<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.31 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wu-savnet-inter-domain-architecture-02" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="Inter-domain SAVNET Architecture">Inter-domain Source Address Validation (SAVNET) Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-02"/>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2023" month="June" day="01"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <t>This document presents an inter-domain SAVNET architecture that serves as a comprehensive framework for the development of inter-domain source address validation (SAV) mechanisms. The proposed architecture empowers AS to generate SAV rules by leveraging SAV-related information from various sources. It integrates existing SAV mechanisms and offers ample design space for new inter-domain SAV mechanisms. Instead of delving into protocol extensions or implementations, this document primarily focuses on defining the interconnections between architectural elements, components, and the SAV-related information required for deploying an inter-domain SAV mechanism.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Attacks based on source IP address spoofing, such as reflective DDoS and flooding attacks, continue to present significant challenges to Internet security. Mitigating these attacks in inter-domain networks requires effective source address validation (SAV). While BCP84 <xref target="RFC3704"/> <xref target="RFC8704"/> offers some SAV solutions, such as ACL-based ingress filtering and uRPF-based mechanisms, existing inter-domain SAV mechanisms have limitations in terms of validation accuracy and operational overhead in different scenarios <xref target="inter-domain-ps"/>.</t>
      <t>To address these issues, the inter-domain SAVNET architecture focuses on providing a comprehensive framework and guidelines for the design and implementation of inter-domain SAV mechanisms. By defining the architectural relationships, components, and SAV-related information used in such deployments, this document aims to promote consistency, interoperability, and collaboration among ASes. The inter-domain SAVNET architecture empowers ASes to generate precise SAV rules by leveraging SAV-related information from various sources, including Manual Configurations, Routing Information (such as RPKI ROA Objects and ASPA Objects, and RIB), and SAV-tailored Messages from other ASes. This information consists of legitimate or nearly legitimate prefixes of ASes and their corresponding legitimate incoming interfaces. By consolidating this information, the inter-domain SAVNET architecture improves the accuracy of SAV rules beyond what can be achieved solely based on the local RIB. Additionally, it ensures that the source addresses of ASes providing SAV-tailored information with SAV-tailored Messages are also protected.</t>
      <t>This document primarily describes a high-level architecture for consolidating SAV-related information from various sources and deploying an inter-domain SAV mechanism between ASes. The document does not specify protocol extensions or implementations. Its purpose is to provide a conceptual framework and guidance for the development of inter-domain SAV solutions, allowing implementers to adapt and implement the architecture based on their specific requirements and network environments.</t>
      <section anchor="scope">
        <name>Scope</name>
        <t>In this architecture, the choice of protocols used for communication between the SAVNET agent and different SAV information sources is not limited. The inter-domain SAVNET architecture presents considerations on how to consolidate SAV-related information from various sources to generate SAV rules and perform SAV using the SAV table in the dataplane. The detailed design and implementation of the SAV rule generation and SAV execution depend on the specific inter-domain SAV mechanisms employed.</t>
        <t>This document does not cover administrative or business agreements that may be established between the involved inter-domain SAVNET parties. These considerations are beyond the scope of this document. However, it is assumed that authentication and authorization mechanisms can be implemented to ensure that only authorized ASes can communicate SAV-related information.</t>
        <t>A detailed set of requirements for inter-domain SAV are discussed in <xref target="inter-domain-ps"/>. The inter-domain SAVNET architecture is designed to adhere to those requirements, and this document primarily introduces a new scalability requirement in addition to the existing ones.</t>
      </section>
      <section anchor="assumptions">
        <name>Assumptions</name>
        <t>This document makes the following assumptions:</t>
        <ul spacing="normal">
          <li>All ASes where the inter-domain SAVNET is deployed are assumed to provide the necessary connectivity between SAVNET agents and any intermediate network elements. However, the architecture does not impose any specific limitations on the form or nature of this connectivity.</li>
          <li>Congestion and resource exhaustion can occur at various points in the inter-domain networks. Hence, in general, network conditions should be assumed to be hostile. The inter-domain SAVNET architecture must be capable of functioning reliably under all circumstances, including scenarios where the paths for delivering SAV-related information are severely impaired. It is crucial to design the inter-domain SAVNET system with a high level of resilience, particularly under extremely hostile network conditions. The architecture should ensure uninterrupted communication between inter-domain SAVNET agents, even when data-plane traffic saturates the link.</li>
          <li>The inter-domain SAVNET architecture does not impose rigid requirements for the SAV information sources that can be used to generate SAV rules. Similarly, it does not dictate strict rules on how to utilize the SAV-related information from diverse sources or perform SAV using the SAV table in the dataplane. Network operators have the flexibility to choose their approach based on their specific requirements and preferences. Operators can either follow the recommendations outlined in the inter-domain SAVNET architecture or manually define the rules governing the use of SAV-related information, the generation of SAV rules, and the execution of SAV in the dataplane.</li>
          <li>The inter-domain SAVNET architecture does not impose restrictions on the selection of the local AS with which AS communicates SAV-tailored information. The ASes have the flexibility to establish SAV-tailored protocol connections based on the manual configurations set by operators or other automatic mechanisms.</li>
          <li>The inter-domain SAVNET architecture provides the flexibility to accommodate Quality-of-Service (QoS) policy agreements between SAVNET-enabled ASes or local QoS prioritization measures, but it does not make assumptions about their presence. These agreements or prioritization efforts are aimed at ensuring the reliable delivery of inter-domain SAVNET messages between SAVNET agents. It's important to note that QoS is considered as an operational consideration rather than a functional component of the inter-domain SAVNET architecture.</li>
          <li>The signal and data channels are loosely coupled and are used for collecting SAV-related information from different sources, and how the inter-domain SAVNET synchronize the management and operation configurations is out of scope of this document.</li>
        </ul>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV Rule:</dt>
        <dd>
          <t>The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        </dd>
        <dt>SAV Table:</dt>
        <dd>
          <t>The table or data structure that implements the SAV rules and is used for source address validation in the data plane.</t>
        </dd>
        <dt>Real forwading paths:</dt>
        <dd>
          <t>The paths that the legitimate traffic goes through in the data plane.</t>
        </dd>
        <dt>SAV-related information:</dt>
        <dd>
          <t>The information is used to generate SAV rules and can be from various sources, such as Manual Configurations, RIB, SAV-tailored Messages of ASes, etc.</t>
        </dd>
        <dt>SAV-tailored message:</dt>
        <dd>
          <t>The message is used to carry the SAV-tailored information between ASes and can be communicated following a dedicated SAV communication protocol.</t>
        </dd>
        <dt>SAVNET agent:</dt>
        <dd>
          <t>Any SAVNET-aware software module capable of collecting SAV-related information. It can be a module to accept Manual Configurations or process routing information, SAV-tailored protocol speaker, or, as a logical agent.</t>
        </dd>
        <dt>Improper block:</dt>
        <dd>
          <t>The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Improper permit:</dt>
        <dd>
          <t>The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>SAV information base:</dt>
        <dd>
          <t>SAV information base is for storing SAV-related information collected from various sources.</t>
        </dd>
        <dt>SAV information base management protocol:</dt>
        <dd>
          <t>SAV information base management protocol represents any protocols for operating and managing the SAV information base.</t>
        </dd>
      </dl>
    </section>
    <section anchor="design-goals">
      <name>Design Goals</name>
      <t>The inter-domain SAVNET architecture aims to improve SAV accuracy and facilitate partial deployment with low operational overhead, as well as supporting developing a unified SAV-tailored protocol to communicate SAV-tailored messages between ASes. The overall goal can be broken down into the following aspects:</t>
      <ul spacing="normal">
        <li>First, the inter-domain SAVNET architecture should learn SAV-related information that consists of real forwarding paths or permissible paths of prefixes that can cover the real forwarding paths, and generate accurate and finer-grained SAV rules automatically based on the learned information to avoid improper block and reduce improper permit as much as possible.</li>
        <li>Second, the inter-domain SAVNET architecture should adapt to dynamic networks and asymmetric routing scenarios automatically.</li>
        <li>Third, the inter-domain SAVNET architecture should provide sufficient protection for the source prefixes of ASes that deploy it, even if only a portion of Internet implements the architecture.</li>
        <li>Fourth, the inter-domain SAVNET architecture should support to communicate SAV-tailored information with a unified SAV-tailored protocol between ASes.</li>
        <li>Last, the inter-domain SAVNET architecture should scale independently from the SAV information sources and the growth of the deployed Internet devices.</li>
      </ul>
      <t>SAV-related information can be obtained from different sources, including RIB, Manual Configurations, or SAV-tailored Messages communicated between ASes. The inter-domain SAVNET architecture consolidates SAV-related information from multiple sources and generates SAV rules automatically, and adapts proactively to route changes in a timely manner to achieve the goals outlined above.</t>
      <t>Other design goals, such as low operational overhead and easy implementation, are also very important and should be considered in specific protocols or protocol extensions and are out of scope for this document.</t>
    </section>
    <section anchor="inter-domain-savnet-architecture">
      <name>Inter-domain SAVNET Architecture</name>
      <figure anchor="arch">
        <name>The inter-domain SAVNET architecture</name>
        <artwork><![CDATA[
                                         +--------------------+
                                         |     Other ASes     |
                                         +--------------------+
                                                   |SAV-tailored
                                                   |Messages
+-------------------------------------------------------------+                                       
|    |YANG |CLI |SMP    |RIB |ROA |ASPA            |       AS |
|   \/    \/   \/      \/   \/   \/               \/          |
| +---------------+ +-----------------+ +-------------------+ |
| |     Manual    | |     Routing     | |   SAV-tailored    | |
| | Configuration | |   Information   | |   Information     | |
| +---------------+ +-----------------+ +-------------------+ |
|         |                   |                    |          |
|        \/                  \/                   \/          |
| +---------------------------------------------------------+ |
| | +-----------------------------------------------------+ | |
| | |                  SAV Information Base               | | |
| | +-----------------------------------------------------+ | |
| |                SAV Information Base Manager             | |
| +---------------------------------------------------------+ |
|                              |SAV Rules                     |
|                             \/                              |
|   +-----------------------------------------------------+   |
|   |                      SAV Table                      |   |
|   +-----------------------------------------------------+   |
+-------------------------------------------------------------+
]]></artwork>
      </figure>
      <t><xref target="arch"/> shows the overview of the inter-domain SAVNET architecture. The inter-domain SAVNET architecture collects SAV-related information from multiple sources, which can be categorized into three types: Manual Configuration, Routing Information, and SAV-tailored Information. The SAV information base manager (SIM) uses the collected SAV-related information to maintain the SAV Information Base (SIB), and then generate SAV rules based on the SIB and 
fill out the SAV table in the dataplane.</t>
      <t>Manual Configuration can be conducted by network operators using various methods such as YANG, Command-Line Interface (CLI), and SIB Management Protocol (SMP) like remote triggered black hole (RTBH) <xref target="RFC5635"/> and FlowSpec <xref target="RFC8955"/>. The Routing Information can be obtained within an AS and may come from RIB, Routing Information Messages, or RPKI ROA objects and ASPA objects. And SAV-tailored Information, which contains real forwarding paths of the prefixes, is transmitted using SAV-tailored Messages from other ASes.</t>
      <t>It is important to note that the inter-domain SAVNET architecture does not require all the information sources to generate SAV rules. All of the sources, including SAV-tailored Messages, are optional depending on their availability and the operational needs of the inter-domain SAV mechanisms. However, the SAV Information Base Manager (SIM) and SAV table are necessary components for generating SAV rules and performing SAV.</t>
      <t>Additionally, inter-domain SAVNET architecture does not prescribe any specific deployment models.</t>
      <section anchor="sib-sec">
        <name>SAV Information Base</name>
        <t>The SAV Information Base (SIB) is managed by the SAV Information Base Manager, which consolidates SAV-related information from various sources. Each row of the SIB contains an index, prefix, valid incoming interface for the prefix, incoming direction, and the corresponding sources of these SAV-related information.</t>
        <figure anchor="sib">
          <name>An example for the SAV information base</name>
          <artwork><![CDATA[
+-----+------+------------------+---------+---------------------------+
|Index|Prefix|AS-level Interface|Direction|   SAV Information Source  |
+-----+------+------------------+---------+---------------------------+
|  0  |  P1  |      Itf.1       |Provider | SAV-tailored Message, RIB | 
+-----+------+------------------+---------+---------------------------+
|  1  |  P1  |      Itf.2       |Provider |            RIB            |
+-----+------+------------------+---------+---------------------------+
|  2  |  P2  |      Itf.2       |Provider |    Manual Configuration   |
+-----+------+------------------+---------+---------------------------+
|  3  |  P3  |      Itf.3       |  Peer   |    SAV-tailored Message,  |
|     |      |                  |         |RPKI ROA Obj. and ASPA Obj.|
+-----+------+------------------+---------+---------------------------+
|  4  |  P4  |      Itf.4       |Customer |    SAV-tailored Message   |
+-----+------+------------------+---------+---------------------------+
|  5  |  P4  |      Itf.5       |Customer |RPKI ROA Obj. and ASPA Obj.|
+-----+------+------------------+---------+---------------------------+
|  6  |  P5  |      Itf.5       |Customer |            RIB            |
+-----+------+------------------+---------+---------------------------+
]]></artwork>
        </figure>
        <figure anchor="as-topo">
          <name>AS topology</name>
          <artwork><![CDATA[
+------------+  (P2P)  +------------+
|  AS 1(P1)  +---------+  AS 2(P2)  |
+--------/\--+         +--/\--------+  
          \               /       
     (C2P) \             / (C2P)
      Itf.1 \           / Itf.2        
            +------------+   (P2P)   +------------+
            |    AS X    +-----------+  AS 3(P3)  |
            +-/\------/\-+ Itf.3     +------------+
         Itf.4 | Itf.5 \ 
               |        \
               |         \ (C2P)
               |       +------------+
               |       |  AS 5(P5)  |
               |       +-/\---------+
               |         /
         (C2P) |        / (C2P)
             +------------+
             |  AS 4(P4)  |
             +------------+   
]]></artwork>
        </figure>
        <t>In order to provide a clear illustration of the SIB, <xref target="sib"/> depicts an example of an SIB established in AS X. As shown in <xref target="as-topo"/>, AS X has five interfaces, each connected to a different AS. Specifically, Itf.1 is connected to AS 1, Itf.2 to AS 2, Itf.3 to AS 3, Itf.4 to AS 4, and Itf.5 to AS 5. The arrows in the figure represent the commercial relationships between ASes, with AS 1 and AS 2 serving as providers for AS X, AS X as the lateral peer of AS 3, AS X as the provider for AS 4 and AS 5, and AS 5 as the provider for AS 4.</t>
        <t>For example, in <xref target="sib"/>, the row with index 0 indicates prefix P1's valid incoming interface is Itf.1, the ingress direction of P1 is AS X's Provider AS, and these information is from the SAV-tailored Messages and RIB. Note that a SAV-related information may have multiple sources and the SIB records them all.</t>
        <t>In sum, the SIB can be consolidated according to the SAV-related information from the following sources:</t>
        <ul spacing="normal">
          <li>Manual Configuaration: the SIB can obtain SAV-related configurations from the Manual Configurations of network operators using various methods, such as YANG, Command-Line Interface (CLI), and the SIM like RTBH <xref target="RFC5635"/> and FlowSpec <xref target="RFC8955"/>.</li>
          <li>SAV-tailored Message: the SIB can obtain real forwarding paths of the prefixes from the processed SAV-tailored Messages from other ASes.</li>
          <li>RPKI ROA Objects and ASPA Objects: the SIB can obtain the topological information from the RPKI ROA objects and ASPA objects over the local routing instance.</li>
          <li>Routing Information Base (RIB): the SIB can obtain the prefixes and their permissible routes including the optional ones and optional ones from the RIB.</li>
        </ul>
        <figure anchor="sav_src">
          <name>Priority ranking for the SAV information sources</name>
          <artwork><![CDATA[
+---------------------------------------+--------+
|        SAV Information Source         |Priority|
+---------------------------------------+--------+
|         Manual Configuration          |    1   | 
+---------------------------------------+--------+
|         SAV-tailored Message          |    2   |
+---------------------------------------+--------+
|   RPKI ROA Objects and ASPA Objects   |    3   |
+---------------------------------------+--------+
|                  RIB                  |    4   |
+---------------------------------------+--------+
]]></artwork>
        </figure>
        <t>The SIB is maintained according to the SAV-related information from all the above information sources or part of them. It explicitly records the sources of the SAV-related information and can be compressed to reduce its size. Inter-domain SAVNET architecture allows operators to specify how to use the SAV-related information in the SIB by manual configurations. In fact, the SAV information sources also give indications about how to use the SAV-related information from them.</t>
        <t>Notably, the SAV information sources are not equivalent, and finer-grained information sources, such as SAV-tailored Messages, can help generate more accurate SAV rules to reduce improper permit or avoid improper block. <xref target="sav_src"/> proposes the priority ranking for the SAV information sources in the SIB. Inter-domain SAVNET architecture can generate SAV rules based on the priorities of SAV information sources. For example, for the provider interfaces which can use loose SAV rules, inter-domain SAVNET may use the SAV-related information from all the sources (e.g., the rows with index 0, 1, and 2 in <xref target="sib"/>) to generate rules, while for the customer interfaces which need more strict SAV rules, inter-domain SAVNET architecture may only use the ones (e.g., the rows with index 4 and 6 in <xref target="sib"/>). Here, inter-domain SAVNET architecture uses the row with index 6 to generate SAV rules since only SAV-related information from the RIB is available for prefix P5.</t>
      </section>
      <section anchor="sav-tailored-protocol">
        <name>SAV-tailored Protocol</name>
        <figure anchor="sav_msg">
          <name>Communicating SAV-tailored messages between SAV-tailored protocol speakers with SAV-tailored protocol</name>
          <artwork><![CDATA[
+-----------------------+                +-----------------------+
|          AS           |  SAV-tailored  |          AS           |
| +------------------+  |    Messages    |  +------------------+ |
| |   SAV-tailored   |<-|----------------|->|   SAV-tailored   | |
| | Protocol Speaker |  |                |  | Protocol Speaker | |
| +------------------+  |                |  +------------------+ |
+-----------------------+                +-----------------------+
]]></artwork>
        </figure>
        <t>As shown in <xref target="sav_msg"/>, SAV-tailored Messages are used to propagate or originate the real forwarding paths of prefixes between SAV-tailored Protocol Speakers. Within an AS, the SAV-tailored Protocol Speaker can obtain the next hop of the corresponding prefixes based on the routing table from the local RIB and use SAV-tailored Messages to carry the next hops of the corresponding prefixes and propagate them between ASes.</t>
        <t>To generate the real forwarding paths of prefixes, the SAV-tailored Protocol Speaker connects to other SAV-tailored Protocol Speakers in other ASes, receives, processes, generates, or terminates SAV-tailored Messages. Then, it obtains the ASN, the prefixes, and their incoming AS direction for maintaining the SIB. It is important to note that the SAV-tailored Protocol Speaker within an AS has the capability to establish connections with multiple SAV-tailored Protocol Speakers from different ASes, relying on either manual configurations by operators or a predetermined automatic mechanism.</t>
        <t>Moreover, the preferred AS paths of an AS may change over time due to route changes, including source prefix change and AS path change. The SAV-tailored Protocol Speaker should launch SAV-tailored Messages to adapt to the route changes in a timely manner. Inter-domain SAVNET should handle route changes carefully to avoid improper block. The reasons for this include late detection of route changes, delayed message transmission, or packet losses. However, the detailed design for dealing with route changes is outside the scope of this document.</t>
      </section>
      <section anchor="sav-information-base-manager">
        <name>SAV Information Base Manager</name>
        <t>SAV Information Base Manager (SIM) consolidates SAV-related information from multiple sources and generates SAV rules. It uses the SAV-related information to initiate or update the SIB and generates SAV rules to populate the SAV table according to the SIB. The collection methods of SAV-related information depend on the deployment and implementation of the inter-domain SAV mechanisms and are out of scope for this document.</t>
        <t>Using the SIB, SIM produces (Prefixes, Interface) pairs to populate the SAV table, which represents the legitimate prefixes for each incoming interface. It's worth noting that the interfaces in the SIB are logical AS-level interfaces and need to be mapped to the physical interfaces of border routers within the corresponding AS.</t>
        <figure anchor="sav_tab">
          <name>An example of SAV table</name>
          <artwork><![CDATA[
+------------------------------------+
| Source Prefix | Incoming Interface |
+---------------+--------------------+
|      P1       |          1         |
|      P2       |          2         |
|      P3       |          3         |
+------------------------------------+
]]></artwork>
        </figure>
        <t><xref target="sav_tab"/> shows an example of the SAV table. The packets coming from other ASes will be validated by the SAV table. The router looks up each packet's source address in its local SAV table and gets one of three validity states: "Valid", "Invalid" or "Unknown". "Valid" means that there is a source prefix in SAV table covering the source address of the packet and the valid incoming interfaces covering the actual incoming interface of the packet. According to the SAV principle, "Valid" packets will be forwarded. "Invalid" means there is a source prefix in SAV table covering the source address, but the incoming interface of the packet does not match any valid incoming interface so that such packets will be dropped. "Unknown" means there is no source prefix in SAV table covering the source address. The packet with "unknown" addresses can be dropped or permitted, which depends on the choice of operators. The structure and usage of SAV table can refer to <xref target="sav-table"/>.</t>
      </section>
      <section anchor="data-channel-and-signal-channel">
        <name>Data Channel and Signal Channel</name>
        <figure anchor="sav_agent_config">
          <name>The data channel and signal channel connected to different SAV information sources for collecting SAV-related information</name>
          <artwork><![CDATA[
+-------+
|       |       Data Channel        +--------------------------------+ 
|       |<==========================|        Network Operators       |
|       |                           +--------------------------------+
|       |
|       |      Signal Channel       +--------------------------------+
|       |<--------------------------| RPKI ROA and ASPA Cache Server |
|  SAV  |                           +--------------------------------+
| Agent |
|       |      Signal Channel       +--------------------------------+
|       |<--------------------------|               RIB              |
|       |                           +--------------------------------+
|       |
|       |      Signal Channel       +--------------------------------+
|       |<------------------------->|            SAV Agent           |
|       |                           +--------------------------------+
+-------+
]]></artwork>
        </figure>
        <t>As illustrated in <xref target="sav_agent_config"/>, there are different modules to receive SAV-related information from network operators, RIB, RPKI ROA objects and ASPA objects, and other ASes: Data Channel and Signal Channel. SAV Agent is a general term for the modules like manual configuration processor, module for accessing RIB, RPKI validator, and SAV-tailored protocol speaker.</t>
        <t>The primary purpose of the data channel is to deliver SAV-related information from Manual Configurations of network operators and SAVNET-specialized configurations. Examples of such information include, but are not limited to:</t>
        <ul spacing="normal">
          <li>SAV configurations using YANG.</li>
          <li>SAV configurations using CLI.</li>
          <li>SAV configurations using SMP.</li>
          <li>SAVNET operation and management.</li>
          <li>Inter-domain SAVNET provisioning.</li>
        </ul>
        <t>Note that the information can be delivered at anytime and is required reliable delivery for the data channel implementation.</t>
        <t>The signal channel serves as a means to transmit SAV-related information from various sources, including RIB, RPKI ROA objects, ASPA objects, SAV-tailored messages from other SAV Agents in different ASes, and routing messages. An SAV Agent can establish connections with multiple SAV Agents belonging to different ASes based on manual configurations by operators or a predetermined automatic mechanism. Additionally, it can carry telemetry information, such as metrics pertaining to forwarding performance, the count of spoofing packets and discarded packets, provided that the SAV Agent has access to such data. Moreover, the signal channel can include information regarding the prefixes associated with the spoofing traffic, as observed by the SAV Agent up until the most recent time. It is worth noting that the signal channel may need to operate over a network link that is currently under a source address spoofing attack. As a result, it may experience severe packet loss and high latency due to the ongoing attack.</t>
      </section>
    </section>
    <section anchor="partial-deployment">
      <name>Partial Deployment</name>
      <t>The inter-domain SAVNET architecture <bcp14>MUST</bcp14> ensure support for partial deployment as it is not feasible to deploy it simultaneously in all ASes. Within the architecture, certain information such as operator configurations, topological information, and routing information can be obtained locally when the corresponding sources are available. Furthermore, it is not mandatory for all ASes to deploy SAV-tailored Protocol Speakers even for SAV-tailored information. Instead, a SAV-tailored Protocol Speaker can effortlessly establish a logical neighboring relationship with another AS that has deployed a SAV-tailored Protocol Speaker. This flexibility enables the architecture to accommodate varying degrees of deployment, promoting interoperability and collaboration among participating ASes.</t>
      <t>In general, the ASes that implement the inter-domain SAVNET architecture cannot engage in source address spoofing against each other. Additionally, non-deployed ASes are unable to send spoofed packets to the deployed ASes by falsifying their source addresses. As more ASes adopt the inter-domain SAVNET architecture, the "deployed area" expands, thereby increasing the collective defense capability against source address spoofing. Furthermore, if multiple "deployed areas" can be logically interconnected across "non-deployed areas," these interconnected "deployed areas" can form a logical alliance, providing enhanced protection against address spoofing.</t>
    </section>
    <section anchor="convergence-considerations">
      <name>Convergence Considerations</name>
      <t>Convergence issues <bcp14>SHOULD</bcp14> be carefully considered in inter-domain SAV mechanisms due to the dynamic nature of the Internet. Internet routes undergo continuous changes, and SAV rules <bcp14>MUST</bcp14> proactively adapt to these changes, such as prefix and topology changes, in order to prevent improper block or reduce improper permit actions. To effectively track these changes, the SIM should promptly collect and consolidate SAV-related information from various SAV information sources.</t>
      <t>When it comes to SAV-related information obtained from Manual Configurations, the SAV Agent can directly receive the configurations from network operators and the SIM can promptly generate the corresponding SAV rules.</t>
      <t>Regarding Routing Information, the mechanism can rely on the convergence mechanism of routing protocols such as BGP. However, it is important to note that there may be instances of inaccurate validation before the route convergence process is fully completed. This challenge is also observed in existing uRPF-based mechanisms. Although temporary inconsistencies in forwarding paths during the convergence process may occur, it may be acceptable as the real forwarding paths of prefixes can fluctuate during this time.</t>
      <t>For SAV-tailored information, it is essential for the SAV-tailored Protocol Speaker to proactively send SAV-tailored Messages and adapt to route changes promptly. However, there are challenges that need to be addressed. First, during the routing convergence process, real forwarding paths can undergo rapid changes within a short period. Relying solely on temporary SAV-tailored information during this time may lead to incorrect block decisions. Additionally, similar to routing protocols, there is a possibility of inaccurate validation during the convergence process of the SAV-tailored protocol due to delays in SAV-tailored Messages. These delays can occur due to factors like packet loss, unpredictable network latencies, or message processing latencies.</t>
      <t>To prevent improper block, it is crucial for the SAV-tailored protocol to handle these challenges carefully. One approach is to generate SAV rules automatically based on the available Routing Information until the convergence process of the routing changes and the SAV-tailored protocol is finalized. This ensures that the SAV-tailored protocol adapts to the changing network conditions and avoids making improper blocking decisions during the convergence phase. Furthermore, a dedicated protocol like the SAV-tailored protocol has the capability to control the synchronization timing of SAV-tailored information between ASes.</t>
    </section>
    <section anchor="management-considerations">
      <name>Management Considerations</name>
      <t>It is crucial to consider the operations and management aspects of various SAV information sources, the SAV-tailored protocol, SIB, SIM, and SAV table in the inter-domain SAVNET architecture. The following guidelines should be followed for their effective management:</t>
      <t>First, management interoperability should be supported across devices from different vendors or different releases of the same product, based on a unified data model such as YANG. This is essential because the Internet comprises devices from various vendors and different product releases that coexist simultaneously.</t>
      <t>Second, scalable operation and management methods such as NETCONF <xref target="RFC6241"/> and syslog protocol <xref target="RFC5424"/> should be supported. This is important as an AS may have hundreds or thousands of border routers that require efficient operation and management.</t>
      <t>Third, management operations, including default initial configuration, alarm and exception reporting, logging, performance monitoring and reporting for the control plane and data plane, as well as debugging, should be designed and implemented in the protocols or protocol extensions. These operations can be performed either locally or remotely, based on the operational requirements.</t>
      <t>By adhering to these rules, the management of SAV information sources and related components can be effectively carried out, ensuring interoperability, scalability, and efficient operations and management of the inter-domain SAVNET architecture.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>In the inter-domain SAVNET architecture, the SAV-tailored Protocol Speaker plays a crucial role in generating and disseminating SAV-tailored Messages across different ASes. To safeguard against the potential risks posed by a malicious AS generating incorrect or forged SAV-tailored Messages, it is important for the SAV-tailored Protocol Speakers to employ security authentication measures for each received SAV-tailored Message. The security threats faced by inter-domain SAVNET can be categorized into two aspects: session security and content security. Session security pertains to verifying the identities of both parties involved in a session and ensuring the integrity of the session content. Content security, on the other hand, focuses on verifying the authenticity and reliability of the session content, thereby enabling the identification of forged SAV-tailored Messages.</t>
      <t>The threats to session security include:</t>
      <ul spacing="normal">
        <li>Session identity impersonation: This occurs when a malicious router deceitfully poses as a legitimate peer router to establish a session with the targeted router. By impersonating another router, the malicious entity can gain unauthorized access and potentially manipulate or disrupt the communication between the legitimate routers.</li>
        <li>Session integrity destruction: In this scenario, a malicious intermediate router situated between two peering routers intentionally tampers with or destroys the content of the relayed SAV-tailored Message. By interfering with the integrity of the session content, the attacker can disrupt the reliable transmission of information, potentially leading to miscommunication or inaccurate SAV-related data being propagated.</li>
      </ul>
      <t>The threats to content security include:</t>
      <ul spacing="normal">
        <li>Message alteration: A malicious router has the ability to manipulate or forge any portion of a SAV-tailored Message. For example, the attacker may employ techniques such as using a spoofed Autonomous System Number (ASN) or modifying the AS Path information within the message. By tampering with the content, the attacker can potentially introduce inaccuracies or deceive the receiving ASes, compromising the integrity and reliability of the SAV-related information.</li>
        <li>Message injection: A malicious router injects a seemingly "legitimate" SAV-tailored Message into the communication stream and directs it to the corresponding next-hop AS. This type of attack can be likened to a replay attack, where the attacker attempts to retransmit previously captured or fabricated messages to manipulate the behavior or decisions of the receiving ASes. The injected message may contain malicious instructions or false information, leading to incorrect SAV rule generation or improper validation.</li>
        <li>Path deviation: A malicious router intentionally diverts a SAV-tailored Message to an incorrect next-hop AS, contrary to the expected path defined by the AS Path. By deviating from the intended routing path, the attacker can disrupt the proper dissemination of SAV-related information and introduce inconsistencies or conflicts in the validation process. This can undermine the effectiveness and accuracy of source address validation within the inter-domain SAVNET architecture.</li>
      </ul>
      <t>Overall, inter-domain SAVNET shares similar security threats with BGP and can leverage existing BGP security mechanisms to enhance both session and content security. Session security can be enhanced by employing session authentication mechanisms used in BGP, such as MD5, TCP-AO, or Keychain. Similarly, content security can benefit from the deployment of existing BGP security mechanisms like RPKI, BGPsec, and ASPA. While these mechanisms can address content security threats, their widespread deployment is crucial. Until then, it is necessary to develop an independent security mechanism specifically designed for inter-domain SAVNET. One potential approach is for each origin AS to calculate a digital signature for each AS path and include these digital signatures within the SAV-tailored Messages. Upon receiving a SAV-tailored Message, the SAV-tailored Protocol Speaker can verify the digital signature to ascertain the message's authenticity. Detailed security designs and considerations will be addressed in a separate draft, ensuring the robust security of inter-domain SAVNET.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>This document should not affect the privacy of the Internet.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Igor Lubashev<br/>
  Akamai Technologies<br/>
  145 Broadway<br/>
  Cambridge, MA, 02142<br/>
  United States of America<br/>
  Email: ilubashe@akamai.com</t>
      <t>Many thanks to Igor Lubashev for the significantly helpful revision suggestions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network.  As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment.  There are cases when this may create problems, e.g., with multihoming.  This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular.  This memo updates RFC 2827.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram">
              <organization/>
            </author>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery">
              <organization/>
            </author>
            <author fullname="J. Haas" initials="J." surname="Haas">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC8955">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl">
              <organization/>
            </author>
            <author fullname="S. Hares" initials="S." surname="Hares">
              <organization/>
            </author>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk">
              <organization/>
            </author>
            <author fullname="D. McPherson" initials="D." surname="McPherson">
              <organization/>
            </author>
            <author fullname="M. Bacher" initials="M." surname="Bacher">
              <organization/>
            </author>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix. </t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI.  Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t> This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder">
              <organization/>
            </author>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman">
              <organization/>
            </author>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC5424">
          <front>
            <title>The Syslog Protocol</title>
            <author fullname="R. Gerhards" initials="R." surname="Gerhards">
              <organization/>
            </author>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document describes the syslog protocol, which is used to convey event notification messages.  This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages.  It also provides a message format that allows vendor-specific extensions to be provided in a structured way.</t>
              <t>This document has been written with the original design goals for traditional syslog in mind.  The need for a new layered specification has arisen because standardization efforts for reliable and secure syslog extensions suffer from the lack of a Standards-Track and transport-independent RFC.  Without this document, each other standard needs to define its own syslog packet format and transport mechanism, which over time will introduce subtle compatibility issues.  This document tries to provide a foundation that syslog extensions can build on.  This layered architecture approach also provides a solid basis that allows code to be written once for each syslog feature rather than once for each transport.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5424"/>
          <seriesInfo name="DOI" value="10.17487/RFC5424"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="sav-table" target="https://datatracker.ietf.org/doc/draft-huang-savnet-sav-table/">
          <front>
            <title>Source Address Validation Table Abstraction and Application</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="inter-domain-ps" target="https://datatracker.ietf.org/doc/draft-wu-savnet-inter-domain-problem-statement/">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="RFC5635">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari">
              <organization/>
            </author>
            <author fullname="D. McPherson" initials="D." surname="McPherson">
              <organization/>
            </author>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well.  This  memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Alvaro Retana, Kotikalapudi Sriram, Rüdiger Volk, Xueyan Song, Ben Maddison, Jared Mauch, Joel Halpern, Aijun Wang, Jeffrey Haas, Fang Gao, Mingxing Liu, Zhen Tan, etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
