<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wu-savnet-inter-domain-architecture-05" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="Inter-domain SAVNET Architecture">Inter-domain Source Address Validation (SAVNET) Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-05"/>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 91?>

<t>This document introduces an inter-domain SAVNET architecture, providing a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to establish SAV rules by sharing SAV-specific Information between themselves. During the incremental or partial deployment of SAV-specific Information, it can rely on general information, such as routing information from the RIB, to construct the SAV table when SAV-specific Information for an AS's prefixes is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. It also defines the architectural components and their relations.</t>
    </abstract>
  </front>
  <middle>
    <?line 95?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Attacks based on source IP address spoofing, such as reflective DDoS and flooding attacks, continue to present significant challenges to Internet security. Mitigating these attacks in inter-domain networks requires effective source address validation (SAV). While BCP84 <xref target="RFC3704"/> <xref target="RFC8704"/> offers some SAV solutions, such as ACL-based ingress filtering and uRPF-based mechanisms, existing inter-domain SAV mechanisms have limitations in terms of validation accuracy and operational overhead in different scenarios <xref target="inter-domain-ps"/>.</t>
      <t>To address these issues, the inter-domain SAVNET architecture focuses on providing a comprehensive framework and guidelines for the design and implementation of new inter-domain SAV mechanisms. By proposing the SAV-specific Information which consists of prefixes of ASes and their corresponding legitimate incoming interfaces and is specialized for generating SAV rules, the inter-domain SAVNET architecture empowers ASes to generate accurate SAV rules. Meanwhile, a SAV-specific communication mechanism is used to define the data structure or format for communicating the SAV-specific Information, and the operations and timing for origination, processing, propagation, and termination of the messages which carry the SAV-specific Information, to achieve the delivery and automatic update of SAV-specific Information. Moreover, during the incremental/partial deployment period of the SAV-specific Information, the inter-domain SAVNET architecture can leverage the general information, such as the routing information from the RIB or the {prefix, maximum length, origin AS} information from the RPKI ROA Objects and the {AS, AS's Provider} information from the RPKI ASPA Objects, to generate the SAV rules when the SAV-specific Information is not available. To achieve this, the inter-domain SAVNET architecture assigns priorities to the SAV-specific Information and general information and generates the SAV rules based on priorities of the information in the SAV Information Base, and the SAV-specific Information has higher priority compared to the general information.</t>
      <t>In addition, by defining the architectural components, relationships, and the SAV-specific Information and general information used in inter-domain SAV deployments, this document aims to promote consistency, interoperability, and collaboration among ASes. This document primarily describes a high-level architecture for consolidating SAV-specific Information and general information and deploying an inter-domain SAV mechanism between ASes. The document does not specify protocol extensions or implementations. Its purpose is to provide a conceptual framework and guidance for the development of inter-domain SAV mechanisms, allowing implementers to adapt and implement the architecture based on their specific requirements and network environments.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV Rule:</dt>
        <dd>
          <t>The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        </dd>
        <dt>SAV Table:</dt>
        <dd>
          <t>The table or data structure that implements the SAV rules and is used for source address validation on the data plane.</t>
        </dd>
        <dt>Local Routing Information:</dt>
        <dd>
          <t>The information is stored in ASBR's local RIB or FIB and can be used to generate SAV rules in addition to the routing purpose.</t>
        </dd>
        <dt>SAV-specific Information:</dt>
        <dd>
          <t>The information is specialized for SAV rule generation, includes the source prefixes and their legitimate incoming interfaces to enter an AS, and is communicated between ASes.</t>
        </dd>
        <dt>General Information:</dt>
        <dd>
          <t>The information is not specialized for SAV but can be utilized to generate SAV rules, and is initially utilized for other purposes. For example, the local routing information is one kind of general information.</t>
        </dd>
        <dt>SAV-related Information:</dt>
        <dd>
          <t>The information is used to be consolidated to generate SAV rules and can be from SAV-specific Information or general information.</t>
        </dd>
        <dt>SAV-specific Communication Mechanism:</dt>
        <dd>
          <t>The mechanism is used to communicate SAV-specific information between ASes, and it can be a new protocol or an extension to an existing protocol.</t>
        </dd>
        <dt>SAV Information Base:</dt>
        <dd>
          <t>A table or data structure for storing SAV-related information collected from SAV-specific Information and general information.</t>
        </dd>
        <dt>False Positive:</dt>
        <dd>
          <t>The validation results that the packets with legitimate source addresses are considered invalid improperly due to inaccurate SAV rules. False positive may induce improper block problems if routers block the "invalid" packets.</t>
        </dd>
        <dt>False Negative:</dt>
        <dd>
          <t>The validation results that the packets with spoofed source addresses are considered valid improperly due to inaccurate SAV rules. False negative may induce improper permit problems if routers accept the "valid" packets.</t>
        </dd>
      </dl>
    </section>
    <section anchor="goal-sec">
      <name>Design Goals</name>
      <t>The inter-domain SAVNET architecture aims to improve SAV accuracy, facilitate partial deployment with low operational overhead, and develop a communication approach to communicate SAV-specific Information between ASes, while achieving efficient convergence and providing security guarantees to communicated information, which correspond to the requirements for new inter-domain SAV mechanisms <xref target="inter-domain-ps"/>. The overall goal can be broken down into the following aspects:</t>
      <ul spacing="normal">
        <li>
          <t>G1: The inter-domain SAVNET architecture should learn the real paths of source prefixes to any destination prefixes or permissible paths that can cover their real paths, and generate accurate SAV rules automatically based on the learned information to avoid false positives and reduce false negatives as much as possible.</t>
        </li>
        <li>
          <t>G2: The inter-domain SAVNET architecture should provide sufficient protection for the source prefixes of ASes that deploy it, even if only a portion of the Internet implements the architecture.</t>
        </li>
        <li>
          <t>G3: The inter-domain SAVNET architecture should adapt to dynamic networks and asymmetric routing scenarios automatically.</t>
        </li>
        <li>
          <t>G4: The inter-domain SAVNET architecture should communicate SAV-specific Information between ASes automatically with a communication approach.</t>
        </li>
        <li>
          <t>G5: The inter-domain SAVNET architecture should promptly detect the network changes and launch the convergence process quickly, while reducing false positives and false negatives during the convergence process.</t>
        </li>
        <li>
          <t>G6: The inter-domain SAVNET architecture should provide security guarantees for the communicated SAV-specific Information.</t>
        </li>
      </ul>
      <t>Other design goals, such as low operational overhead and easy implementation, are also very important and should be considered in specific protocols or protocol extensions.</t>
    </section>
    <section anchor="inter-domain-savnet-architecture-overview">
      <name>Inter-domain SAVNET Architecture Overview</name>
      <figure anchor="arch">
        <name>The inter-domain SAVNET architecture</name>
        <artwork><![CDATA[
+-----------------------------------------------------------+
|                          Other ASes                       |
+-----------------------------------------------------------+
                                           | SAV-specific
                                           | Messages
+-----------------------------------------------------------+
|                                          |                |
| +-------------------------------------------------------+ |                                      
| |                        SAV Agent       |              | |
| |                                       \/              | |
| | +---------------------+  +--------------------------+ | |
| | | General Information |  | SAV-specific Information | | |
| | +---------------------+  +--------------------------+ | |
| |            |                           |              | |
| |           \/                          \/              | |
| | +---------------------------------------------------+ | |
| | | +-----------------------------------------------+ | | |
| | | |              SAV Information Base             | | | |
| | | +-----------------------------------------------+ | | |
| | |            SAV Information Base Manager           | | |
| | +---------------------------------------------------+ | |
| |                          |SAV Rules                   | |
| +-------------------------------------------------------+ |
|                            |                              |
|                           \/                              |
| +-------------------------------------------------------+ |
| |                      SAV Table                        | |
| +-------------------------------------------------------+ |
+-----------------------------------------------------------+
]]></artwork>
      </figure>
      <t>The inter-domain SAVNET architecture depicted in <xref target="arch"/> collects SAV-specific information from the SAV-specific messages of other ASes. The SAV-specific information consists of the prefixes and their legitimate incoming interfaces of the ASes. As a result, the SAV-specific information can be used to generate SAV rules and build an accurate SAV table on each AS directly (G1). When the SAV-specific information is not available due to incremental/partial deployment, the inter-domain SAVNET architecture can also leverage the general information such as the routing information from the RIB to generate SAV rules (G2).</t>
      <t>The inter-domain SAVNET architecture prioritizes the SAV-specific information and general information. When both SAV-specific information and general information are available, it guides to adopt the SAV-specific information to generate SAV rules. The SAV-specific information can help generate more accurate SAV rules, the rationale is that the SAV-specific information is designed specifically for inter-domain SAV to carry the prefixes and their legitimate incoming interfaces (G1).</t>
      <t>The SAV Agent should launch SAV-specific messages to adapt to the route changes in a timely manner (G3). The SAV-specific communication mechanism should handle route changes carefully to avoid false positives. The reasons for leading to false positives may include late detection of route changes, delayed message transmission, or packet losses. During the convergence process of the SAV-specific communication mechanism, the inter-domain SAVNET architecture can use the information from RPKI ROA Objects and ASPA objects to generate SAV rules until the convergence process is finished, since these information is more stable and can help avoid false positives, and thus avoiding the impact to the legitimate traffic (G5). However, the detailed design of the SAV-specific communication mechanism for dealing with route changes is outside the scope of this document.</t>
      <t>A new SAV-specific information communication mechanism is required to exchange SAV-specific information between ASes. It should define the data structure or format for communicating the SAV-specific information and the operations and timing for originating, processing, propagating, and terminating the messages which carry the information (G4).</t>
      <t>Besides, regarding the security concerns, the inter-domain SAVNET architecture shares similar security threats with BGP and can leverage existing BGP security mechanisms to enhance both session and content security (G6).</t>
      <t>Moreover, the SAV Information Base (SIB) can store SAV-specific and general information and is maintained by the SAV Information Base Manager (SIM). The SIM generates SAV rules based on the SIB and fills out the SAV table in the data plane. The SIB can be managed by network operators using various methods such as YANG, Command-Line Interface (CLI), remote triggered black hole (RTBH), and Flowspec. The detailed collection methods of the SAV-related information depend on the deployment and implementation of the inter-domain SAV mechanisms and are out of scope for this document.</t>
      <t>It is worth noting that the interfaces in the SIB are logical AS-level interfaces and need to be mapped to the physical interfaces of the AS border routers.</t>
    </section>
    <section anchor="sib-sec">
      <name>SAV Information Base</name>
      <t>The SIB is managed by the SAV Information Base Manager, which can consolidate SAV-related information from different sources. The SAV information sources of SIB include SAV-specific Information and general information, which are illustrated below:</t>
      <ul spacing="normal">
        <li>
          <t>SAV-specific Information is the specifically collected information for SAV and exactly consists of the prefixes and their legitimate incoming interfaces to enter ASes.</t>
        </li>
        <li>
          <t>General information refers to the information that is not directly related to SAV but can be utilized to generate SAV rules, and includes routing information from the RIB or FIB, the {prefix, maximum length, origin AS} information from the RPKI ROA Objects, and the {AS, AS's Provider} information from the RPKI ASPA Objects.</t>
        </li>
      </ul>
      <t>In the future, if an information source is created but is not initially and specially used for SAV, the information can be categorized into general information. Therefore, the general information can be considered as the dual-use information.</t>
      <figure anchor="sav_src">
        <name>Priority ranking for the SAV information sources.</name>
        <artwork><![CDATA[
+---------------------------------------------------+----------+
|              SAV Information Sources              |Priorities|
+---------------------------------------------------+----------+
|              SAV-specific Information             |     1    |
+---------------------+-----------------------------+----------+
|                     | RPKI ROA Obj. and ASPA Obj. |     2    |
|                     +-----------------------------+----------+
| General Information |             RIB             |     3    |
|                     +-----------------------------+----------+
|                     |             FIB             |     4    |
+---------------------+-----------------------------+----------+
Priority ranking from 1 to 4 represents high to low priority.
]]></artwork>
      </figure>
      <t><xref target="sav_src"/> presents the priority ranking for the SAV-specific Information and general information. Priority ranking from 1 to 4 represents high to low priority. Inter-domain SAVNET architecture should use the SAV information based on the priorities. Once the SAV-specific Information for a prefix is available within the SIB, the inter-domain SAVNET generates SAV rules based on the information from the SAV-specific Information; otherwise, the inter-domain SAVNET generates SAV rules based on the general information. In other words, the inter-domain SAVNET architecture assigns priorities to the information from different SAV information sources, and always generates the SAV rules using the information with the highest priority, as long as the information is available.</t>
      <t>The priority ranking recommendation for different SAV information sources in <xref target="sav_src"/> is based on the accuracy of SAV rules generated based on the information from the different sources. That is avoiding improper blocks and minimizing improper permits. SAV-specific Information has higher priority than the general information, since the SAV-specific Information is specifically designed to carry more accurate SAV information which comprises ASes' prefixes and their legitimate incoming interfaces to an AS. The general information from RPKI ROA Objects and ASPA Objects, RIB, and FIB has different priorities, ranking 2, 3, and 4, respectively. The information from RPKI ROA Object and ASPA Object has higher priority than the one from RIB and FIB, this is because RPKI ROA Object and ASPA Object can provide authoritative prefixes and topology information, which can be used to generate more accurate SAV rules. The information from RPKI ROA Object and ASPA Object is more stable and can be used to reduce the risk of improper blocks during the convergence process of the network. Although the fundamental information source for RIB and FIB is the same, the RIB consists of more back path information than the FIB, which can reduce improper blocks.</t>
      <figure anchor="as-topo">
        <name>An example of AS topology</name>
        <artwork><![CDATA[
                           +------------------+
                           |     AS 3(P3)     |
                           +-+/\------+/\+----+
                              /          \
                             /            \ 
                            /              \
                     Itf.1 / (C2P)          \
                 +------------------+        \
                 |     AS 4(P4)     |         \
                 ++/\+---+/\+---+/\++          \
             Itf.2 /      | Itf.3  \ Itf.4      \
   P6[AS 1, AS 2] /       |         \            \
        P2[AS 2] /        |          \            \
                / (C2P)   |           \            \
+----------------+        |            \            \    
|    AS 2(P2)    |        | P1[AS 1]    \ P5[AS 5]   \ P5[AS 5]
+----------+/\+--+        | P6[AS 1]     \            \
             \            | NO_EXPORT     \            \
     P6[AS 1] \           |                \            \
      P1[AS 1] \          |                 \            \
      NO_EXPORT \ (C2P)   | (C2P)      (C2P) \      (C2P) \
              +----------------+           +----------------+
              |  AS 1(P1, P6)  |           |    AS 5(P5)    |
              +----------------+           +----------------+
Both AS 1 and AS 4 deploy the inter-domain SAVNET architecture 
and can exchange the SAV-specific information with each other, 
while other ASes do not deploy it.
]]></artwork>
      </figure>
      <figure anchor="sib">
        <name>An example for the SAV information base in AS 4</name>
        <artwork><![CDATA[
+-----+------+------------------+---------+------------------------+
|Index|Prefix|AS-level Interface|Direction| SAV Information Source |
+-----+------+------------------+---------+------------------------+
|  0  |  P1  |      Itf.2       |Customer |SAV-specific Information| 
+-----+------+------------------+---------+------------------------+
|  1  |  P1  |      Itf.3       |Customer |  General Information   |
+-----+------+------------------+---------+------------------------+
|  2  |  P2  |      Itf.2       |Customer |  General Information   |
+-----+------+------------------+---------+------------------------+
|  3  |  P3  |      Itf.1       |Provider |  General Information   |
+-----+------+------------------+---------+------------------------+
|  4  |  P5  |      Itf.1       |Provider |  General Information   |
+-----+------+------------------+---------+------------------------+
|  5  |  P5  |      Itf.4       |Customer |  General Information   |
+-----+------+------------------+---------+------------------------+
|  6  |  P6  |      Itf.2       |Customer |  General Information   |
|     |      |                  |         |SAV-specific Information|
+-----+------+------------------+---------+------------------------+
|  7  |  P6  |      Itf.3       |Customer |  General Information   |
+-----+------+------------------+---------+------------------------+
]]></artwork>
      </figure>
      <t>We use the examples shown in <xref target="as-topo"/> and <xref target="sib"/> to introduce SIB and illustrate how to generate SAV rules based on the SIB. <xref target="as-topo"/> shows an example of AS topology and <xref target="sib"/> depicts an example of the SIB established in AS 4. As shown in <xref target="as-topo"/>, AS 4 has four AS-level interfaces, each connected to a different AS. Specifically, Itf.1 is connected to AS 3, Itf.2 to AS 2, Itf.3 to AS 1, and Itf.4 to AS 5. The arrows in the figure represent the commercial relationships between ASes. AS 3 is the provider of AS 4 and AS 5, while AS 4 is the provider of AS 1, AS 2, and AS 5, and AS 2 is the provider of AS 1. Assuming prefixes P1, P2, P3, P4, P5, and P6 are all the prefixes in the network.</t>
      <t>Each row of the SIB contains an index, prefix, AS-level incoming interface for the prefix, incoming direction, and the corresponding sources of this information. The incoming direction consists of customer, provider, and peer. For example, in <xref target="sib"/>, the row with index 0 indicates prefix P1's valid incoming interface is Itf.2, the ingress direction of P1 is AS 4's customer AS (AS 2), and this information is from the RIB. Note that the same SAV-related information may have multiple sources and the SIB records them all, such as the row indexed 6 in <xref target="sib"/>. Moreover, the SIB should be carefully implemented in the specific protocol or protocol extensions to avoid becoming a heavy burden of the router, and the similar optimization approaches used for the RIB may be applied.</t>
      <t>Recall that the inter-domain SAVNET architecture generates SAV rules based on the SAV-related information in the SIB and their priorities. In addition, in the case of an AS's provider/peer interfaces where loose SAV rules are applicable, the inter-domain SAVNET architecture recommends to use blocklist at such interfaces to only block the prefixes that are sure not to come at these interfaces, while in the case of an AS's customer interfaces that necessitate stricter SAV rules, the inter-domain SAVNET architecture recommends to use allowlist to only permit the prefixes that are allowed to come at these interfaces.</t>
      <t>Based on the above rules, take the SIB in <xref target="sib"/> as an example to illustrate how the inter-domain SAVNET architecture generates the SAV table to perform SAV in the data plane. AS 4 can conduct SAV at its interfaces as follows: SAV at the interface Itf.1 blocks P1, P2, and P6 according to the rows indexed 0, 2, and 6 in the SIB, SAV at the interface Itf.2 permits P1, P2, and P6 according to the rows indexed 0, 2, and 6 in the SIB, SAV at the interface Itf.3 does not permit any prefixes according to the row indexed 0, 1, 6, and 7 in the SIB, and SAV at the interface Itf.4 permits P5 according to the row indexed 6 in the SIB.</t>
    </section>
    <section anchor="savnet-communication-channel">
      <name>SAVNET Communication Channel</name>
      <figure anchor="sav_agent_config">
        <name>The management channel and information channel for collecting SAV-related information from different SAV information sources</name>
        <artwork><![CDATA[
+------+
|      |  SAV-specific Information Channel  +-----------------------------+ 
|      |<===================================|      SAV Agent in AS 2      |
|      |                                    +-----------------------------+
|      |
|      |     General Information Channel    +-----------------------------+
|      |<-----------------------------------| RPKI ROA Obj. and ASPA Obj. |
|      |                                    +-----------------------------+
| SAV  |
|Agent |     General Information Channel    +-----------------------------+
|  in  |<-----------------------------------|             RIB             |
| AS 1 |                                    +-----------------------------+
|      |
|      |     General Information Channel    +-----------------------------+
|      |<-----------------------------------|             FIB             |
|      |                                    +-----------------------------+
|      |
|      |        Management Channel          +-----------------------------+
|      |<-----------------------------------|      Network Operators      |
|      |                                    +-----------------------------+
+------+
]]></artwork>
      </figure>
      <t>The SAV-specific Information relies on the communication between SAV Agents within ASes and the general information can be from multiple sources, such as RPKI ROA objects and ASPA objects, RIB, and FIB. Therefore, as illustrated in <xref target="sav_agent_config"/>, the SAV Agent needs to receive the SAV-related information from these SAV information sources. Besides, the SAV Agent also needs to accept the configurations from network operators for the management operations. The connections for collecting these types of information are abstracted as SAVNET communication channel, which includes SAV-specific information channel, general information channel, and management channel.</t>
      <section anchor="sav-specific-information-channel">
        <name>SAV-specific Information Channel</name>
        <figure anchor="sav_msg">
          <name>An example for Exchanging SAV-specific Information with SAV-specific Messages between AS1 and AS 2</name>
          <artwork><![CDATA[
+----------------------+                          +----------------------+
|      AS 1 (P1)       |   SAV-specific Messages  |       AS 2 (P2)      |
| +-----------------+  |       (P1, Itf.2)  Itf.2 |  +-----------------+ |
| |       SAV       |--|--------------------------|->|       SAV       | |
| |      Agent      |<-|--------------------------|--|      Agent      | |
| +-----------------+  | Itf.1 (P2, Itf.1)        |  +-----------------+ |
+----------------------+   SAV-specific Messages  +----------------------+
]]></artwork>
        </figure>
        <t>The SAV-specific information channel is the abstraction of the connections between ASes for communicating SAV-specific information. Each AS pair which deploys inter-domain SAVNET architecture has a SAV-specific information channel between. An AS can have multiple SAV-specific information channels with others. Within the SAV-specific information channel, the SAV-specific message is used to carry the SAV-specific information.</t>
        <t><xref target="sav_msg"/> uses an example for exchanging SAV-specific information with SAV-specific messages between AS1 and AS 2. The SAV-specific Information is the information consisting of source prefixes and their legitimate incoming interfaces entering an AS, and the legitimate incoming interfaces are the interfaces where the packets whose source addresses are encompassed in the source prefixes come. Therefore, the SAV-specific Information can be expressed as &lt;Prefix, Interface&gt; pairs, e.g., (P1, Itf.2) and (P2, Itf.1) in <xref target="sav_msg"/>. It is noted that the same prefix may have different legitimate incoming interfaces for an AS, since the dataplane packets with the source addresses encompassed in the source prefixes may have different destination addresses.</t>
        <t>The SAV-specific Information can be exchanged between ASes by the SAV-specific messages. As shown in <xref target="sav_msg"/>, the SAV-specific messages are used to propagate or originate the SAV-specific Information between ASes by the SAV Agent. For an AS which initiates its own SAV-specific messages, the SAV Agent within the AS can obtain the next hop of the corresponding prefixes based on the local RIB and use SAV-specific messages to carry the AS's prefixes to the next hops for the corresponding destinations. This is achieved by setting the SAV-specific messages' destination addresses as the destination addresses in the local RIB. When the SAV Agents of other ASes receive the SAV-specific messages, they parse the messages to obtain the carried source prefixes, as well as the corresponding legitimate incoming interfaces by checking the interfaces which the SAV-specific messages arrive at. Meanwhile, the SAV Agents also check the destination addresses of the SAV-specific messages, if their destination addresses are ASes themselves, they will terminate the message; otherwise, they will forward them based on the local RIB. Following this, the SAV-specific messages can propagate the SAV-specific Information between ASes.</t>
        <t>Moreover, if SAV-specific messages are used to exchange SAV-specific Information between ASes, a new SAV-specific communication mechanism would need to be developed to communicate the SAV-specific messages. The SAV-specific communication mechanism needs to define the data structure or format to communicate the SAV-specific messages and the operations and timing for originating, processing, propagating, and terminating the messages. If an extension to an existing protocol is used to exchange SAV-specific Information, the corresponding existing protocol should not be affected. The SAV Agent is the entity to support the SAV-specific communication mechanism. By parsing the SAV-specific messages, it obtains the ASN, the prefixes, the AS-level interfaces to receive the messages, and their incoming AS direction for maintaining the SIB. It is important to note that the SAV Agent within an AS has the capability to establish connections with multiple SAV Agents within different ASes, relying on either manual configurations by operators or an automatic mechanism.</t>
        <t>The need for a SAV-specific communication mechanism arises from the facts that the SAV-specific Information needs to be obtained and communicated between ASes. Different from the general information such as routing information from the RIB, there are no existing mechanisms which can support the perception and communication of SAV-specific Information between ASes. Hence, a SAV-specific communication mechanism is needed to provide a medium and set of rules to establish communication between different ASes for the exchange of SAV-specific Information.</t>
        <t>Furthermore, an AS which initiates an SAV-specific message needs to assemble its source prefixes into the SAV-specific messages. In order to obtain all the source prefixes of an AS, the inter-domain SAVNET architecture can communicate with the intra-domain SAVNET architecture <xref target="intra-domain-arch"/> to obtain all the prefixes belonging to the AS.</t>
        <t>Additionally, the preferred AS paths of an AS may change over time due to route changes or network failures. The SAV Agent should launch SAV-specific messages to adapt to the route changes in a timely manner.  The SAV-specific communication mechanism should handle route changes carefully to avoid false positives. The reasons for leading to false positives may include late detection of route changes, delayed message transmission, or packet losses. However, the detailed design of the SAV-specific communication mechanism for dealing with route changes is outside the scope of this document.</t>
      </section>
      <section anchor="general-information-channel">
        <name>General Information Channel</name>
        <t>The general information channel is the abstraction of the connections between ASes for communicating routing information or the connections between AS and RPKI cache servers for obtaining {prefix, maximum length, origin AS} and {AS, AS's Provider} information. The communication of the general information within the general information channel can rely on existing protocols, such as BGP and RTR <xref target="RFC8210"/>.</t>
      </section>
      <section anchor="management-channel">
        <name>Management Channel</name>
        <t>The management channel is the abstraction of the connections between SAV Agent and network operators. The primary purpose of the management channel is to deliver manual configurations of network operators. Examples of the management configurations include, but are not limited to:</t>
        <ul spacing="normal">
          <li>
            <t>SAV configurations using YANG, CLI, RTBH, or Flowspec.</t>
          </li>
          <li>
            <t>SAVNET operation and management.</t>
          </li>
          <li>
            <t>Inter-domain SAVNET provisioning.</t>
          </li>
        </ul>
        <t>Note that the configuration information can be delivered at any time and requires reliable delivery for the management channel implementation. Additionally, the management channel can carry telemetry information, such as metrics pertaining to forwarding performance, the count of spoofing packets and discarded packets, provided that the inter-domain SAVNET has access to such data. It can include information regarding the prefixes associated with the spoofing traffic, as observed until the most recent time.</t>
      </section>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>This section utilizes the sample use cases to showcase that the inter-domain SAVNET architecture can improve the validation accuracy in the scenarios of limited propagation of prefixes, hidden prefixes, reflection attacks, and direct attacks, compared to existing SAV mechanisms, which are also utilized for the gap analysis of existing inter-domain SAV mechanisms in <xref target="inter-domain-ps"/>. In the following, these use cases are discussed for SAV at customer interfaces and SAV at provider/peer interfaces, respectively.</t>
      <section anchor="sav-at-customer-interfaces">
        <name>SAV at Customer Interfaces</name>
        <t>In order to prevent the source address spoofing, operators can enable ACL-based ingress filtering, source-based RTBH filtering, and/or uRPF-based mechanisms at customer interfaces, namely Strict uRPF, FP-uRPF, VRF uRPF, or EFP-uRPF <xref target="manrs"/> <xref target="nist"/>. However, as analyzed in <xref target="inter-domain-ps"/>, uRPF-based mechanisms may lead to false positives in two inter-domain scenarios: limited propagation of prefixes and hidden prefixes, or may lead to false negatives in the scenarios of source address spoofing attacks within a customer cone, while ACL-based ingress filtering and source-based RTBH filtering need to update SAV rules in a timely manner and lead to high operational overhead. The following showcases that the inter-domain SAVNET architecture can avoid false positives and false negatives in these scenarios.</t>
        <section anchor="limited-propagation-of-prefixes">
          <name>Limited Propagation of Prefixes</name>
          <figure anchor="no-export">
            <name>Limited propagation of prefixes caused by NO_EXPORT.</name>
            <artwork><![CDATA[
                          +----------------+
                          |    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P)       \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
                   /     |      \           \
         P2[AS 2] /      |       \           \
                 /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
             \           | NO_EXPORT   \           \
     P1[AS 1] \          |              \           \
     NO_EXPORT \         |               \           \
                \ (C2P)  | (C2P/P2P)(C2P) \     (C2P) \
              +----------------+        +----------------+
              |  AS 1(P1, P6)  |        |    AS 5(P5)    |
              +----------------+        +----------------+
]]></artwork>
          </figure>
          <t><xref target="no-export"/> presents a scenario where the limited propagation of prefixes occurs due to the NO_EXPORT community attribute. In this scenario, AS 1 is a customer of AS 2, AS 2 is a customer of AS 4, AS 4 is a customer of AS 3, and AS 5 is a customer of both AS 3 and AS 4. The relationship between AS 1 and AS 4 can be either customer-to-provider (C2P) or peer-to-peer (P2P). AS 1 advertises prefixes P1 to AS 2 and adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 2, preventing AS 2 from further propagating the route for prefix P1 to AS 4. Similarly, AS 1 adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 4, resulting in AS 4 not propagating the route for prefix P6 to AS 3. Consequently, AS 4 only learns the route for prefix P1 from AS 1 in this scenario. Suppose AS 1 and AS 4 have deployed inter-domain SAV while other ASes have not, and AS 4 has deployed EFP-uRPF at its customer interfaces.</t>
          <t>In this scenario, existing uRPF-based SAV mechanisms would block the traffic with P1 as source addresses improperly, and thus suffer from the problem of false positives <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P1 as source addresses can arrive at the interfaces facing AS 1 and AS 2. As a result, the false positive problem can be avoided.</t>
        </section>
        <section anchor="hidden-prefixes">
          <name>Hidden Prefixes</name>
          <figure anchor="dsr">
            <name>A Direct Server Return (DSR) scenario.</name>
            <artwork><![CDATA[
                                +----------------+
                Anycast Server+-+    AS 3(P3)    |
                                +-+/\----+/\+----+
                                   /       \
                         P3[AS 3] /         \ P3[AS 3]
                                 /           \
                                / (C2P)       \
                       +----------------+      \
                       |    AS 4(P4)    |       \
                       ++/\+--+/\+--+/\++        \
          P6[AS 1, AS 2] /     |      \           \
               P2[AS 2] /      |       \           \
                       /       |        \           \
                      / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
      +----------------+       |          \           \    
User+-+    AS 2(P2)    |       | P1[AS 1]  \           \
      +----------+/\+--+       | P6[AS 1]   \           \
          P6[AS 1] \           | NO_EXPORT   \           \
           P1[AS 1] \          |              \           \
           NO_EXPORT \         |               \           \
                      \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                    +----------------+        +----------------+
       Edge Server+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                    +----------------+        +----------------+
P3 is the anycast prefix and is only advertised by AS 3 through BGP.
]]></artwork>
          </figure>
          <t><xref target="dsr"/> illustrates a direct server return (DSR) scenario where the anycast IP prefix P3 is only advertised by AS 3 through BGP. In this example, AS 3 is the provider of AS 4 and AS 5, AS 4 is the provider of AS 1, AS 2, and AS 5, and AS 2 is the provider of AS 1. AS 1 and AS 4 have deployed inter-domain SAV, while other ASes have not. When users in AS 2 send requests to the anycast destination IP, the forwarding path is AS 2-&gt;AS 4-&gt;AS 3. The anycast servers in AS 3 receive the requests and tunnel them to the edge servers in AS 1. Finally, the edge servers send the content to the users with source addresses in prefix P3. The reverse forwarding path is AS 1-&gt;AS 4-&gt;AS 2.</t>
          <t>In this scenario, existing uRPF-based mechanisms will improperly block the legitimate response packets from AS 1 at the customer interface of AS 4 facing AS 1 <xref target="inter-domain-ps"/>. In contrast, if the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P3 as source addresses can arrive at the interfaces facing AS 1 and AS 3. As a result, the legitimate response packets with P3 as source addresses from AS 1 can be allowed and the false positive problem can be avoided.</t>
        </section>
        <section anchor="reflection_attack_customer">
          <name>Reflection Attacks</name>
          <figure anchor="customer-reflection-attack">
            <name>A scenario of reflection attacks by source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                        +----------------+
                                        |    AS 3(P3)    |
                                        +-+/\----+/\+----+
                                           /       \
                                          /         \ 
                                         /           \
                                        / (C2P)       \
                               +----------------+      \
                               |    AS 4(P4)    |       \
                               ++/\+--+/\+--+/\++        \
                  P6[AS 1, AS 2] /     |      \           \
                       P2[AS 2] /      |       \           \
                               /       |        \           \
                              / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
              +----------------+       |          \           \    
Attacker(P1')-+    AS 2(P2)    |       | P1[AS 1]  \           \
              +----------+/\+--+       | P6[AS 1]   \           \
                  P6[AS 1] \           | NO_EXPORT   \           \
                   P1[AS 1] \          |              \           \
                   NO_EXPORT \         |               \           \
                              \ (C2P)  | (C2P)    (C2P) \     (C2P) \ 
                          +----------------+          +----------------+
                  Victim+-+  AS 1(P1, P6)  |  Server+-+    AS 5(P5)    |
                          +----------------+          +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="customer-reflection-attack"/> depicts the scenario of reflection attacks by source address spoofing within a customer cone. The reflection attack by source address spoofing takes place within AS 4's customer cone, where the attacker spoofs the victim's IP address (P1) and sends requests to servers' IP address (P5) that are designed to respond to such requests. As a result, the server sends overwhelming responses back to the victim, thereby exhausting its network resources. The arrows in <xref target="customer-reflection-attack"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>In this scenario, EFP-uRPF with algorithm A/B will improperly permit the spoofing attacks originating from AS 2 <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P1 as source addresses can only arrive at the interface facing AS 1. Therefore, at the interface of AS 4 facing AS 2, the spoofing traffic can be blocked.</t>
        </section>
        <section anchor="direct_attack_customer">
          <name>Direct Attacks</name>
          <figure anchor="customer-direct-attack">
            <name>A scenario of the direct attacks by source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                        +----------------+
                                        |    AS 3(P3)    |
                                        +-+/\----+/\+----+
                                           /       \
                                          /         \ 
                                         /           \
                                        / (C2P)       \
                               +----------------+      \
                               |    AS 4(P4)    |       \
                               ++/\+--+/\+--+/\++        \
                  P6[AS 1, AS 2] /     |      \           \
                       P2[AS 2] /      |       \           \
                               /       |        \           \
                              / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
              +----------------+       |          \           \    
Attacker(P5')-+    AS 2(P2)    |       | P1[AS 1]  \           \
              +----------+/\+--+       | P6[AS 1]   \           \
                  P6[AS 1] \           | NO_EXPORT   \           \
                   P1[AS 1] \          |              \           \
                   NO_EXPORT \         |               \           \
                              \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                            +----------------+        +----------------+
                    Victim+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                            +----------------+        +----------------+
P5' is the spoofed source prefix P5 by the attacker which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="customer-direct-attack"/> portrays a scenario of direct attacks by source address spoofing within a customer cone and is used to analyze the gaps of uRPF-based mechanisms below. The direct attack by source address spoofing takes place within AS 4's customer cone, where the attacker spoofs a source address (P5) and directly targets the victim's IP address (P1), overwhelming its network resources. The arrows in <xref target="customer-direct-attack"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>In this scenario, EFP-uRPF with algorithm A/B will improperly permit the spoofing attacks <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 5 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P5 as source addresses can arrive at the interface facing AS 3 and AS 5. Therefore, at the interface of AS 4 facing AS 2, the spoofing traffic can be blocked.</t>
        </section>
      </section>
      <section anchor="sav_at_p">
        <name>SAV at Provider/Peer Interfaces</name>
        <t>In order to prevent packets with spoofed source addresses from the provider/peer AS, ACL-based ingress filtering, Loose uRPF, and/or source-based RTBH filtering can be deployed <xref target="nist"/>. <xref target="inter-domain-ps"/> exposes the limitations of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF for SAV at provider/peer interfaces in scenarios of source address spoofing attacks from provider/peer AS. The source address spoofing attacks from provider/peer AS include reflection attacks from provider/peer AS and direct attacks from provider/peer AS. The following showcases that the inter-domain SAVNET architecture can avoid false negatives in these scenarios.</t>
        <section anchor="reflect_attack_p">
          <name>Reflection Attacks</name>
          <figure anchor="reflection-attack-p">
            <name>A scenario of reflection attacks by source address spoofing from provider/peer AS.</name>
            <artwork><![CDATA[
                                  +----------------+
                   Attacker(P1')+-+    AS 3(P3)    |
                                  +-+/\----+/\+----+
                                     /       \
                                    /         \ 
                                   /           \
                                  / (C2P/P2P)   \
                         +----------------+      \
                         |    AS 4(P4)    |       \
                         ++/\+--+/\+--+/\++        \
            P6[AS 1, AS 2] /     |      \           \
                 P2[AS 2] /      |       \           \
                         /       |        \           \
                        / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
        +----------------+       |          \           \    
Server+-+    AS 2(P2)    |       | P1[AS 1]  \           \
        +----------+/\+--+       | P6[AS 1]   \           \
            P6[AS 1] \           | NO_EXPORT   \           \
             P1[AS 1] \          |              \           \
             NO_EXPORT \         |               \           \
                        \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                      +----------------+        +----------------+
              Victim+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                      +----------------+        +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="reflection-attack-p"/> depicts the scenario of reflection attacks by source address spoofing from provider/peer AS. In this case, the attacker spoofs the victim's IP address (P1) and sends requests to servers' IP address (P2) that respond to such requests. The servers then send overwhelming responses back to the victim, exhausting its network resources. The arrows in <xref target="reflection-attack-p"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>Both ACL-based ingress filtering and source-based RTBH filtering will induce additional operational overhead, and Loose uRPF may improperly permit spoofed packets <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P1 as source addresses can arrive at the interface facing AS 1 and AS 2. Therefore, at the interface of AS 4 facing AS 3, the spoofing traffic can be blocked.</t>
        </section>
        <section anchor="direct_attack_p">
          <name>Direct Attacks</name>
          <figure anchor="direct-attack-p">
            <name>A scenario of direct attacks by source address spoofing from provider/peer AS.</name>
            <artwork><![CDATA[
                          +----------------+
           Attacker(P2')+-+    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P/P2P)   \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
    P6[AS 1, AS 2] /     |      \           \
         P2[AS 2] /      |       \           \
                 /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
    P6[AS 1] \           | NO_EXPORT   \           \
     P1[AS 1] \          |              \           \
     NO_EXPORT \         |               \           \
                \ (C2P)  | (C2P)    (C2P) \     (C2P) \
              +----------------+        +----------------+
      Victim+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
              +----------------+        +----------------+
P2' is the spoofed source prefix P2 by the attacker which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="direct-attack-p"/> showcases a scenario of direct attack by source address spoofing from provider/peer AS. In this case, the attacker spoofs another source address (P2) and directly targets the victim's IP address (P1), overwhelming its network resources. The arrows in <xref target="direct-attack-p"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>Also, in this scenario, Both ACL-based ingress filtering and source-based RTBH filtering will induce additional operational overhead, and Loose uRPF may improperly permit spoofed packets <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 2 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P2 as source addresses can only arrive at the interface facing AS 2. Therefore, at the interface of AS 4 facing AS 3, the spoofing traffic can be blocked.</t>
        </section>
      </section>
    </section>
    <section anchor="partialincremental-deployment-considerations">
      <name>Partial/Incremental Deployment Considerations</name>
      <t>The inter-domain SAVNET architecture <bcp14>MUST</bcp14> ensure support for partial/incremental deployment as it is not feasible to deploy it simultaneously in all ASes. The partial/incremental deployment of the inter-domain SAVNET architecture consists of different aspects, which include the partial/incremental deployment of the architecture and the partial/incremental deployment of the information sources.</t>
      <t>Within the architecture, the general information like the prefixes and topological information from RPKI ROA Objects and ASPA Objects and the routing information from the RIB can be obtained locally when the corresponding sources are available. Even when both SAV-specific Information and the information from RPKI ROA Objects and ASPA Objects are not available, the routing information from the RIB can be used to generate SAV rules.</t>
      <t>Furthermore, it is not mandatory for all ASes to deploy SAV Agents for SAV-specific Information. Instead, a SAV Agent should be able to effortlessly establish a logical neighboring relationship with another AS that has deployed a SAV Agent. The connections for communicating SAV-specific Information can be achieved by manual configurations set by operators or an automatic neighbor discovery mechanism. This flexibility enables the architecture to accommodate varying degrees of deployment, promoting interoperability and collaboration among participating ASes. During the partial/incremental deployment of SAV Agent, the SAV-specific Information for the ASes which do not deploy SAV Agent can not be obtained. To protect the prefixes of these ASes, inter-domain SAVNET architecture can use the SAV-related information from the general information in the SIB to generate SAV rules. At least, the routing information from the RIB can be always available in the SIB.</t>
      <t>As more ASes adopt the inter-domain SAVNET architecture, the "deployed area" expands, thereby increasing the collective defense capability against source address spoofing. Furthermore, if multiple "deployed areas" can be logically interconnected across "non-deployed areas", these interconnected "deployed areas" can form a logical alliance, providing enhanced protection against address spoofing. Especially, along with more ASes deploy SAV Agent and support the communication of SAV-specific Information, the generated SAV rules of the inter-domain SAVNET architecture to protect these ASes will become more accurate, as well as enhancing the protection capability against source address spoofing for the inter-domain SAVNET architecture.</t>
      <t>In addition, releasing the SAV functions of the inter-domain SAVNET architecture incrementally is one potential way to reduce the deployment risks and can be considered in its deployment by network operators:</t>
      <ul spacing="normal">
        <li>
          <t>First, the inter-domain SAVNET can only do the measurement in the data plane and do not take any other actions. Based on the measurement data, the operators can evaluate the effect of the inter-domain SAVNET on the legitimate traffic, including validation accuracy and forwarding performance, as well as the operational overhead.</t>
        </li>
        <li>
          <t>Second, the inter-domain SAVNET can open the function to limit the rate of the traffic that is justified as spoofing traffic. The operators can further evaluate the effect of the inter-domain SAVNET on the legitimate traffic and spoofing traffic, such as limiting the rate of all the spoofing traffic without hurting the legitimate traffic.</t>
        </li>
        <li>
          <t>Third, when the validation accuracy, forwarding performance, and operational overhead have been verified on a large scale by the live network, the inter-domain SAVNET can open the function to directly block the spoofing traffic that is justified by the SAV table in the data plane.</t>
        </li>
      </ul>
    </section>
    <section anchor="convergence-considerations">
      <name>Convergence Considerations</name>
      <t>Convergence issues <bcp14>SHOULD</bcp14> be carefully considered in inter-domain SAV mechanisms due to the dynamic nature of the Internet. Internet routes undergo continuous changes, and SAV rules <bcp14>MUST</bcp14> proactively adapt to these changes, such as prefix and topology changes, in order to prevent false positives and reduce false negatives. To effectively track these changes, the SIM should promptly collect SAV-related information from various SAV information sources and consolidate them in a timely manner.</t>
      <t>In particular, it is essential for the SAV Agents to proactively communicate the changes of the SAV-specific Information between ASes and adapt to route changes promptly. However, during the routing convergence process, the traffic paths of the source prefixes can undergo rapid changes within a short period. The changes of the SAV-specific Information may not be communicated in time between ASes to update SAV rules, false positives or false negatives may happen. Such inaccurate validation is caused by the delays in communicating SAV-specific Information between ASes, which occur due to the factors like packet losses, unpredictable network latencies, or message processing latencies. The design of the SAV-specific communication mechanism should consider these issues to reduce the inaccurate validation.</t>
      <t>Besides, for the inter-domain SAVNET architecture, the potential ways to deal with the inaccurate validation issues during the convergence of the SAV-specific communication mechanism is to consider using the information from RPKI ROA Objects and ASPA objects to generate SAV rules until the convergence process of the SAV-specific communication mechanism is finished, since these information is more stable and can help avoid false positives, and thus avoiding the impact to the legitimate traffic.</t>
    </section>
    <section anchor="manageability-considerations">
      <name>Manageability Considerations</name>
      <t>It is crucial to consider the operations and management aspects of SAV information sources, the SAV-specific communication mechanism, SIB, SIM, and SAV table in the inter-domain SAVNET architecture. The following guidelines should be followed for their effective management:</t>
      <t>First, management interoperability should be supported across devices from different vendors or different releases of the same product, based on a unified data model such as YANG <xref target="RFC6020"/>. This is essential because the Internet comprises devices from various vendors and different product releases that coexist simultaneously.</t>
      <t>Second, scalable operation and management methods such as NETCONF <xref target="RFC6241"/> and syslog protocol <xref target="RFC5424"/> should be supported. This is important as an AS may have hundreds or thousands of border routers that require efficient operation and management.</t>
      <t>Third, management operations, including default initial configuration, alarm and exception reporting, logging, performance monitoring and reporting for the control plane and data plane, as well as debugging, should be designed and implemented in the protocols or protocol extensions. These operations can be performed either locally or remotely, based on the operational requirements.</t>
      <t>By adhering to these rules, the management of SAV information sources and related components can be effectively carried out, ensuring interoperability, scalability, and efficient operations and management of the inter-domain SAVNET architecture.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>In the inter-domain SAVNET architecture, the SAV Agent plays a crucial role in generating and disseminating SAV-specific Messages across different ASes. To safeguard against the potential risks posed by a malicious AS generating incorrect or forged SAV-specific Messages, it is important for the SAV Agents to employ security authentication measures for each received SAV-specific Message. The majour security threats faced by inter-domain SAVNET can be categorized into two aspects: session security and content security. Session security pertains to verifying the identities of both parties involved in a session and ensuring the integrity of the session content. Content security, on the other hand, focuses on verifying the authenticity and reliability of the session content, thereby enabling the identification of forged SAV-specific Messages.</t>
      <t>The threats to session security include:</t>
      <ul spacing="normal">
        <li>
          <t>Session identity impersonation: This occurs when a malicious router deceitfully poses as a legitimate peer router to establish a session with the targeted router. By impersonating another router, the malicious entity can gain unauthorized access and potentially manipulate or disrupt the communication between the legitimate routers.</t>
        </li>
        <li>
          <t>Session integrity destruction: In this scenario, a malicious intermediate router situated between two peering routers intentionally tampers with or destroys the content of the relayed SAV-specific Message. By interfering with the integrity of the session content, the attacker can disrupt the reliable transmission of information, potentially leading to miscommunication or inaccurate SAV-related data being propagated.</t>
        </li>
      </ul>
      <t>The threats to content security include:</t>
      <ul spacing="normal">
        <li>
          <t>Message alteration: A malicious router has the ability to manipulate or forge any portion of a SAV-specific Message. For example, the attacker may employ techniques such as using a spoofed Autonomous System Number (ASN) or modifying the AS Path information within the message. By tampering with the content, the attacker can potentially introduce inaccuracies or deceive the receiving ASes, compromising the integrity and reliability of the SAV-related information.</t>
        </li>
        <li>
          <t>Message injection: A malicious router injects a seemingly "legitimate" SAV-specific Message into the communication stream and directs it to the corresponding next-hop AS. This type of attack can be likened to a replay attack, where the attacker attempts to retransmit previously captured or fabricated messages to manipulate the behavior or decisions of the receiving ASes. The injected message may contain malicious instructions or false information, leading to incorrect SAV rule generation or improper validation.</t>
        </li>
        <li>
          <t>Path deviation: A malicious router intentionally diverts a SAV-specific Message to an incorrect next-hop AS, contrary to the expected path defined by the AS Path. By deviating from the intended routing path, the attacker can disrupt the proper dissemination of SAV-related information and introduce inconsistencies or conflicts in the validation process. This can undermine the effectiveness and accuracy of source address validation within the inter-domain SAVNET architecture.</t>
        </li>
      </ul>
      <t>Overall, inter-domain SAVNET shares similar security threats with BGP and can leverage existing BGP security mechanisms to enhance both session and content security. Session security can be enhanced by employing session authentication mechanisms used in BGP, such as MD5, TCP-AO, or Keychain. Similarly, content security can benefit from the deployment of existing BGP security mechanisms like RPKI, BGPsec, and ASPA. While these mechanisms can address content security threats, their widespread deployment is crucial. Until then, it is necessary to develop an independent security mechanism specifically designed for inter-domain SAVNET. One potential approach is for each origin AS to calculate a digital signature for each AS path and include these digital signatures within the SAV-specific Messages. Upon receiving a SAV-specific Message, the SAV Agent can verify the digital signature to ascertain the message's authenticity. Furthermore, it is worth noting that the information channel of the inter-domain SAVNET architecture may need to operate over a network link that is currently under a source address spoofing attack. As a result, it may experience severe packet loss and high latency due to the ongoing attack, and the implementation of the information channel should ensure uninterrupted communication. Detailed security designs and considerations will be addressed in a separate draft, ensuring the robust security of inter-domain SAVNET.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
    <section anchor="scope">
      <name>Scope</name>
      <t>In this architecture, the choice of protocols used for communication between the SIM and different SAV information sources is not limited. The inter-domain SAVNET architecture presents considerations on how to consolidate SAV-related information from various sources to generate SAV rules and perform SAV using the SAV table in the dataplane. The detailed design and implementation for SAV rule generation and SAV execution depend on the specific inter-domain SAV mechanisms employed.</t>
      <t>This document does not cover administrative or business agreements that may be established between the involved inter-domain SAVNET parties. These considerations are beyond the scope of this document. However, it is assumed that authentication and authorization mechanisms can be implemented to ensure that only authorized ASes can communicate SAV-related information.</t>
    </section>
    <section anchor="assumptions">
      <name>Assumptions</name>
      <t>This document makes the following assumptions:</t>
      <ul spacing="normal">
        <li>
          <t>All ASes where the inter-domain SAVNET is deployed are assumed to provide the necessary connectivity between SAV Agent and any intermediate network elements. However, the architecture does not impose any specific limitations on the form or nature of this connectivity.</t>
        </li>
        <li>
          <t>Congestion and resource exhaustion can occur at various points in the inter-domain networks. Hence, in general, network conditions should be assumed to be hostile. The inter-domain SAVNET architecture must be capable of functioning reliably under all circumstances, including scenarios where the paths for delivering SAV-related information are severely impaired. It is crucial to design the inter-domain SAVNET system with a high level of resilience, particularly under extremely hostile network conditions. The architecture should ensure uninterrupted communication between inter-domain SAV Agents, even when data-plane traffic saturates the link.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture does not impose rigid requirements for the SAV information sources that can be used to generate SAV rules. Similarly, it does not dictate strict rules on how to utilize the SAV-related information from diverse sources or perform SAV in the dataplane. Network operators have the flexibility to choose their approaches to generate SAV rules and perform SAV based on their specific requirements and preferences. Operators can either follow the recommendations outlined in the inter-domain SAVNET architecture or manually specify the rules for governing the use of SAV-related information, the generation of SAV rules, and the execution of SAV in the dataplane.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture does not impose restrictions on the selection of the local AS with which AS to communicate SAV-specific Information. The ASes have the flexibility to establish connections for SAV-specific communication based on the manual configurations set by operators or other automatic mechanisms.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture provides the flexibility to accommodate Quality-of-Service (QoS) policy agreements between SAVNET-enabled ASes or local QoS prioritization measures, but it does not make assumptions about their presence. These agreements or prioritization efforts are aimed at ensuring the reliable delivery of SAV-specific Information between SAV Agents. It is important to note that QoS is considered as an operational consideration rather than a functional component of the inter-domain SAVNET architecture.</t>
        </li>
        <li>
          <t>The information and management channels are loosely coupled and are used for collecting SAV-related information from different sources, and how the inter-domain SAVNET synchronize the management and operation configurations is out of scope of this document.</t>
        </li>
      </ul>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Igor Lubashev<br/>
  Akamai Technologies<br/>
  145 Broadway<br/>
  Cambridge, MA, 02142<br/>
  United States of America<br/>
  Email: ilubashe@akamai.com</t>
      <t>Many thanks to Igor Lubashev for the significantly helpful revision suggestions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC5424">
          <front>
            <title>The Syslog Protocol</title>
            <author fullname="R. Gerhards" initials="R." surname="Gerhards"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way.</t>
              <t>This document has been written with the original design goals for traditional syslog in mind. The need for a new layered specification has arisen because standardization efforts for reliable and secure syslog extensions suffer from the lack of a Standards-Track and transport-independent RFC. Without this document, each other standard needs to define its own syslog packet format and transport mechanism, which over time will introduce subtle compatibility issues. This document tries to provide a foundation that syslog extensions can build on. This layered architecture approach also provides a solid basis that allows code to be written once for each syslog feature rather than once for each transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5424"/>
          <seriesInfo name="DOI" value="10.17487/RFC5424"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="inter-domain-ps" target="https://datatracker.ietf.org/doc/draft-ietf-savnet-inter-domain-problem-statement/">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="intra-domain-arch" target="https://datatracker.ietf.org/doc/draft-li-savnet-intra-domain-architecture/">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="RFC5635">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC8955">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8210">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="manrs" target="https://www.manrs.org/netops/guide/antispoofing/">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="nist" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation">
          <front>
            <title>Resilient Interdomain Traffic Exchange: BGP Security and DDos Mitigation</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2019"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 719?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Alvaro Retana, Kotikalapudi Sriram, Rüdiger Volk, Xueyan Song, Ben Maddison, Jared Mauch, Joel Halpern, Aijun Wang, Jeffrey Haas, Xiangqing Chang, Changwang Lin, Mingxing Liu, Zhen Tan, Yuanyuan Zhang, Yangyang Wang, etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
