
         adapt to the route changes in a timely manner.
         In particular, inter-domain SAVNET should deal with the route changes carefully
         since improper block may be induced when the packet forwading path changes
         while the Collaborative Messages are not processed in time.
         The detailed design for dealing with the route changes is out of scope for this document.</t>
      </section>

      <section title="SAV Information Manager">
      <t>SAV Information Manager (SIM) consolidates SAV-related information 
        from multiple sources and generate SAV rules. 
        It uses the SAV-related information to initiate or update the SIB, and generates
        SAV rules to fill out the SAV table according to the SIB. 
        The collection methods of SAV-related information depend on the deployment
        and implementation of the inter-domain SAV mechanisms and are out of scope for this document.</t>

        <t>Based on the SIB, SIM generates SAV rules to fill out the SAV table, which consists 
        of the &lt;Prefixes, Interface&gt; couples, and represents the legitimate prefixes 
        for each incoming interface.
        Note that the interfaces in SIB are logical AS-level interfaces, they need to be converted 
        to the physical interfaces of border routers within the corresponding AS.</t>

        <figure align="center" anchor="sav_tab">
          <name>An Example of SAV table</name>
          <artwork name="An Example of the SAV table"><![CDATA[
+------------------------------------+
| Source Prefix | Incoming Interface |
+---------------+--------------------+
|      P1       |          1         |
|      P2       |          2         |
|      P3       |          3         |
+------------------------------------+
          ]]></artwork>
        </figure>
        <t><xref target="sav_tab"/> shows an example of the SAV table. 
        The packets coming from other ASes will be validated by the SAV table. 
        The router looks up each packet's source address in its local SAV 
        table and gets one of three validity states: "Valid", "Invalid" or 
        "Unknown". "Valid" means that there is a source prefix in SAV table 
        covering the source address of the packet and the valid incoming
        interfaces covering the actual incoming interface of the packet.
        According to the SAV principle, "Valid" packets will be forwarded.
        "Invalid" means there is a source prefix in SAV table covering the 
        source address, but the incoming interface of the packet does not
        match any valid incoming interface so that such packets will be
        dropped. "Unknown" means there is no source prefix in SAV table
        covering the source address. The packet with "unknown" addresses can
        be dropped or permitted, which depends on the choice of operators.</t>

        <t>The SAV table can be enabled at provider, peer, or customer 
        interfaces. Different interfaces can take on proper SAV table modes
        defined in <xref target="draft-huang-savnet-sav-table"/>. For customer
        interfaces, if all the customer ASes have advertised complete source
        prefixes and SAV Protocol Messages, Prefix Allowlist Mode can be
        applied ("Mode 1" in <xref target="draft-huang-savnet-sav-table"/>).
        This mode drops any packets whose source addresses are not included in
        the allowlist of the customer interfaces. If the legitimate source
        prefixes arriving at the interfaces are not complete, the Interface
        Blocklist Mode can be taken ("Mode 2" in <xref
        target="draft-huang-savnet-sav-table"/>). This latter mode checks
        whether specific source prefixes coming from the invalid
        interfaces. The packets with unknown prefixes will be forwarded
        normally. Thus, they are safer than Prefix Allowlist Mode.</t>
      </section>
    </section>

    <section title="Partial Deployment">
      <t>Since it is impossible to deploy inter-domain SAVNET in all ASes
      simultaneously, inter-domain SAVNET must support partial
      deployment. In inter-domain SAVNET architecture, the manual configuration,
      topological information, and the known prefixes can be obtained locally. Even
      for the real forwarding path information, it does not suppose that all
      ASes deploy the Collaborative Protocol Speakers, as a 
      Collaborative Protocol Speaker can easily find an AS which deploys 
      another Collaborative Protocol Speaker and establishes
      logical neighboring relationship with the AS.</t>

      <t>Overall, ASes which
      deploys inter-domain SAVNET cannot spoof each other, and non-deployed 
      ASes cannot send spoofed packets to the deployed ASes by forging their
      source addresses. With the merger of different
      ASes where the inter-domain SAVNET is deployed, the "deployed
      area" will gradually expand, and the defense capability against source
      address spoofing will gradually increase. Moreover, if multiple
      "deployed areas" can be logically connected (by crossing the
      "non-deployed areas"), these "deployed areas" can form a logic alliance
      to protect their addresses from being forged.</t>
    </section>

    <section title="Security Considerations">
      <t>In inter-domain SAVNET architecture, the Collaborative Protocol
       Speaker generates and propagates Collaborative Messages 
       among different ASes. To prevent a malicious AS from generating incorrect 
       or forged Collaborative Messages, 
       the Collaborative Protocol Speakers need to perform security 
       authentication on each received Collaborative Message. 
       Security threats to inter-domain SAVNET come from two 
       aspects: session security and content security. 
       Session security means that the identities of both parties in 
       a session can be verified and the integrity of the session content 
       can be ensured. Content security means that the authenticity and 
       reliability of the session content can be verified, i.e., the 
       forged Collaborative Message can be identified.</t>

      <t>The threats to session security include:</t>

      <ul spacing="normal">
        <li>Session identity impersonation: A malicious router masquerades as
        a peer of another router to establish a session with the router.</li>

        <li>Session integrity destroying: A malicious intermediate router
        between two peering routers destroys the content of the relayed 
        Collaborative Message.</li>
      </ul>

      <t>The threats to content security include:</t>

      <ul spacing="normal">
        <li>Message alteration: A malicious router forges any part of a 
         Collaborative Message, for example, using a 
         spoofed ASN or AS Path.</li>

        <li>Message injection: A malicious router injects a "legitimate" 
         Collaborative Message and sends it to the 
         corresponding next-hop AS, such as replay attacks.</li>

        <li>Path deviation: A malicious router sends a 
         Collaborative Message
         to a wrong next-hop AS which conflicts with the AS Path.</li>
      </ul>

      <t>Overall, inter-domain SAVNET faces security threats similar to those
      of BGP. To enhance session security, inter-domain SAVNET may use the
      same session authentication mechanisms as BGP, i.e., performing session
      authentication based on MD5, TCP-AO, or Keychain. To enhance content
      security, existing BGP security mechanisms (e.g., RPKI, BGPsec, and
      ASPA) can also help address content security threats to inter-domain
      SAVNET. But until these mechanisms are widely deployed, an independent
      security mechanism for inter-domain SAVNET is needed. In the preliminary
      idea, each origin AS calculates a digital signature for each AS path and
      adds these digital signatures into the Collaborative Message. 
      When a Collaborative Protocol Speaker receives a 
      Collaborative Message, it can check the digital
      signature to identify the authenticity of this message.
      Specific security designs will be included in a separate draft.</t>
    </section>

    <section title="Privacy Considerations">
      <t>This document should not affect the privacy of the Internet.</t>
    </section>

    <section title="IANA Considerations">
      <t/>

      <t>This document has no IANA requirements.</t>
    </section>

    <section title="Contributors">
      <t/>
      <author fullname="Igor Lubashev" initials="I." surname="Lubashev">
      <organization abbrev="Akamai">Akamai Technologies</organization>
      <address>
        <postal>
          <street> 145 Broadway </street>
          <city> Cambridge </city>
          <region>MA</region>
          <code> 02142 </code>
          <country>United States of America</country>
        </postal>
        <email>ilubashe@akamai.com</email>
      </address>
      </author>
      <t>Many thanks to Igor Lubashev for the significantly helpful revision suggestions.</t>
    </section>

    <!---->
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include='reference.RFC.8174'?>

      <?rfc include='reference.RFC.3704'?>

      <?rfc include='reference.RFC.8704'?>

      <reference anchor="draft-huang-savnet-sav-table" target="https://datatracker.ietf.org/doc/draft-huang-savnet-sav-table/">
        <front>
          <title>Source Address Validation Table Abstraction and
          Application</title>

          <author fullname="Mingqing Huang" initials="M." surname="Huang">
            <organization>Huawei</organization>

            <address>
              <postal>
                <city>Beijing</city>

                <country>China</country>
              </postal>

              <email>huangmingqing@huawei.com</email>
            </address>
          </author>

          <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
            <organization>China Mobile</organization>

            <address>
              <postal>
                <city>Beijing</city>

                <country>China</country>
              </postal>

              <email>chengweiqiang@chinamobile.com</email>
            </address>
          </author>

          <author fullname="Dan Li" initials="D." surname="Li">
            <organization>Tsinghua University</organization>

            <address>
              <postal>
                <city>Beijing</city>

                <country>China</country>
              </postal>

              <email>tolidan@tsinghua.edu.cn</email>
            </address>
          </author>

          <author fullname="Nan Geng" initials="N." surname="Geng">
            <organization>Huawei</organization>

            <address>
              <postal>
                <city>Beijing</city>

                <country>China</country>
              </postal>

              <email>gengnan@huawei.com</email>
            </address>
          </author>

          <author fullname="Mingxing Liu" initials="M." surname="Liu">
            <organization>Huawei</organization>
            <address>
              <postal>
                <city>Beijing</city>
                <country>China</country>
              </postal>
              <email>liumingxing7@huawei.com</email>
            </address>
          </author>

          <author fullname="Li Chen" initials="L." surname="Chen">
            <organization>Zhongguancun Laboratory</organization>

            <address>
              <postal>
                <city>Beijing</city>

                <country>China</country>
              </postal>

              <email>Lichen@zgclab.edu.cn</email>
            </address>
          </author>
          <date year="2023"/>
        </front>
      </reference>

      <reference anchor="draft-wu-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/draft-wu-savnet-inter-domain-problem-statement/">
        <front>
          <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
          <author fullname="Jianping Wu" initials="J." surname="Wu">
            <organization>Tsinghua University</organization>

            <address>
              <postal>
                <street/>

                <city>Beijing</city>

                <region/>

                <code/>

                <country>China</country>
              </postal>

              <email>jianping@cernet.edu.cn</email>

              <uri/>
            </address>
          </author>

          <author fullname="Dan Li" initials="D." surname="Li">
            <organization>Tsinghua University</organization>

            <address>
              <postal>
                <street/>

                <city>Beijing</city>

                <country>China</country>
              </postal>

              <email>tolidan@tsinghua.edu.cn</email>
            </address>
          </author>

          <author fullname="Libin Liu" initials="L." surname="Liu">
            <organization>Zhongguancun Laboratory</organization>

            <address>
              <postal>
                <street/>

                <city>Beijing</city>

                <region/>

                <code/>

                <country>China</country>
              </postal>

              <email>liulb@zgclab.edu.cn</email>

              <uri/>
            </address>
          </author>

          <author fullname="Mingqing Huang" initials="M." surname="Huang">
            <organization>Huawei</organization>

            <address>
              <postal>
                <street/>

                <city>Beijing</city>

                <region/>

                <code/>

                <country>China</country>
              </postal>

              <email>huangmingqing@huawei.com</email>

              <uri/>
            </address>
          </author>

          <author fullname="Nan Geng" initials="N." surname="Geng">
            <organization>Huawei</organization>

            <address>
              <postal>
                <street/>

                <city>Beijing</city>

                <region/>

                <code/>

                <country>China</country>
              </postal>

              <email>gengnan@huawei.com</email>

              <uri/>
            </address>
          </author>
          <date year="2023"/>
        </front>
      </reference>
    </references>
  </back>
</rfc>
