<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wu-savnet-inter-domain-architecture-04" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="Inter-domain SAVNET Architecture">Inter-domain Source Address Validation (SAVNET) Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-04"/>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2023" month="September" day="30"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 74?>

<t>This document introduces an inter-domain SAVNET architecture, providing a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to establish SAV rules by sharing SAV-specific Information between themselves. During the incremental or partial deployment of SAV-specific Information, it can rely on general information, such as routing information from the RIB, to construct the SAV table when SAV-specific Information for an AS's prefixes is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. It also defines the architectural components and their relations.</t>
    </abstract>
  </front>
  <middle>
    <?line 78?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Attacks based on source IP address spoofing, such as reflective DDoS and flooding attacks, continue to present significant challenges to Internet security. Mitigating these attacks in inter-domain networks requires effective source address validation (SAV). While BCP84 <xref target="RFC3704"/> <xref target="RFC8704"/> offers some SAV solutions, such as ACL-based ingress filtering and uRPF-based mechanisms, existing inter-domain SAV mechanisms have limitations in terms of validation accuracy and operational overhead in different scenarios <xref target="inter-domain-ps"/>.</t>
      <t>To address these issues, the inter-domain SAVNET architecture focuses on providing a comprehensive framework and guidelines for the design and implementation of new inter-domain SAV mechanisms. By proposing the SAV-specific Information which consists of prefixes of ASes and their corresponding legitimate incoming interfaces and is specialized for generating SAV rules, the inter-domain SAVNET architecture empowers ASes to generate accurate SAV rules. Meanwhile, a SAV-specific communication mechanism is used to define the data structure or format for communicating the SAV-specific Information, and the operations and timing for origination, processing, propagation, and termination of the messages which carry the SAV-specific Information, to achieve the delivery and automatic update of SAV-specific Information. Moreover, during the incremental/partial deployment period of the SAV-specific Information, the inter-domain SAVNET architecture can leverage the general information, such as the routing information from the RIB or the {prefix, maximum length, origin AS} information from the RPKI ROA Objects and the {AS, AS's Provider} information from the RPKI ASPA Objects, to generate the SAV rules when the SAV-specific Information is not available. To achieve this, the inter-domain SAVNET architecture assigns priorities to the SAV-specific Information and general information and generates the SAV rules based on priorities of the information in the SAV Information Base, and the SAV-specific Information has higher priority compared to the general information.</t>
      <t>In addition, by defining the architectural components, relationships, and the SAV-specific Information and general information used in inter-domain SAV deployments, this document aims to promote consistency, interoperability, and collaboration among ASes. This document primarily describes a high-level architecture for consolidating SAV-specific Information and general information and deploying an inter-domain SAV mechanism between ASes. The document does not specify protocol extensions or implementations. Its purpose is to provide a conceptual framework and guidance for the development of inter-domain SAV mechanisms, allowing implementers to adapt and implement the architecture based on their specific requirements and network environments.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV Rule:</dt>
        <dd>
          <t>The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        </dd>
        <dt>SAV Table:</dt>
        <dd>
          <t>The table or data structure that implements the SAV rules and is used for source address validation in the data plane.</t>
        </dd>
        <dt>SAV-specific Information:</dt>
        <dd>
          <t>The information consists of the source prefixes and their legitimate incoming interfaces to enter an AS.</t>
        </dd>
        <dt>SAV-related Information:</dt>
        <dd>
          <t>The information is used to be consolidated to generate SAV rules and can be from SAV-specific Information or general information.</t>
        </dd>
        <dt>False Positive:</dt>
        <dd>
          <t>The validation results that the packets with legitimate source addresses are considered invalid improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>False Negative:</dt>
        <dd>
          <t>The validation results that the packets with spoofed source addresses are considered valid improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>SAV Information Base:</dt>
        <dd>
          <t>A table or data structure for storing SAV-related information collected from SAV-specific Information and general information.</t>
        </dd>
      </dl>
    </section>
    <section anchor="design-goals">
      <name>Design Goals</name>
      <t>The inter-domain SAVNET architecture aims to improve SAV accuracy, facilitate partial deployment with low operational overhead, and develop a communication approach to communicate SAV-specific Information between ASes, while achieving efficient convergence and providing security guarantees to communicated information, which correspond to the requirements for new inter-domain SAV mechanisms <xref target="inter-domain-ps"/>. The overall goal can be broken down into the following aspects:</t>
      <ul spacing="normal">
        <li>
          <t>First, the inter-domain SAVNET architecture should learn the real paths of source prefixes to any destination prefixes or permissible paths that can cover their real paths, and generate accurate SAV rules automatically based on the learned information to avoid false positives and reduce false negatives as much as possible.</t>
        </li>
        <li>
          <t>Second, the inter-domain SAVNET architecture should provide sufficient protection for the source prefixes of ASes that deploy it, even if only a portion of the Internet implements the architecture.</t>
        </li>
        <li>
          <t>Third, the inter-domain SAVNET architecture should adapt to dynamic networks and asymmetric routing scenarios automatically.</t>
        </li>
        <li>
          <t>Fourth, the inter-domain SAVNET architecture should communicate SAV-specific Information between ASes automatically with a communication approach.</t>
        </li>
        <li>
          <t>Fifth, the inter-domain SAVNET architecture should promptly detect the network changes and launch the convergence process quickly, while reducing false positives and false negatives during the convergence process.</t>
        </li>
        <li>
          <t>Last, the inter-domain SAVNET architecture should provide security guarantees for the communicated SAV-specific Information.</t>
        </li>
      </ul>
      <t>Other design goals, such as low operational overhead and easy implementation, are also very important and should be considered in specific protocols or protocol extensions.</t>
    </section>
    <section anchor="inter-domain-savnet-architecture">
      <name>Inter-domain SAVNET Architecture</name>
      <figure anchor="arch">
        <name>The inter-domain SAVNET architecture</name>
        <artwork><![CDATA[
+-------------------------------------------------------+
|                       Other ASes                      |
+-------------------------------------------------------+
                                         | SAV-specific
                                         | Messages
+-------------------------------------------------------+                                       
|                                        |           AS |
|                                       \/              |
| +~~~~~~~~~~~~~~~~~~~~~+  +--------------------------+ |
| | General Information |  | SAV-specific Information | |
| +~~~~~~~~~~~~~~~~~~~~~+  +--------------------------+ |
|            |                           |              |
|           \/                          \/              |
| +---------------------------------------------------+ |
| | +-----------------------------------------------+ | |
| | |              SAV Information Base             | | |
| | +-----------------------------------------------+ | |
| |            SAV Information Base Manager           | |
| +---------------------------------------------------+ |
|                          |SAV Rules                   |
|                         \/                            |
|  +------------------------------------------------+   |
|  |                    SAV Table                   |   |
|  +------------------------------------------------+   |
+-------------------------------------------------------+
]]></artwork>
      </figure>
      <t><xref target="arch"/> shows the overview of the inter-domain SAVNET architecture. The inter-domain SAVNET architecture collects SAV-specific Information from the SAV-specific Messages of other ASes. The SAV-specific Information consists of the prefixes and their legitimate incoming interfaces to enter an AS. As a result, the SAV-specific Information can be used to generate SAV rules and build an accurate SAV table on each AS directly. In order to exchange SAV-specific Information between ASes, a new SAV-specific communication mechanism should be developed to carry the SAV-specific Information. Compared against existing inter-domain SAV mechanisms which rely on the general information such as routing information from the RIB, the SAV-specific Information can generate more accurate SAV rules, the root cause is that the SAV-specific Information is specially designed and communicated for inter-domain SAV, while the general information is not.</t>
      <t>A SAV-specific communication mechanism should be developed to define the data structure or format for communicating the SAV-specific Information and the operations and timing for originating, processing, propagating, and terminating the messages which carry the information. Additionally, the SAV-specific Information will not be available for all ASes when the SAV-specific communication mechanism is on the incremental/partial deployment. Therefore, in the stage of incremental/partial deployment, the inter-domain SAVNET architecture can use the general information to generate SAV rules.</t>
      <t>The SAV Information Base (SIB) can store the information from the SAV-specific Information and general information and is maintained by the SAV Information Base Manager (SIM), and then the SIM generates SAV rules based on the SIB and fills out the SAV table in the dataplane. The SIB can be managed by network operators using various methods such as YANG, Command-Line Interface (CLI), remote triggered black hole (RTBH) <xref target="RFC5635"/>, and Flowspec <xref target="RFC8955"/>.</t>
      <t>Inter-domain SAVNET architecture does not prescribe any specific deployment models.</t>
      <section anchor="sib-sec">
        <name>SAV Information Base</name>
        <t>The SIB is managed by the SAV Information Base Manager, which can consolidate SAV-related information from different sources. The SAV information sources of SIB include SAV-specific Information and general information, which are illustrated below:</t>
        <ul spacing="normal">
          <li>
            <t>SAV-specific Information is the specifically collected information for SAV and exactly consists of the prefixes and their legitimate incoming interfaces to enter ASes.</t>
          </li>
          <li>
            <t>General information refers to the information that is not directly related to SAV but can be utilized to generate SAV rules, and includes routing information from the RIB or FIB, the {prefix, maximum length, origin AS} information from the RPKI ROA Objects, and the {AS, AS's Provider} information from the RPKI ASPA Objects.</t>
          </li>
        </ul>
        <t>In the future, if an information source is created but is not initially and specially used for SAV, the information can be categorized into general information. Therefore, the general information can be considered as the dual-use information.</t>
        <figure anchor="sav_src">
          <name>Priority ranking for the SAV information sources</name>
          <artwork><![CDATA[
+---------------------------------------------------+----------+
|              SAV Information Sources              |Priorities|
+---------------------------------------------------+----------+
|              SAV-specific Information             |     1    |
+---------------------+-----------------------------+----------+
|                     | RPKI ROA Obj. and ASPA Obj. |     2    |
|                     +-----------------------------+----------+
| General Information |             RIB             |     3    |
|                     +-----------------------------+----------+
|                     |             FIB             |     4    |
+---------------------+-----------------------------+----------+
]]></artwork>
        </figure>
        <t><xref target="sav_src"/> presents a priority ranking for the SAV-specific Information and general information. SAV-specific Information has higher priority (i.e., 1) than the general information (i.e., 2), since the inter-domain SAVNET architecture uses the SAV-specific Information to carry more accurate information which comprises ASes' prefixes and their legitimate incoming interfaces. Therefore, once the SAV-specific Information for a prefix is available within the SIB, the inter-domain SAVNET generates SAV rules based on the information from the SAV-specific Information; otherwise, the inter-domain SAVNET generates SAV rules based on the general information. In other words, the inter-domain SAVNET architecture assigns priorities to the information from different SAV information sources, and always generates the SAV rules using the information with the highest priority.</t>
        <figure anchor="as-topo">
          <name>An example of AS topology</name>
          <artwork><![CDATA[
                           +------------------+
                           |     AS 3(P3)     |
                           +-+/\------+/\+----+
                              /          \
                             /            \ 
                            /              \
                     Itf.1 / (C2P)          \
                 +------------------+        \
                 |     AS 4(P4)     |         \
                 ++/\+---+/\+---+/\++          \
             Itf.2 /      | Itf.3  \ Itf.4      \
   P6[AS 1, AS 2] /       |         \            \
        P2[AS 2] /        |          \            \
                / (C2P)   |           \            \
+----------------+        |            \            \    
|    AS 2(P2)    |        | P1[AS 1]    \ P5[AS 5]   \ P5[AS 5]
+----------+/\+--+        | P6[AS 1]     \            \
             \            | NO_EXPORT     \            \
     P6[AS 1] \           |                \            \
      P1[AS 1] \          |                 \            \
      NO_EXPORT \ (C2P)   | (C2P)      (C2P) \      (C2P) \
              +----------------+           +----------------+
              |  AS 1(P1, P6)  |           |    AS 5(P5)    |
              +----------------+           +----------------+
]]></artwork>
        </figure>
        <figure anchor="sib">
          <name>An example for the SAV information base in AS 4</name>
          <artwork><![CDATA[
+-----+------+------------------+---------+------------------------+
|Index|Prefix|AS-level Interface|Direction| SAV Information Source |
+-----+------+------------------+---------+------------------------+
|  0  |  P3  |      Itf.1       |Provider |  General Information   | 
+-----+------+------------------+---------+------------------------+
|  1  |  P2  |      Itf.2       |Customer |  General Information   |
+-----+------+------------------+---------+------------------------+
|  2  |  P1  |      Itf.2       |Customer |SAV-specific Information|
+-----+------+------------------+---------+------------------------+
|  3  |  P1  |      Itf.3       |Customer |  General Information   |
+-----+------+------------------+---------+------------------------+
|  4  |  P6  |      Itf.2       |Customer |  General Information   |
+-----+------+------------------+---------+------------------------+
|  5  |  P6  |      Itf.3       |Customer |SAV-specific Information|
|     |      |                  |         |  General Information   |
+-----+------+------------------+---------+------------------------+
|  6  |  P5  |      Itf.4       |Customer |  General Information   |
+-----+------+------------------+---------+------------------------+
|  7  |  P5  |      Itf.1       |Provider |  General Information   |
+-----+------+------------------+---------+------------------------+
]]></artwork>
        </figure>
        <t>We use the examples shown in <xref target="as-topo"/> and <xref target="sib"/> to introduce SIB and illustrate how to generate SAV rules based on the SIB. <xref target="as-topo"/> shows an example of AS topology and <xref target="sib"/> depicts an example of the SIB established in AS 4. As shown in <xref target="as-topo"/>, AS 4 has four AS-level interfaces, each connected to a different AS. Specifically, Itf.1 is connected to AS 3, Itf.2 to AS 2, Itf.3 to AS 1, and Itf.4 to AS 5. The arrows in the figure represent the commercial relationships between ASes. AS 3 is the provider of AS 4 and AS 5, while AS 4 is the provider of AS 1, AS 2, and AS 5, and AS 2 is the provider of AS 1. Assuming prefixes P1, P2, P3, P4, P5, and P6 are all the prefixes in the network.</t>
        <t>Each row of the SIB contains an index, prefix, AS-level incoming interface for the prefix, incoming direction, and the corresponding sources of these information. The incoming direction consists of customer, provider, and peer. For example, in <xref target="sib"/>, the row with index 0 indicates prefix P3's valid incoming interface is Itf.1, the ingress direction of P3 is AS 4's provider AS (AS 3), and these information is from the RIB. Note that the same SAV-related information may have multiple sources and the SIB records them all.</t>
        <t>Recall that the inter-domain SAVNET architecture generates SAV rules based on the SAV-related information in the SIB and their priorities. In addition, in the case of an AS's provider/peer interfaces where loose SAV rules are applicable, the inter-domain SAVNET architecture recommends to use blocklist at such interfaces to only block the prefixes that are sure not to come at these interfaces, while in the case of an AS's customer interfaces that necessitate stricter SAV rules, the inter-domain SAVNET architecture recommends to use allowlist to only permit the prefixes that are allowed to come at these interfaces.</t>
        <t>Based on the above rules, take the SIB in <xref target="sib"/> as an example to illustrate how the inter-domain SAVNET architecture generates the SAV table to perform SAV in the data plane. AS 4 can conduct SAV at its interfaces as follows: SAV at the interface Itf.1 blocks P1, P2, and P6 according to the rows with indexes 0, 1, 2, and 5 in the SIB, SAV at the interface Itf.2 permits P1 and P2 according to the rows with indexes 1 and 2 in the SIB, SAV at the interface Itf.3 permits P6 according to the row with index 5 in the SIB, and SAV at the interface Itf.4 permits P5 according to the row with index 6 in the SIB.</t>
      </section>
      <section anchor="sav-specific-information">
        <name>SAV-specific Information</name>
        <figure anchor="sav_msg">
          <name>Exchanging SAV-specific Information with SAV-specific Messages between ASes</name>
          <artwork><![CDATA[
+----------------------+              +----------------------+
|          AS          | SAV-specific |          AS          |
| +-----------------+  |  Messages    |  +-----------------+ |
| |  SAV-specific   |<-|--------------|->|   SAV-specific  | |
| |Message Processor|  |              |  |Message Processor| |
| +-----------------+  |              |  +-----------------+ |
+----------------------+              +----------------------+
]]></artwork>
        </figure>
        <t>The SAV-specific Information is the information consisting of source prefixes and their legitimate incoming interfaces entering an AS, and the legitimate incoming interfaces are the interfaces where the packets whose source addresses are encompassed in the source prefixes come. Therefore, the SAV-specific Information can be expressed as &lt;Prefix, Interface&gt; pairs. It is noted that the same prefix may have different legitimate incoming interfaces for an AS, since the dataplane packets with the source addresses encompassed in the source prefixes may have different destination addresses.</t>
        <t>The SAV-specific Information can be exchanged between ASes by the SAV-specific messages. As shown in <xref target="sav_msg"/>, the SAV-specific messages are used to propagate or originate the SAV-specific Information between ASes by the SAV-specific message processor. Within an AS, the SAV-specific message processor can obtain the next hop of the corresponding prefixes based on the local RIB and use SAV-specific messages to carry its own prefixes and/or the prefixes received from other ASes to the next hops for the corresponding destinations. When a SAV-specific processor receives the SAV-specific messages, it parses them to obtain the carried source prefixes, as well as the corresponding legitimate incoming interfaces by checking the interfaces which the SAV-specific messages arrive at. The SAV-specific message processor also checks the destination addresses of the SAV-specific messages, if the destination address of the SAV-specific message is itself, it will terminate the message, otherwise, it will forward it based on the local RIB. Following this, the SAV-specific messages can propagate the SAV-specific Information between ASes.</t>
        <t>Moreover, if SAV-specific messages are used to exchange SAV-specific Information between ASes, a new SAV-specific communication mechanism would need to be developed to communicate the SAV-specific messages. The SAV-specific communication mechanism need to define the data structure or format to communicate the SAV-specific messages and the operations and timing for originating, processing, propagating, and terminating the messages. If an extension to an existing protocol is used to exchange SAV-specific Information, the corresponding existing protocol should not be affected. The SAV-specific message processor is the entity to support the SAV-specific communication mechanism. By parsing the SAV-specific messages, it obtains the ASN, the prefixes, the AS-level interfaces to receive the messages, and their incoming AS direction for maintaining the SIB. It is important to note that the SAV-specific message processor within an AS has the capability to establish connections with multiple SAV-specific message processors within different ASes, relying on either manual configurations by operators or an automatic mechanism.</t>
        <t>The need for a SAV-specific communication mechanism arises from the facts that the SAV-specific Information needs to be obtained and communicated between ASes. Different from the general information such as routing information from the RIB, there are no existing mechanisms which can support the perception and communication of SAV-specific Information between ASes. Hence, a SAV-specific communication mechanism is needed to provide a medium and set of rules to establish communication between different ASes for the exchange of SAV-specific Information.</t>
        <t>Additionally, the preferred AS paths of an AS may change over time due to route changes or network failures. The SAV-specific message processor should launch SAV-specific messages to adapt to the route changes in a timely manner.  The SAV-specific communication mechanism should handle route changes carefully to avoid false positives. The reasons for leading to false positives may include late detection of route changes, delayed message transmission, or packet losses. However, the detailed design of the SAV-specific communication mechanism for dealing with route changes is outside the scope of this document.</t>
      </section>
      <section anchor="sav-information-base-manager">
        <name>SAV Information Base Manager</name>
        <t>SAV Information Base Manager (SIM) consolidates SAV-related information from the SAV-specific Information and general information to initiate or update the SIB, while it generates SAV rules to populate the SAV table in the dataplane according to the SIB. The detailed collection methods of the SAV-related information depend on the deployment and implementation of the inter-domain SAV mechanisms and are out of scope for this document.</t>
        <t>Using the SIB, SIM produces &lt;Prefix, Interface&gt; pairs to populate the SAV table, which represents the prefix and its legitimate incoming interface. It is worth noting that the interfaces in the SIB are logical AS-level interfaces and need to be mapped to the physical interfaces of the AS border routers.</t>
      </section>
      <section anchor="management-channel-and-information-channel">
        <name>Management Channel and Information Channel</name>
        <figure anchor="sav_agent_config">
          <name>The management channel and information channel for collecting SAV-related information from different SAV information sources</name>
          <artwork><![CDATA[
+------+
|      |   Management Channel    +--------------------------------+ 
|      |<========================|        Network Operators       |
|      |                         +--------------------------------+
|      |
|      |   Information Channel   +--------------------------------+
|      |<------------------------| SAV-specific Message Processor |
|      |                         +--------------------------------+
| SIM  |
|      |   Information Channel   +--------------------------------+
|      |<------------------------|   RPKI ROA Obj. and ASPA Obj.  |
|      |                         +--------------------------------+
|      |
|      |   Information Channel   +--------------------------------+
|      |<------------------------|               RIB              |
|      |                         +--------------------------------+
+------+
]]></artwork>
        </figure>
        <t>The SAV-specific Information relies on the communication between SAV-specific message processors within ASes and the general information may be from multiple sources, such as the RIB and RPKI ROA objects and ASPA objects. Therefore, as illustrated in <xref target="sav_agent_config"/>, the SIM needs to receive the SAV-related information from these SAV information sources. We abstract the connections used to collect the SAV-related information from the sources as Information Channel. Also, the network operators can operate the SIB by manual configurations, such as YANG, CLI, RTBH <xref target="RFC5635"/>, and Flowspec <xref target="RFC8955"/>, where the approaches to implement these are abstracted as Management Channel.</t>
        <t>The primary purpose of the management channel is to deliver manual configurations of network operators. Examples of such information include, but are not limited to:</t>
        <ul spacing="normal">
          <li>
            <t>SAV configurations using YANG, CLI, RTBH, or Flowspec.</t>
          </li>
          <li>
            <t>SAVNET operation and management.</t>
          </li>
          <li>
            <t>Inter-domain SAVNET provisioning.</t>
          </li>
        </ul>
        <t>Note that the information can be delivered at any time and requires reliable delivery for the management channel implementation.</t>
        <t>The information channel serves as a means to transmit the SAV-specific Information and general information from various sources including the RIB and RPKI ROA objects and RPKI ASPA Objects. Additionally, it can carry telemetry information, such as metrics pertaining to forwarding performance, the count of spoofing packets and discarded packets, provided that the inter-domain SAVNET has access to such data. The information channel can include information regarding the prefixes associated with the spoofing traffic, as observed until the most recent time.</t>
      </section>
    </section>
    <section anchor="partialincremental-deployment">
      <name>Partial/Incremental Deployment</name>
      <t>The inter-domain SAVNET architecture <bcp14>MUST</bcp14> ensure support for partial/incremental deployment as it is not feasible to deploy it simultaneously in all ASes. The partial/incremental deployment of the inter-domain SAVNET architecture consists of different aspects, which include the partial/incremental deployment of the architecture and the partial/incremental deployment of the information sources.</t>
      <t>Within the architecture, the general information like the prefixes and topological information from RPKI ROA Objects and ASPA Objects and the routing information from the RIB can be obtained locally when the corresponding sources are available. Even when both SAV-specific Information and the information from RPKI ROA Objects and ASPA Objects are not available, the routing information from the RIB can be used to generate SAV rules.</t>
      <t>Furthermore, it is not mandatory for all ASes to deploy SAV-specific message processors for SAV-specific Information. Instead, a SAV-specific message processor should be able to effortlessly establish a logical neighboring relationship with another AS that has deployed a SAV-specific message processor. The connections for communicating SAV-specific Information can be achieved by manual configurations set by operators or an automatic neighbor discovery mechanism. This flexibility enables the architecture to accommodate varying degrees of deployment, promoting interoperability and collaboration among participating ASes. During the partial/incremental deployment of SAV-specific message processor, the SAV-specific Information for the ASes which do not deploy SAV-specific message processor can not be obtained. To protect the prefixes of these ASes, inter-domain SAVNET architecture can use the SAV-related information from the general information in the SIB to generate SAV rules. At least, the routing information from the RIB can be always available in the SIB.</t>
      <t>As more ASes adopt the inter-domain SAVNET architecture, the "deployed area" expands, thereby increasing the collective defense capability against source address spoofing. Furthermore, if multiple "deployed areas" can be logically interconnected across "non-deployed areas", these interconnected "deployed areas" can form a logical alliance, providing enhanced protection against address spoofing. Especially, along with more ASes deploy SAV-specific message processor and support the communication of SAV-specific Information, the generated SAV rules of the inter-domain SAVNET architecture to protect these ASes will become more accurate, as well as enhancing the protection capability against source address spoofing for the inter-domain SAVNET architecture.</t>
      <t>In addition, releasing the SAV functions of the inter-domain SAVNET architecture incrementally is one potential way to reduce the deployment risks and can be considered in its deployment by network operators:</t>
      <ul spacing="normal">
        <li>
          <t>First, the inter-domain SAVNET can only do the measurement in the data plane and do not take any other actions. Based on the measurement data, the operators can evaluate the effect of the inter-domain SAVNET on the legitimate traffic, including validation accuracy and forwarding performance, as well as the operational overhead.</t>
        </li>
        <li>
          <t>Second, the inter-domain SAVNET can open the function to limit the rate of the traffic that is justified as spoofing traffic. The operators can further evaluate the effect of the inter-domain SAVNET on the legitimate traffic and spoofing traffic, such as limiting the rate of all the spoofing traffic without hurting the legitimate traffic.</t>
        </li>
        <li>
          <t>Third, when the validation accuracy, forwarding performance, and operational overhead have been verified on a large scale by the live network, the inter-domain SAVNET can open the function to directly block the spoofing traffic that is justified by the SAV table in the data plane.</t>
        </li>
      </ul>
    </section>
    <section anchor="convergence-considerations">
      <name>Convergence Considerations</name>
      <t>Convergence issues <bcp14>SHOULD</bcp14> be carefully considered in inter-domain SAV mechanisms due to the dynamic nature of the Internet. Internet routes undergo continuous changes, and SAV rules <bcp14>MUST</bcp14> proactively adapt to these changes, such as prefix and topology changes, in order to prevent false positives and reduce false negatives. To effectively track these changes, the SIM should promptly collect SAV-related information from various SAV information sources and consolidate them in a timely manner.</t>
      <t>In particular, it is essential for the SAV-specific message processors to proactively communicate the changes of the SAV-specific Information between ASes and adapt to route changes promptly. However, during the routing convergence process, the traffic paths of the source prefixes can undergo rapid changes within a short period. The changes of the SAV-specific Information may not be communicated in time between ASes to update SAV rules, false positives or false negatives may happen. Such inaccurate validation is caused by the delays in communicating SAV-specific Information between ASes, which occur due to the factors like packet losses, unpredictable network latencies, or message processing latencies. The design of the SAV-specific communication mechanism should consider these issues to reduce the inaccurate validation.</t>
      <t>Besides, for the inter-domain SAVNET architecture, the potential ways to deal with the inaccurate validation issues during the convergence of the SAV-specific communication mechanism is to consider using the information from RPKI ROA Objects and ASPA objects to generate SAV rules until the convergence process of the SAV-specific communication mechanism is finished, since these information is more stable and can help avoid false positives, and thus avoiding the impact to the legitimate traffic.</t>
    </section>
    <section anchor="management-considerations">
      <name>Management Considerations</name>
      <t>It is crucial to consider the operations and management aspects of SAV information sources, the SAV-specific communication mechanism, SIB, SIM, and SAV table in the inter-domain SAVNET architecture. The following guidelines should be followed for their effective management:</t>
      <t>First, management interoperability should be supported across devices from different vendors or different releases of the same product, based on a unified data model such as YANG <xref target="RFC6020"/>. This is essential because the Internet comprises devices from various vendors and different product releases that coexist simultaneously.</t>
      <t>Second, scalable operation and management methods such as NETCONF <xref target="RFC6241"/> and syslog protocol <xref target="RFC5424"/> should be supported. This is important as an AS may have hundreds or thousands of border routers that require efficient operation and management.</t>
      <t>Third, management operations, including default initial configuration, alarm and exception reporting, logging, performance monitoring and reporting for the control plane and data plane, as well as debugging, should be designed and implemented in the protocols or protocol extensions. These operations can be performed either locally or remotely, based on the operational requirements.</t>
      <t>By adhering to these rules, the management of SAV information sources and related components can be effectively carried out, ensuring interoperability, scalability, and efficient operations and management of the inter-domain SAVNET architecture.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>In the inter-domain SAVNET architecture, the SAV-specific message processor plays a crucial role in generating and disseminating SAV-specific Messages across different ASes. To safeguard against the potential risks posed by a malicious AS generating incorrect or forged SAV-specific Messages, it is important for the SAV-specific message processors to employ security authentication measures for each received SAV-specific Message. The majour security threats faced by inter-domain SAVNET can be categorized into two aspects: session security and content security. Session security pertains to verifying the identities of both parties involved in a session and ensuring the integrity of the session content. Content security, on the other hand, focuses on verifying the authenticity and reliability of the session content, thereby enabling the identification of forged SAV-specific Messages.</t>
      <t>The threats to session security include:</t>
      <ul spacing="normal">
        <li>
          <t>Session identity impersonation: This occurs when a malicious router deceitfully poses as a legitimate peer router to establish a session with the targeted router. By impersonating another router, the malicious entity can gain unauthorized access and potentially manipulate or disrupt the communication between the legitimate routers.</t>
        </li>
        <li>
          <t>Session integrity destruction: In this scenario, a malicious intermediate router situated between two peering routers intentionally tampers with or destroys the content of the relayed SAV-specific Message. By interfering with the integrity of the session content, the attacker can disrupt the reliable transmission of information, potentially leading to miscommunication or inaccurate SAV-related data being propagated.</t>
        </li>
      </ul>
      <t>The threats to content security include:</t>
      <ul spacing="normal">
        <li>
          <t>Message alteration: A malicious router has the ability to manipulate or forge any portion of a SAV-specific Message. For example, the attacker may employ techniques such as using a spoofed Autonomous System Number (ASN) or modifying the AS Path information within the message. By tampering with the content, the attacker can potentially introduce inaccuracies or deceive the receiving ASes, compromising the integrity and reliability of the SAV-related information.</t>
        </li>
        <li>
          <t>Message injection: A malicious router injects a seemingly "legitimate" SAV-specific Message into the communication stream and directs it to the corresponding next-hop AS. This type of attack can be likened to a replay attack, where the attacker attempts to retransmit previously captured or fabricated messages to manipulate the behavior or decisions of the receiving ASes. The injected message may contain malicious instructions or false information, leading to incorrect SAV rule generation or improper validation.</t>
        </li>
        <li>
          <t>Path deviation: A malicious router intentionally diverts a SAV-specific Message to an incorrect next-hop AS, contrary to the expected path defined by the AS Path. By deviating from the intended routing path, the attacker can disrupt the proper dissemination of SAV-related information and introduce inconsistencies or conflicts in the validation process. This can undermine the effectiveness and accuracy of source address validation within the inter-domain SAVNET architecture.</t>
        </li>
      </ul>
      <t>Overall, inter-domain SAVNET shares similar security threats with BGP and can leverage existing BGP security mechanisms to enhance both session and content security. Session security can be enhanced by employing session authentication mechanisms used in BGP, such as MD5, TCP-AO, or Keychain. Similarly, content security can benefit from the deployment of existing BGP security mechanisms like RPKI, BGPsec, and ASPA. While these mechanisms can address content security threats, their widespread deployment is crucial. Until then, it is necessary to develop an independent security mechanism specifically designed for inter-domain SAVNET. One potential approach is for each origin AS to calculate a digital signature for each AS path and include these digital signatures within the SAV-specific Messages. Upon receiving a SAV-specific Message, the SAV-specific message processor can verify the digital signature to ascertain the message's authenticity. Furthermore, it is worth noting that the information channel of the inter-domain SAVNET architecture may need to operate over a network link that is currently under a source address spoofing attack. As a result, it may experience severe packet loss and high latency due to the ongoing attack, and the implementation of the information channel should ensure uninterrupted communication. Detailed security designs and considerations will be addressed in a separate draft, ensuring the robust security of inter-domain SAVNET.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
    <section anchor="scope">
      <name>Scope</name>
      <t>In this architecture, the choice of protocols used for communication between the SIM and different SAV information sources is not limited. The inter-domain SAVNET architecture presents considerations on how to consolidate SAV-related information from various sources to generate SAV rules and perform SAV using the SAV table in the dataplane. The detailed design and implementation for SAV rule generation and SAV execution depend on the specific inter-domain SAV mechanisms employed.</t>
      <t>This document does not cover administrative or business agreements that may be established between the involved inter-domain SAVNET parties. These considerations are beyond the scope of this document. However, it is assumed that authentication and authorization mechanisms can be implemented to ensure that only authorized ASes can communicate SAV-related information.</t>
    </section>
    <section anchor="assumptions">
      <name>Assumptions</name>
      <t>This document makes the following assumptions:</t>
      <ul spacing="normal">
        <li>
          <t>All ASes where the inter-domain SAVNET is deployed are assumed to provide the necessary connectivity between SAV-specific message processor and any intermediate network elements. However, the architecture does not impose any specific limitations on the form or nature of this connectivity.</t>
        </li>
        <li>
          <t>Congestion and resource exhaustion can occur at various points in the inter-domain networks. Hence, in general, network conditions should be assumed to be hostile. The inter-domain SAVNET architecture must be capable of functioning reliably under all circumstances, including scenarios where the paths for delivering SAV-related information are severely impaired. It is crucial to design the inter-domain SAVNET system with a high level of resilience, particularly under extremely hostile network conditions. The architecture should ensure uninterrupted communication between inter-domain SAV-specific message processors, even when data-plane traffic saturates the link.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture does not impose rigid requirements for the SAV information sources that can be used to generate SAV rules. Similarly, it does not dictate strict rules on how to utilize the SAV-related information from diverse sources or perform SAV in the dataplane. Network operators have the flexibility to choose their approaches to generate SAV rules and perform SAV based on their specific requirements and preferences. Operators can either follow the recommendations outlined in the inter-domain SAVNET architecture or manually specify the rules for governing the use of SAV-related information, the generation of SAV rules, and the execution of SAV in the dataplane.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture does not impose restrictions on the selection of the local AS with which AS to communicate SAV-specific Information. The ASes have the flexibility to establish connections for SAV-specific communication based on the manual configurations set by operators or other automatic mechanisms.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture provides the flexibility to accommodate Quality-of-Service (QoS) policy agreements between SAVNET-enabled ASes or local QoS prioritization measures, but it does not make assumptions about their presence. These agreements or prioritization efforts are aimed at ensuring the reliable delivery of SAV-specific Information between SAV-specific message processors. It is important to note that QoS is considered as an operational consideration rather than a functional component of the inter-domain SAVNET architecture.</t>
        </li>
        <li>
          <t>The information and management channels are loosely coupled and are used for collecting SAV-related information from different sources, and how the inter-domain SAVNET synchronize the management and operation configurations is out of scope of this document.</t>
        </li>
      </ul>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Igor Lubashev<br/>
  Akamai Technologies<br/>
  145 Broadway<br/>
  Cambridge, MA, 02142<br/>
  United States of America<br/>
  Email: ilubashe@akamai.com</t>
      <t>Many thanks to Igor Lubashev for the significantly helpful revision suggestions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC5424">
          <front>
            <title>The Syslog Protocol</title>
            <author fullname="R. Gerhards" initials="R." surname="Gerhards"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way.</t>
              <t>This document has been written with the original design goals for traditional syslog in mind. The need for a new layered specification has arisen because standardization efforts for reliable and secure syslog extensions suffer from the lack of a Standards-Track and transport-independent RFC. Without this document, each other standard needs to define its own syslog packet format and transport mechanism, which over time will introduce subtle compatibility issues. This document tries to provide a foundation that syslog extensions can build on. This layered architecture approach also provides a solid basis that allows code to be written once for each syslog feature rather than once for each transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5424"/>
          <seriesInfo name="DOI" value="10.17487/RFC5424"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="inter-domain-ps" target="https://datatracker.ietf.org/doc/draft-ietf-savnet-inter-domain-problem-statement/">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="RFC5635">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC8955">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
      </references>
    </references>
    <?line 445?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Alvaro Retana, Kotikalapudi Sriram, Rüdiger Volk, Xueyan Song, Ben Maddison, Jared Mauch, Joel Halpern, Aijun Wang, Jeffrey Haas, Xiangqing Chang, Changwang Lin, Mingxing Liu, Zhen Tan, etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
