<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wu-savnet-inter-domain-architecture-07" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="Inter-domain SAVNET Architecture">Inter-domain Source Address Validation (SAVNET) Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-07"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="March" day="04"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 101?>

<t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV-specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
    </abstract>
  </front>
  <middle>
    <?line 105?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Attacks based on source IP address spoofing, such as reflective DDoS and flooding attacks, continue to present significant challenges to Internet security. Mitigating these attacks in inter-domain networks requires effective source address validation (SAV). While BCP84 <xref target="RFC3704"/> <xref target="RFC8704"/> offers some SAV solutions, such as ACL-based ingress filtering and uRPF-based mechanisms, existing inter-domain SAV mechanisms have limitations in terms of validation accuracy and operational overhead in different scenarios <xref target="inter-domain-ps"/>.</t>
      <t>There are various existing general information from different sources including RPKI ROA objects and ASPA objects, RIB, FIB, and Internet Routing Registry (IRR) data, which can be used for inter-domain SAV. Generating SAV rules based on general information, however, cannot well satisfy the requirements for new inter-domain SAV mechanisms proposed in <xref target="inter-domain-ps"/>. As analyzed in <xref target="savinfo-sec"/>, general information from RPKI ROA objects and ASPA objects can be used to infer the prefixes and their permissible incoming directions yet cannot be updated in a timely manner to adapt to the prefix or route changes, and the local routing information, which represents the general information from RIB or FIB, cannot deal with the asymmetric routing scenarios and may lead to improper blocks or improper permits, while IRR data do not update in a timely manner either and are not always accurate.</t>
      <t>Consequently, to address these issues, the inter-domain SAVNET architecture focuses on providing a comprehensive framework and guidelines for the design and implementation of new inter-domain SAV mechanisms. Inter-domain SAVNET architecture proposes SAV-specific information and uses it to generate SAV rules. SAV-specific information consists of prefixes and their corresponding legitimate incoming direction to enter an AS. Inter-domain SAVNET architecture can use it to generate more accurate SAV rules. In order to gather the SAV-specific information, a SAV-specific information communication mechanism would be developed for origination, processing, propagation, and termination of the messages which carry the SAV-specific information, and it can be implemented by a new protocol or extending an existing protocol. When the prefixes or routes change, it can update the SAV-specific information automatically in a timely manner. Also, the inter-domain SAVNET architecture will communicate the SAV-specific information over a secure connection between authenticated ASes.</t>
      <t>Moreover, during the incremental/partial deployment period of the SAV-specific information, the inter-domain SAVNET architecture can leverage the general information to generate SAV rules, if the SAV-specific information of an AS is unavailable. Multiple information sources may exist concurrently, to determine the one used for generating SAV rules, the inter-domain SAVNET architecture assigns priorities to the SAV-specific information and different general information and generates SAV rules using the SAV-related information with the highest-priority. SAV-specific information has the highest priority and the priorities of RPKI ROA objects and ASPA objects, RIB, FIB, and IRR data decrease in turn.</t>
      <figure anchor="exp-inter-sav">
        <name>An example for illustrating the incentive of deploying inter-domain SAVNET architecture.</name>
        <artwork><![CDATA[
+-----------+
| AS 1 (P1) #
+-----------+ \
               \           Spoofed Packets
             +-+#+-------+ with Source Addresses in P1 +-----------+
             |    AS 2   #-----------------------------#   AS 4    |
             +-+#+-------+                             +-----------+
               / 
+-----------+ /
|   AS 3    #
+-----------+
AS 4 sends spoofed packets with source addresses in P1 to AS 3 
through AS 2.
If AS 1 and AS 2 deploy inter-domain SAV, the spoofed packets 
can be blocked at AS 2.
]]></artwork>
      </figure>
      <t>The inter-domain SAVNET architecture provides the incentive to deploy inter-domain SAV for operators. <xref target="exp-inter-sav"/> illustrates this using an example. P1 is the source prefix of AS 1, and AS 4 sends spoofing packets with P1 as source addresses to AS 3 through AS 2. Assume AS 4 does not deploy intra-domain SAV, these spoofing packets cannot be blocked by AS 4. Although AS 1 can deploy intra-domain SAV to block incoming packets which spoof the addresses of AS 1, these spoofing traffic from AS 4 to AS 3 do not go through AS 1, so they cannot be blocked by AS 1. Inter-domain SAVNET architecture can help in this scenario. If AS 1 and AS 2 deploy inter-domain SAVNET architecture, AS 2 knows that the packets with P1 as source addresses should come from AS 1, and the spoofing packets can thus be blocked by AS 2 since they come from the incorrect direction. Specifically, by proposing SAV-specific information and using it to generate SAV rules, the inter-domain SAVNET architecture gives more deployment incentive compared to existing inter-domain SAV mechanisms, which will be analyzed in <xref target="usecases"/>.</t>
      <t>In addition, this document primarily proposes a high-level architecture for describing the communication flow of SAV-specific information and general information, guiding how to utilize the SAV-specific information and general information for generating SAV rules and deploy an inter-domain SAV mechanism between ASes. This document does not specify protocol extensions or implementations. Its purpose is to provide a conceptual framework and guidance for the design and development of inter-domain SAV mechanisms, allowing implementers to adapt and implement the architecture based on their specific requirements and network environments.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV Rule:</dt>
        <dd>
          <t>The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        </dd>
        <dt>SAV Table:</dt>
        <dd>
          <t>The table or data structure that implements the SAV rules and is used for performing source address validation on the data plane.</t>
        </dd>
        <dt>SAV-specific Information:</dt>
        <dd>
          <t>The information that is specialized for SAV rule generation, includes the source prefixes and their legitimate incoming directions to enter an AS, and is gathered by the communication between ASes with the SAV-specific information communication mechanism.</t>
        </dd>
        <dt>SAV-specific Information Communication Mechanism:</dt>
        <dd>
          <t>The mechanism that is used to communicate SAV-specific information between ASes and can be implemented by a new protocol or an extension to an existing protocol.</t>
        </dd>
        <dt>Local Routing Information:</dt>
        <dd>
          <t>The information that is stored in ASBR's local RIB or FIB and can be used to generate SAV rules in addition to the routing purpose.</t>
        </dd>
        <dt>General Information:</dt>
        <dd>
          <t>The information that is not specialized for SAV but can be utilized to generate SAV rules, and is initially utilized for other purposes. Currently, the general information consists of the information from RPKI ROA objects and ASPA objects, local routing information, and the one from IRR data.</t>
        </dd>
        <dt>SAV-related Information:</dt>
        <dd>
          <t>The information that can be used to generate SAV rules and includes SAV-specific information and general information.</t>
        </dd>
        <dt>SAVNET Agent:</dt>
        <dd>
          <t>The agent within a SAVNET-adopting AS that is responsible for gathering SAV-related information and utilizing it to generate SAV rules.</t>
        </dd>
        <dt>SAV Information Base:</dt>
        <dd>
          <t>SAV information base is a table or data structure for storing SAV-related information collected from different SAV information sources and is a component within SAVNET agent.</t>
        </dd>
        <dt>SAV Information Base Manager:</dt>
        <dd>
          <t>SAV information base manager maitains the SAV-related information in the SAV information base and uses it to generate SAV rule accordingly, and is a component within SAVNET agent.</t>
        </dd>
        <dt>Improper Block:</dt>
        <dd>
          <t>The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Improper Permit:</dt>
        <dd>
          <t>The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        </dd>
      </dl>
    </section>
    <section anchor="goal-sec">
      <name>Design Goals</name>
      <t>The inter-domain SAVNET architecture aims to improve SAV accuracy and facilitate partial deployment with low operational overhead, while guaranteeing convergence and providing security guarantees to the communicated information, which corresponds to the requirements for new inter-domain SAV mechanisms proposed in the inter-domain SAVNET architecture draft <xref target="inter-domain-ps"/>. The overall goal can be broken down into the following aspects:</t>
      <ul spacing="normal">
        <li>
          <t><strong>G1</strong>: The inter-domain SAVNET architecture should learn the real paths of source prefixes to any destination prefixes or permissible paths that can cover their real paths, and generate accurate SAV rules automatically based on the learned information to avoid improper blocks and reduce improper permits as much as possible.</t>
        </li>
        <li>
          <t><strong>G2</strong>: The inter-domain SAVNET architecture should provide sufficient protection for the source prefixes of ASes that deploy it, even if only a portion of the Internet does the deployment.</t>
        </li>
        <li>
          <t><strong>G3</strong>: The inter-domain SAVNET architecture should adapt to dynamic networks and asymmetric routing scenarios automatically.</t>
        </li>
        <li>
          <t><strong>G4</strong>: The inter-domain SAVNET architecture should promptly detect the network changes and launch the convergence process in a timely manner, while reducing improper blocks and improper permits during the convergence process.</t>
        </li>
        <li>
          <t><strong>G5</strong>: The inter-domain SAVNET architecture should provide security guarantees for the communicated SAV-specific information.</t>
        </li>
      </ul>
      <t>Other design goals, such as low operational overhead and easy implementation, are also very important and should be considered in specific protocols or protocol extensions.</t>
    </section>
    <section anchor="inter-domain-savnet-architecture-overview">
      <name>Inter-domain SAVNET Architecture Overview</name>
      <figure anchor="expcase">
        <name>Inter-domain SAVNET architecture.</name>
        <artwork><![CDATA[
 +~~~~~~~~~~~~~~~~~~~~~~~~+       +--------------------+
 |RPKI Cache Server/IRR DB|       | AS X's Provider AS |
 +~~~~~~~~~~~~~~~~~~~~~~~~+       +------------+/\+/\+-+
   ROA & ASPA |                 BGP /            |  |
Obj./IRR Data |            Message /             |  |
              |                   /              |  | BGP
+-----------+\/+----------------+\/+-+           |  | Message
|                AS X                |  BGP  +--------------+
| +--------------------------------+ |<------|AS X's Lateral|          
| |          SAVNET Agent          | |Message|   Peer  AS   |
| +--------------------------------+ |       +--------------+
+-----+/\+/\+----------------+/\+/\+-+
        |  |                   |  |
    BGP |  | SAV-specific      |  |
Message |  | Message           |  |
+------------------+           |  |
|AS X's Customer AS|           |  |
+-------+/\+-------+           |  |
          \                    |  |
       BGP \  SAV-specific     |  | BGP
    Message \ Message          |  | Message
    +------------------------------------+
    |          AS X's Customer AS        |
    | +--------------------------------+ |
    | |         SAVNET Agent           | |
    | +--------------------------------+ |
    +------------------------------------+
AS X and one of its customer ASes have deployed SAVNET agent
and can exchange SAV-specific information with each other.
]]></artwork>
      </figure>
      <t><xref target="expcase"/> provides an overview of the inter-domain SAVNET architecture, showcasing an AS topology and the flow of SAV-related information among ASes. The topology captures the full spectrum of AS relationships in the Internet, displaying all peer ASes of AS X including customers, lateral peers, and providers and the existence of multiple physical links between ASes. Arrows in the figure indicate the direction of the corresponding SAV-related information from its source to AS X, such as gathering RPKI ROA objects and ASPA objects from RPKI cache server. The inter-domain SAVNET architecture conveys the SAV-related information through various mediums such as SAV-specific messages, BGP messages, RTR messages, and FTP messages. Based on the SAV-related information, AS X generates SAV rules. It is also worth noting that the inter-domain SAVNET architecture discusses AS-level inter-domain SAV.</t>
      <t><xref target="expcase"/> uses AS X as the representative to illustrate that what SAV-related information the SAVNET agent within AS X will collect and where the information is from. AS X has deployed SAVNET agent and can generate SAV rules to perform inter-domain SAV by consolidating the SAV-related information. It can obtain SAV-specific information from its customer AS which deploys SAVNET agent and local routing information originating from the BGP update messages of its neighbor ASes. Also, AS X can obtain RPKI ROA objects and ASPA objects from RPKI cache server and IRR data from IRR database.</t>
      <t>The inter-domain SAVNET architecture proposes SAV-specific information, which is more accurate and trustworthy than existing general information, and can update in a timely manner. SAV-specific information consists of prefixes and their legitimate incoming directions. The SAVNET agent communicates SAV-specific information between ASes via SAV-specific messages, when prefixes or routes change, it can launch SAV-specific messages timely to update SAV-specific information. Additionally, when SAVNET agent receives SAV-specific messages, it will validate whether the SAV-specific connections for communicating SAV-specific messages are authentic connections from authenticated ASes. Therefore, when SAV-specific information of an AS is available, SAVNET agent will use it to generate SAV rules.</t>
      <t>Furthermore, if the SAV-specific information is needed to communicate between ASes, a new SAV-specific information communication mechanism would be developed to exchange the SAV-specific messages between ASes which carry the SAV-specific information. It should define the data structure or format for communicating the SAV-specific information and the operations and timing for originating, processing, propagating, and terminating the SAV-specific messages. Also, it can be implemented by a new protocol or extending an existing protocol.</t>
      <t>The SAVNET agent should launch SAV-specific messages to adapt to the route changes in a timely manner. The SAV-specific information communication mechanism should handle route changes carefully to avoid improper blocks. The reasons for leading to improper blocks may include late detection of route changes, delayed message transmission, or packet losses. During the convergence process of the SAV-specific information communication mechanism, the inter-domain SAVNET architecture can use the information from RPKI ROA objects and ASPA objects to generate SAV rules until the convergence process is finished, since these information includes topological information and is more stable, and can thus avoid improper blocks. However, the detailed design of the SAV-specific information communication mechanism for dealing with route changes is outside the scope of this document.</t>
      <t>In the incremental/partial deployment stage of the inter-domain SAVNET architecture, when the SAV-specific information of some ASes is unavailable, SAVNET agent can leverage general information to generate SAV rules. If all these general information is available, it is recommended to use RPKI ROA objects and ASPA objects to generate SAV rules. Since compared to the local routing information and IRR data, they can provide authoritative prefixes and topological information and have less improper blocks. The systematic recommendations for the utilizations of SAV-related information and the corresponding rationale will be illustrated in <xref target="sib-sec"/>.</t>
      <t>Regarding the security concerns, the inter-domain SAVNET architecture shares the similar security threats with BGP and can leverage existing BGP security mechanisms to enhance both session and content security.</t>
      <figure anchor="arch">
        <name>SAVNET agent and SAV table within AS X in Figure 2.</name>
        <artwork><![CDATA[
+-----------------------------------------------------------+
|                         Other ASes                        |
+-----------------------------------------------------------+
                                           | SAV-specific
                                           | Messages
+-----------------------------------------------------------+
|                           AS X           |                |
| +-------------------------------------------------------+ |                                      
| |                      SAVNET Agent      |              | |
| |                                       \/              | |
| | +---------------------+  +--------------------------+ | |
| | | General Information |  | SAV-specific Information | | |
| | +---------------------+  +--------------------------+ | |
| |            |                           |              | |
| |           \/                          \/              | |
| | +---------------------------------------------------+ | |
| | | +-----------------------------------------------+ | | |
| | | |              SAV Information Base             | | | |
| | | +-----------------------------------------------+ | | |
| | |            SAV Information Base Manager           | | |
| | +---------------------------------------------------+ | |
| |                          |SAV Rules                   | |
| +-------------------------------------------------------+ |
|                            |                              |
|                           \/                              |
| +-------------------------------------------------------+ |
| |                      SAV Table                        | |
| +-------------------------------------------------------+ |
+-----------------------------------------------------------+
]]></artwork>
      </figure>
      <t><xref target="arch"/> displays the SAVNET agent and SAV table within AS X. The SAVNET agent can obtain the SAV-specific information and general information from various SAV information sources including SAV-specific messages from other ASes, RPKI cache server, and RIB or FIB as long as they are available. The SAV information base (SIB) within the SAVNET agent can store the SAV-specific information and general information and is maintained by the SIB manager. And SIB manager generates SAV rules based on the SIB and fills out the SAV table on the data plane. Moreover, the SIB can be managed by network operators using various methods such as YANG <xref target="RFC6020"/>, Command-Line Interface (CLI), remote triggered black hole (RTBH) <xref target="RFC5635"/>, and Flowspec <xref target="RFC8955"/>. The detailed collection methods of the SAV-related information depend on the deployment and implementation of the inter-domain SAV mechanisms and are out of scope for this document.</t>
      <t>In the data plane, the packets coming from other ASes will be validated by the SAV table and only the packets which are permitted by the SAV table will be forwarded to the next hop. To achieve this, the router looks up each packet's source address in its local SAV table and gets one of three validity states: "Valid", "Invalid" or "Unknown". "Valid" means that there is a source prefix in SAV table covering the source address of the packet and the valid incoming interfaces covering the actual incoming interface of the packet. According to the SAV principle, "Valid" packets will be forwarded. "Invalid" means there is a source prefix in SAV table covering the source address, but the incoming interface of the packet does not match any valid incoming interface so that such packets will be dropped. "Unknown" means there is no source prefix in SAV table covering the source address. The packet with "unknown" addresses can be dropped or permitted, which depends on the choice of operators. The structure and detailed usage of SAV table can refer to <xref target="sav-table"/>.</t>
    </section>
    <section anchor="savinfo-sec">
      <name>SAV-related Information</name>
      <t>SAV-related information represents the information that can be used for SAV and consists of RPKI ROA objects and ASPA objects, local routing information, IRR data, and SAV-specific information. In the inter-domain SAVNET architecture, RPKI ROA objects and ASPA objects, local routing information, and IRR data are categorized into general information. In the future, if a new information source is created and can be used for SAV, but is not originally and specially used for SAV, its information can be categorized into general information. In other words, general information can also be considered as dual-use information.</t>
      <section anchor="general-information">
        <name>General Information</name>
        <t>General information refers to the information that is not directly designed for SAV but can be utilized to generate SAV rules, and includes RPKI ROA objects and ASPA objects, local routing information, and IRR data.</t>
        <section anchor="rpki-roa-objects-and-aspa-objects">
          <name>RPKI ROA objects and ASPA Objects</name>
          <t>The RPKI ROA objects and ASPA objects are originally designed for the routing security purpose. RPKI ROA objects consists of {prefix, maximum length, origin AS} information and are originally used to mitigate the route origin hijacking, while RPKI ASPA objects consists of {ASN, Provider AS Set} information and are originally used to mitigate the route leaks. Both the objects are verified and authoritative. They are also stable and will not be updated frequently.</t>
          <t>Based on ASPA objects, the AS-level network topology can be constructed. And according to the ROA objects and the constructed AS-level topology information, an AS can learn all the permissible paths of the prefixes from its customer cone. Therefore, the prefixes and all its permissible incoming directions can be obtained. All the permissible incoming directions, however, do not only consist of the real incoming directions of the prefixes, but also the extra non-used incoming directions by the legitimate traffic, which would lead to improper permits.</t>
          <t>Additionally, according to a recent study <xref target="rpki-time-of-flight"/>, the process of updating RPKI information typically requires several minutes to an hour. This encompasses the addition or deletion of RPKI objects and the subsequent retrieval of updated information by ASes.</t>
        </section>
        <section anchor="local-routing-information">
          <name>Local Routing Information</name>
          <t>The local routing information is originally used to guide the packet forwarding on each router and can be stored in the local RIB or FIB. It can be parsed from the BGP update messages communicated between ASes. Existing uRPF-based SAV mechanisms use the local routing information to generate SAV rules. As analyzed in <xref target="inter-domain-ps"/>, in the asymmetric routing scenarios, these mechanisms have accuracy problems and would lead to improper permits or improper blocks.</t>
        </section>
        <section anchor="irr-data">
          <name>IRR Data</name>
          <t>The IRR data consist of ASes and their corresponding prefixes and can be used to augment the SAV table <xref target="RFC8704"/>. However, only using IRR data for SAV would limit the functioning scope of SAV, in inter-domain networks, it may only be able to prevent spoofing by a stub AS. In addition, the IRR data are not always accurate.</t>
        </section>
      </section>
      <section anchor="sav-specific-information">
        <name>SAV-specific Information</name>
        <t>SAV-specific information is the information that is specifically designed for SAV and consists of prefixes and their legitimate incoming directions to enter ASes. It can be contained in the SAV-specific messages which are communicated between ASes which deploy the inter-domain SAVNET architecture. When parsing the SAV-specific messages and obtaining the SAV-specific information, ASes can learn the prefixes and their legitimate incoming direction to enter themselves.</t>
        <t>Moreover, in the inter-domain SAVNET architecture, a SAV-specific information communication mechanism is used to communicate SAV-specific information between ASes and distribute the updated information to the relative ASes automatically in a timely manner once the prefixes or routes change.</t>
      </section>
      <section anchor="distinctions-of-different-sav-related-information">
        <name>Distinctions of Different SAV-related Information</name>
        <figure anchor="diffsavinfo">
          <name>The comprehensive comparasions between different SAV-related information.</name>
          <artwork><![CDATA[
+-------------------------+-----------+----------+---------------+
| SAV-related Information |  Accurate |Real-time |Trustworthiness|
|                         |    SAV    | Update   |               |
+-----------+-------------+-----------+----------+---------------+
|           |RPKI ROA Obj.|           |    NO    |      YES      |
|           | & ASPA Obj. |           |          |               |
|           +-------------+  Improper +----------+---------------+
|General    |Local Routing|   Block   |    YES   |       NO      |
|Information| Information |     &     |          |               |
|           +-------------+  Improper +----------+---------------+
|           |  IRR Data   |   Permit  |    NO    |       NO      |
|           |             |           |          |               |
+-----------+-------------+-----------+----------+---------------+
|                         |Functioning|          |               |
|SAV-specific Information |    as     |    YES   |       YES     |
|                         | Expected  |          |               |
+-------------------------+-----------+----------+---------------+
]]></artwork>
        </figure>
        <t><xref target="diffsavinfo"/> shows the comprehensive comparasions between different SAV-related information when only using the corresponding information as the source to generate SAV rules and can help clarify their distinctions. Compared against general information, SAV-specific information is more accurate and trustworthy, while it can update the SAV rules in a timely manner to adapt to the prefix or route changes.</t>
      </section>
    </section>
    <section anchor="sib-sec">
      <name>SAV Information Base</name>
      <figure anchor="sav_src">
        <name>Priority ranking for the SAV information sources.</name>
        <artwork><![CDATA[
+---------------------------------------------------+----------+
|              SAV Information Sources              |Priorities|
+---------------------------------------------------+----------+
|              SAV-specific Information             |     1    |
+---------------------+-----------------------------+----------+
|                     | RPKI ROA Obj. and ASPA Obj. |     2    |
|                     +-----------------------------+----------+
|                     |             RIB             |     3    |
| General Information +-----------------------------+----------+
|                     |             FIB             |     4    |
|                     +-----------------------------+----------+
|                     |           IRR Data          |     5    |
+---------------------+-----------------------------+----------+
Priority ranking from 1 to 5 represents high to low priority.
]]></artwork>
      </figure>
      <t>The SIB is managed by the SIB manager, which can consolidate SAV-related information from different sources. <xref target="sav_src"/> presents the priority ranking for the SAV-specific information and general information. Priority ranking from 1 to 5 represents high to low priority. Inter-domain SAVNET architecture uses SAV-related information from different sources based on their priorities. Once the SAV-specific information for a prefix is available within the SIB, the inter-domain SAVNET generates SAV rules based on SAV-specific information; otherwise, the inter-domain SAVNET generates SAV rules based on general information. The inter-domain SAVNET architecture assigns priorities to the information from different SAV information sources, and always generates the SAV rules using the information with the highest priority from all the available information.</t>
      <t>The priority ranking recommendation for different SAV information sources in <xref target="sav_src"/> is based on the accuracy, timeliness, trustness of the information from these sources. These properties determine that whether the requirements for new inter-domain SAV mechanisms proposed in <xref target="inter-domain-ps"/> can be well satisfied. SAV-specific information has higher priority than the general information, since it is specifically designed to carry more accurate SAV information, and can be updated in a timely manner to adapt to the prefix or route changes. The general information from RPKI ROA objects and ASPA objects, RIB, FIB, IRR data has different priorities, ranking 2, 3, 4, and 5, respectively. RPKI ROA objects and ASPA objects have higher priority than the one from RIB, FIB, and IRR data, this is because they can provide authoritative prefixes and topology information, which can be used to generate more accurate SAV rules. Also, they are more stable and can be used to reduce the risk of improper blocks during the convergence process of the network. Although the information source for RIB and FIB is the same, the RIB consists of more backup path information than the FIB, which can reduce improper blocks. IRR data have the lowest priority compared to others, since they are usually updated in a slower manner than the real network changes and not always correct.</t>
      <figure anchor="as-topo">
        <name>An example of AS topology.</name>
        <artwork><![CDATA[
                        +----------------+
                        |    AS 3(P3)    |
                        +-+/\-----+/\+/\++
                           /        \  \
                 P3[AS 3] /          \  \ P3[AS 3]
                         /            \  \
                        / (C2P)        \  \
               +----------------+       \  \
               |    AS 4(P4)    |        \  \
               ++/\+/\+/\+/\+/\++         \  \
  P6[AS 1, AS 2] /  /  |  |    \           \  \
       P2[AS 2] /  /   |  |     \           \  \
               /  /    |  |      \           \  \
              /  /     |  |       \ P5[AS 5]  \  \ P5[AS 5]
             /  /      |  |        \           \  \
            /  /(C2P)  |  |         \           \  \
+----------------+     |  |          \           \  \  
|    AS 2(P2)    |     |  | P1[AS 1]  \           \  \
+--------+/\+----+     |  | P6[AS 1]   \           \  \
  P6[AS 1] \           |  | NO_EXPORT   \           \  \
   P1[AS 1] \          |  |              \           \  \
   NO_EXPORT \         |  |               \           \  \
              \ (C2P)  |  | (C2P/P2P) (C2P)\     (C2P) \  \
           +----------------+              +----------------+
           |  AS 1(P1, P6)  |              |    AS 5(P5)    |
           +----------------+              +----------------+
Both AS 1 and AS 4 deploy the inter-domain SAVNET architecture 
and can exchange the SAV-specific information with each other, 
while other ASes do not deploy it.
]]></artwork>
      </figure>
      <figure anchor="sib">
        <name>An example for the SAV information base of AS 4 in Figure 6.</name>
        <artwork><![CDATA[
+-----+------+------------------+--------+------------------------+
|Index|Prefix|Incoming Direction|Relation| SAV Information Source |
+-----+------+------------------+--------+------------------------+
|  0  |  P1  |       AS 2       |Customer|SAV-specific Information| 
+-----+------+------------------+--------+------------------------+
|  1  |  P1  |       AS 1       |Customer|  General Information   |
+-----+------+------------------+--------+------------------------+
|  2  |  P2  |       AS 2       |Customer|  General Information   |
+-----+------+------------------+--------+------------------------+
|  3  |  P3  |       AS 3       |Provider|  General Information   |
+-----+------+------------------+--------+------------------------+
|  4  |  P5  |       AS 3       |Provider|  General Information   |
+-----+------+------------------+--------+------------------------+
|  5  |  P5  |       AS 5       |Customer|  General Information   |
+-----+------+------------------+--------+------------------------+
|  6  |  P6  |       AS 2       |Customer|  General Information   |
|     |      |                  |        |SAV-specific Information|
+-----+------+------------------+--------+------------------------+
|  7  |  P6  |       AS 1       |Customer|  General Information   |
+-----+------+------------------+--------+------------------------+
]]></artwork>
      </figure>
      <t>We use the examples shown in <xref target="as-topo"/> and <xref target="sib"/> to introduce SIB and illustrate how to generate SAV rules based on the SIB. <xref target="sib"/> depicts an example of the SIB established in AS 4 displayed in <xref target="as-topo"/>. Each row of the SIB contains an index, prefix, incoming direction of the prefix, reltation between ASes, and the corresponding sources of the information. The incoming direction consists of customer, provider, and peer. For example, in <xref target="sib"/>, the row with index 0 indicates the incoming direction of P1 is AS 2 and the information source is SAV-specific information. Note that the same SAV-related information may have multiple sources and the SIB records them all, such as the row indexed 6. Moreover, SIB should be carefully implemented in the specific protocol or protocol extensions to avoid becoming a heavy burden of the router, and the similar optimization approaches used for the RIB may be applied.</t>
      <t>Recall that inter-domain SAVNET architecture generates SAV rules based on the SAV-related information in the SIB and their priorities. In addition, in the case of an AS's interfaces facing provider or lateral peer ASes where loose SAV rules are applicable, the inter-domain SAVNET architecture recommends to use blocklist at such directions to only block the prefixes that are sure not to come at these directions, while in the case of an AS's interfaces facing customer ASes that necessitate stricter SAV rules, the inter-domain SAVNET architecture recommends to use allowlist to only permit the prefixes that are allowed to come at these directions.</t>
      <t>Based on the above rules, taking the SIB in <xref target="sib"/> as an example to illustrate how the inter-domain SAVNET generates rules, AS 4 can conduct SAV as follows: SAV at the interfaces facing AS 3 blocks P1, P2, and P6 according to the rows indexed 0, 2, and 6 in the SIB, SAV at the interfaces facing AS 2 permits P1, P2, and P6 according to the rows indexed 0, 2, and 6 in the SIB, SAV at the interfaces facing AS 1 does not permit any prefixes according to the row indexed 0, 1, 6, and 7 in the SIB, and SAV at the interfaces facing AS 5 permits P5 according to the row indexed 5 in the SIB.</t>
    </section>
    <section anchor="savnet-communication-mechanism">
      <name>SAVNET Communication Mechanism</name>
      <figure anchor="sav_agent_config">
        <name>SAVNET communication mechanism for gathering SAV-related information from different SAV information sources.</name>
        <artwork><![CDATA[
+------+  SAV-specific Information
|      |  Communication Mechanism  +-----------------------------+ 
|      |<==========================|  SAVNET Agent in other ASes |
|      |                           +-----------------------------+
|      |                         +---------------------------------+
|      |                         | +-----------------------------+ |
|      |                         | | RPKI ROA Obj. and ASPA Obj. | |
|      |                         | +-----------------------------+ |
|      |                         | +-----------------------------+ |
|      |  General Information    | |             RIB             | |
|SAVNET| Communication Mechanism | +-----------------------------+ |
|Agent |<------------------------| +-----------------------------+ |
|      |                         | |             FIB             | |
|      |                         | +-----------------------------+ |
|      |                         | +-----------------------------+ |
|      |                         | |         IRR Database        | |
|      |                         | +-----------------------------+ |
|      |                         +---------------------------------+
|      |  Management Mechanism   +-----------------------------+
|      |<------------------------|      Network Operators      |
|      |                         +-----------------------------+
+------+
]]></artwork>
      </figure>
      <t>SAV-specific information relies on the communication between SAVNET agents and general information can be from RPKI ROA objects and ASPA objects, RIB, FIB, and IRR data. Therefore, as illustrated in <xref target="sav_agent_config"/>, the SAVNET agent needs to receive the SAV-related information from these SAV information sources. SAVNET agent also needs to accept the configurations from network operators for the management operations. Gathering these types of information relies on the SAVNET communication mechanism, which includes SAV-specific information communication mechanism, general information communication mechanism, and management mechanism.</t>
      <section anchor="sav-specific-information-communication-mechanism">
        <name>SAV-specific Information Communication Mechanism</name>
        <figure anchor="sav_msg">
          <name>An example for exchanging SAV-specific information with SAV-specific information communication mechanism between AS 1 and AS X.</name>
          <artwork><![CDATA[
+------------------+                        +------------------+
|   AS 1 (P1, P6)  | SAV-specific Messages  |     AS X (P4)    |
| +-------------+  | (P1, AS 2), (P6, AS 2) |  +-------------+ |
| |    SAVNET   |--|------------------------|->|    SAVNET   | |
| |    Agent    |<-|------------------------|--|    Agent    | |
| +-------------+  |      (P4, AS X)        |  +-------------+ |
+------------------+  SAV-specific Messages +------------------+
]]></artwork>
        </figure>
        <t><xref target="sav_msg"/> uses an example for exchanging SAV-specific information with SAV-specific messages between AS 1 and AS X. The SAV-specific information can be expressed as &lt;Prefix, Incoming Direction&gt; pairs, e.g., (P1, AS 2), (P6, AS 2), and (P4, AS X) in <xref target="sav_msg"/>.</t>
        <t>The SAV-specific information can be exchanged between ASes via SAV-specific messages. SAV-specific messages are used to propagate or originate the SAV-specific information between ASes by the SAVNET agent. For an AS which initiates its own SAV-specific messages, the SAVNET agent within the AS can obtain incoming direction of its own prefixes to enter other ASes based on the local RIB and uses SAV-specific messages to carry the AS's prefixes to the corresponding ASes. When other ASes receive the SAV-specific messages, they parse the messages to obtain source prefixes and their corresponding incoming directions to enter these ASes.</t>
        <t>Additionally, if SAV-specific information is communicated between ASes, a new SAV-specific information communication mechanism would need to be developed to communicate it and can be implemented by a new protocol or extending an existing protocol. The SAV-specific information communication mechanism needs to define the data structure or format to communicate the SAV-specific messages and the operations and timing for originating, processing, propagating, and terminating the messages. If an extension to an existing protocol is used to exchange SAV-specific information, the corresponding existing protocol should not be affected. The SAVNET agent is the entity to support the SAV-specific communication mechanism. By parsing the SAV-specific messages, it obtains the prefixes and their incoming AS direction for maintaining the SIB. It is important to note that the SAVNET agent within an AS has the capability to establish connections with multiple SAVNET agents within different ASes, relying on either manual configurations by operators or an automatic mechanism. In addition, SAVNET agents should validate the authenticity of the connection for communicating the SAV-specific information to verify whether the SAV-specific information is provided over a secure connection with an authenticated AS.</t>
        <t>The need for a SAV-specific communication mechanism arises from the facts that the SAV-specific information needs to be obtained and communicated between ASes. Different from the general information such as routing information from the RIB, there are no existing mechanism which can support the perception and communication of SAV-specific information between ASes. Hence, a SAV-specific communication mechanism is needed to provide a medium and set of rules to establish communication between different ASes for the exchange of SAV-specific information.</t>
        <t>Furthermore, an AS needs to assemble its source prefixes into the SAV-specific messages. In order to obtain all the source prefixes of an AS, the inter-domain SAVNET architecture can communicate with the intra-domain SAVNET architecture <xref target="intra-domain-arch"/> to obtain all the prefixes belonging to an AS.</t>
        <t>The preferred AS paths of an AS may change over time due to route changes or network failures. The SAVNET agent should launch SAV-specific messages to adapt to the route changes in a timely manner. The SAV-specific information communication mechanism should handle route changes carefully to avoid improper blocks. The reasons for leading to improper blocks may include late detection of route changes, delayed message transmission, or packet losses. However, the detailed design of SAV-specific information communication mechanism for dealing with route changes is outside the scope of this document.</t>
      </section>
      <section anchor="general-information-communication-mechanism">
        <name>General Information Communication Mechanism</name>
        <t>The general information communication mechanism is used for communicating routing information between ASes, obtaining RPKI ROA objects and ASPA objects from RPKI cache servers, and obtaining the information about ASes and their prefixes from IRR databases. The general communication mechanism can be implemented by using existing protocols for collecting the relative information, such as BGP, RTR <xref target="RFC8210"/>, and FTP <xref target="RFC959"/>.</t>
      </section>
      <section anchor="management-mechanism">
        <name>Management Mechanism</name>
        <t>The primary purpose of the management mechanism is to deliver manual configurations of network operators. Examples of the management configurations include, but are not limited to:</t>
        <ul spacing="normal">
          <li>
            <t>SAVNET configurations using YANG, CLI, RTBH, or Flowspec.</t>
          </li>
          <li>
            <t>SAVNET operation.</t>
          </li>
          <li>
            <t>Inter-domain SAVNET provisioning.</t>
          </li>
        </ul>
        <t>Note that the configuration information can be delivered at any time and requires reliable delivery for the management mechanism implementation. Additionally, the management mechanism can carry telemetry information, such as metrics pertaining to forwarding performance, the count of spoofing packets and discarded packets, provided that the inter-domain SAVNET has access to such data. It can include information regarding the prefixes associated with the spoofing traffic, as observed until the most recent time.</t>
      </section>
    </section>
    <section anchor="usecases">
      <name>Use Cases</name>
      <t>This section utilizes the sample use cases to showcase that the inter-domain SAVNET architecture can improve the validation accuracy in the scenarios of limited propagation of prefixes, hidden prefixes, reflection attacks, and direct attacks, compared to existing SAV mechanisms, which are also utilized for the gap analysis of existing inter-domain SAV mechanisms in <xref target="inter-domain-ps"/>. In the following, these use cases are discussed for SAV at customer interfaces and SAV at provider/peer interfaces, respectively.</t>
      <section anchor="sav-at-customer-interfaces">
        <name>SAV at Customer Interfaces</name>
        <t>In order to prevent the source address spoofing, operators can enable ACL-based ingress filtering, source-based RTBH filtering, and/or uRPF-based mechanisms at customer interfaces, namely Strict uRPF, FP-uRPF, VRF uRPF, or EFP-uRPF <xref target="manrs"/> <xref target="nist"/>. However, as analyzed in <xref target="inter-domain-ps"/>, uRPF-based mechanisms may lead to false positives in two inter-domain scenarios: limited propagation of prefixes and hidden prefixes, or may lead to false negatives in the scenarios of source address spoofing attacks within a customer cone, while ACL-based ingress filtering and source-based RTBH filtering need to update SAV rules in a timely manner and lead to high operational overhead. The following showcases that the inter-domain SAVNET architecture can avoid false positives and false negatives in these scenarios.</t>
        <section anchor="limited-propagation-of-prefixes">
          <name>Limited Propagation of Prefixes</name>
          <figure anchor="no-export">
            <name>Limited propagation of prefixes caused by NO_EXPORT.</name>
            <artwork><![CDATA[
                        +----------------+
                        |    AS 3(P3)    |
                        +-+/\-----+/\+/\++
                           /        \  \
                 P3[AS 3] /          \  \ P3[AS 3]
                         /            \  \
                        / (C2P)        \  \
               +----------------+       \  \
               |    AS 4(P4)    |        \  \
               ++/\+/\+/\+/\+/\++         \  \
                 /  /  |  |    \           \  \
       P2[AS 2] /  /   |  |     \           \  \
               /  /    |  |      \           \  \
              /  /     |  |       \ P5[AS 5]  \  \ P5[AS 5]
             /  /      |  |        \           \  \
            /  /(C2P)  |  |         \           \  \
+----------------+     |  |          \           \  \  
|    AS 2(P2)    |     |  | P1[AS 1]  \           \  \
+--------+/\+----+     |  | P6[AS 1]   \           \  \
           \           |  | NO_EXPORT   \           \  \
   P1[AS 1] \          |  |              \           \  \
   NO_EXPORT \         |  |               \           \  \
              \ (C2P)  |  | (C2P/P2P) (C2P)\     (C2P) \  \
           +----------------+              +----------------+
           |  AS 1(P1, P6)  |              |    AS 5(P5)    |
           +----------------+              +----------------+
]]></artwork>
          </figure>
          <t><xref target="no-export"/> presents a scenario where the limited propagation of prefixes occurs due to the NO_EXPORT community attribute. In this scenario, AS 1 is a customer of AS 2, AS 2 is a customer of AS 4, AS 4 is a customer of AS 3, and AS 5 is a customer of both AS 3 and AS 4. The relationship between AS 1 and AS 4 can be either customer-to-provider (C2P) or peer-to-peer (P2P). AS 1 advertises prefixes P1 to AS 2 and adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 2, preventing AS 2 from further propagating the route for prefix P1 to AS 4. Similarly, AS 1 adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 4, resulting in AS 4 not propagating the route for prefix P6 to AS 3. Consequently, AS 4 only learns the route for prefix P1 from AS 1 in this scenario. Suppose AS 1 and AS 4 have deployed inter-domain SAV while other ASes have not, and AS 4 has deployed EFP-uRPF at its customer interfaces.</t>
          <t>In this scenario, existing uRPF-based SAV mechanisms would block the traffic with P1 as source addresses improperly, and thus suffer from the problem of false positives <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P1 as source addresses can arrive at the interfaces facing AS 1 and AS 2. As a result, the false positive problem can be avoided.</t>
        </section>
        <section anchor="hidden-prefixes">
          <name>Hidden Prefixes</name>
          <figure anchor="dsr">
            <name>A Direct Server Return (DSR) scenario.</name>
            <artwork><![CDATA[
                             +----------------+
             Anycast Server+-+    AS 3(P3)    |
                             +-+/\-----+/\+/\++
                                /        \  \
                      P3[AS 3] /          \  \ P3[AS 3]
                              /            \  \
                             / (C2P)        \  \
                     +----------------+      \  \
                     |    AS 4(P4)    |       \  \
                     ++/\+/\+/\+/\+/\++        \  \
        P6[AS 1, AS 2] /  /  |  |   \           \  \
             P2[AS 2] /  /   |  |    \           \  \
                     /  /    |  |     \           \  \
                    /  /     |  |      \ P5[AS 5]  \  \ P5[AS 5]
                   /  /      |  |       \           \  \
                  /  /(C2P)  |  |        \           \  \
      +----------------+     |  |         \           \  \  
User+-+    AS 2(P2)    |     |  | P1[AS 1] \           \  \
      +--------+/\+----+     |  | P6[AS 1]  \           \  \
        P6[AS 1] \           |  | NO_EXPORT  \           \  \
         P1[AS 1] \          |  |             \           \  \
         NO_EXPORT \         |  |              \           \  \
                    \ (C2P)  |  | (C2P)   (C2P) \     (C2P) \  \
                 +----------------+            +----------------+
    Edge Server+-+  AS 1(P1, P6)  |            |    AS 5(P5)    |
                 +----------------+            +----------------+
P3 is the anycast prefix and is only advertised by AS 3 through BGP.
]]></artwork>
          </figure>
          <t><xref target="dsr"/> illustrates a direct server return (DSR) scenario where the anycast IP prefix P3 is only advertised by AS 3 through BGP. In this example, AS 3 is the provider of AS 4 and AS 5, AS 4 is the provider of AS 1, AS 2, and AS 5, and AS 2 is the provider of AS 1. AS 1 and AS 4 have deployed inter-domain SAV, while other ASes have not. When users in AS 2 send requests to the anycast destination IP, the forwarding path is AS 2-&gt;AS 4-&gt;AS 3. The anycast servers in AS 3 receive the requests and tunnel them to the edge servers in AS 1. Finally, the edge servers send the content to the users with source addresses in prefix P3. The reverse forwarding path is AS 1-&gt;AS 4-&gt;AS 2.</t>
          <t>In this scenario, existing uRPF-based mechanisms will improperly block the legitimate response packets from AS 1 at the customer interface of AS 4 facing AS 1 <xref target="inter-domain-ps"/>. In contrast, if the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P3 as source addresses can arrive at the interfaces facing AS 1 and AS 3. As a result, the legitimate response packets with P3 as source addresses from AS 1 can be allowed and the false positive problem can be avoided.</t>
        </section>
        <section anchor="reflection_attack_customer">
          <name>Reflection Attacks</name>
          <figure anchor="customer-reflection-attack">
            <name>A scenario of reflection attacks by source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                   +----------------+
                                   |    AS 3(P3)    |
                                   +-+/\-----+/\+/\++
                                         /     \  \
                                        /       \  \
                                       /         \  \
                                      / (C2P)     \  \
                             +----------------+    \  \
                             |    AS 4(P4)    |     \  \
                             ++/\+/\+/\+/\+/\++      \  \
                P6[AS 1, AS 2] /  /  |  |    \        \  \
                     P2[AS 2] /  /   |  |     \        \  \
                             /  /    |  |      \        \  \
                            /  /     |  |       \P5[AS 5]\  \ P5[AS 5]
                           /  /      |  |        \        \  \
                          /  /(C2P)  |  |         \        \  \
              +----------------+     |  |          \        \  \  
Attacker(P1')-+    AS 2(P2)    |     |  | P1[AS 1]  \        \  \
              +--------+/\+----+     |  | P6[AS 1]   \        \  \
                P6[AS 1] \           |  | NO_EXPORT   \        \  \
                 P1[AS 1] \          |  |              \        \  \
                 NO_EXPORT \         |  |               \        \  \
                            \ (C2P)  |  | (C2P) (C2P)    \  (C2P) \  \
                         +----------------+           +----------------+
                 Victim+-+  AS 1(P1, P6)  |   Server+-+    AS 5(P5)    |
                         +----------------+           +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="customer-reflection-attack"/> depicts the scenario of reflection attacks by source address spoofing within a customer cone. The reflection attack by source address spoofing takes place within AS 4's customer cone, where the attacker spoofs the victim's IP address (P1) and sends requests to servers' IP address (P5) that are designed to respond to such requests. As a result, the server sends overwhelming responses back to the victim, thereby exhausting its network resources. The arrows in <xref target="customer-reflection-attack"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>In this scenario, EFP-uRPF with algorithm A/B will improperly permit the spoofing attacks originating from AS 2 <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P1 as source addresses can only arrive at the interface facing AS 1. Therefore, at the interface of AS 4 facing AS 2, the spoofing traffic can be blocked.</t>
        </section>
        <section anchor="direct_attack_customer">
          <name>Direct Attacks</name>
          <figure anchor="customer-direct-attack">
            <name>A scenario of the direct attacks by source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                   +----------------+
                                   |    AS 3(P3)    |
                                   +-+/\-----+/\+/\++
                                      |        \  \
                                      |         \  \
                                      |          \  \
                                      | (C2P)     \  \
                             +----------------+    \  \
                             |    AS 4(P4)    |     \  \
                             ++/\+/\+/\+/\+/\++      \  \
                P6[AS 1, AS 2] /  /  |  |   \         \  \
                     P2[AS 2] /  /   |  |    \         \  \
                             /  /    |  |     \         \  \
                            /  /     |  |      \P5[AS 5] \  \ P5[AS 5]
                           /  /      |  |       \         \  \
                          /  /(C2P)  |  |        \         \  \
              +----------------+     |  |         \         \  \  
Attacker(P5')-+    AS 2(P2)    |     |  | P1[AS 1] \         \  \
              +--------+/\+----+     |  | P6[AS 1]  \         \  \
                P6[AS 1] \           |  | NO_EXPORT  \         \  \
                 P1[AS 1] \          |  |             \         \  \
                 NO_EXPORT \         |  |              \         \  \
                            \ (C2P)  |  | (C2P)   (C2P) \   (C2P) \  \
                         +----------------+           +----------------+
                 Victim+-+  AS 1(P1, P6)  |           |    AS 5(P5)    |
                         +----------------+           +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="customer-direct-attack"/> portrays a scenario of direct attacks by source address spoofing within a customer cone and is used to analyze the gaps of uRPF-based mechanisms below. The direct attack by source address spoofing takes place within AS 4's customer cone, where the attacker spoofs a source address (P5) and directly targets the victim's IP address (P1), overwhelming its network resources. The arrows in <xref target="customer-direct-attack"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>In this scenario, EFP-uRPF with algorithm A/B will improperly permit the spoofing attacks <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 5 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P5 as source addresses can arrive at the interface facing AS 3 and AS 5. Therefore, at the interface of AS 4 facing AS 2, the spoofing traffic can be blocked.</t>
        </section>
      </section>
      <section anchor="sav_at_p">
        <name>SAV at Provider/Peer Interfaces</name>
        <t>In order to prevent packets with spoofed source addresses from the provider/peer AS, ACL-based ingress filtering, Loose uRPF, and/or source-based RTBH filtering can be deployed <xref target="nist"/>. <xref target="inter-domain-ps"/> exposes the limitations of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF for SAV at provider/peer interfaces in scenarios of source address spoofing attacks from provider/peer AS. The source address spoofing attacks from provider/peer AS include reflection attacks from provider/peer AS and direct attacks from provider/peer AS. The following showcases that the inter-domain SAVNET architecture can avoid false negatives in these scenarios.</t>
        <section anchor="reflect_attack_p">
          <name>Reflection Attacks</name>
          <figure anchor="reflection-attack-p">
            <name>A scenario of reflection attacks by source address spoofing from provider/peer AS.</name>
            <artwork><![CDATA[
                               +----------------+
                Attacker(P1')+-+    AS 3(P3)    |
                               +-+/\-----+/\+/\++
                                  /        \  \
                                 /          \  \
                                /            \  \
                               / (C2P/P2P)    \  \
                       +----------------+      \  \
                       |    AS 4(P4)    |       \  \
                       ++/\+/\+/\+/\+/\++        \  \
          P6[AS 1, AS 2] /  /  |  |    \          \  \
               P2[AS 2] /  /   |  |     \          \  \
                       /  /    |  |      \          \  \
                      /  /     |  |       \ P5[AS 5] \  \ P5[AS 5]
                     /  /      |  |        \          \  \
                    /  /(C2P)  |  |         \          \  \
        +----------------+     |  |          \          \  \
Server+-+    AS 2(P2)    |     |  | P1[AS 1]  \          \  \
        +--------+/\+----+     |  | P6[AS 1]   \          \  \
          P6[AS 1] \           |  | NO_EXPORT   \          \  \
           P1[AS 1] \          |  |              \          \  \
           NO_EXPORT \         |  |               \          \  \
                      \ (C2P)  |  | (C2P)    (C2P) \    (C2P) \  \
                   +----------------+             +----------------+
           Victim+-+  AS 1(P1, P6)  |             |    AS 5(P5)    |
                   +----------------+             +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="reflection-attack-p"/> depicts the scenario of reflection attacks by source address spoofing from provider/peer AS. In this case, the attacker spoofs the victim's IP address (P1) and sends requests to servers' IP address (P2) that respond to such requests. The servers then send overwhelming responses back to the victim, exhausting its network resources. The arrows in <xref target="reflection-attack-p"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>Both ACL-based ingress filtering and source-based RTBH filtering will induce additional operational overhead, and Loose uRPF may improperly permit spoofed packets <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P1 as source addresses can arrive at the interface facing AS 1 and AS 2. Therefore, at the interface of AS 4 facing AS 3, the spoofing traffic can be blocked.</t>
        </section>
        <section anchor="direct_attack_p">
          <name>Direct Attacks</name>
          <figure anchor="direct-attack-p">
            <name>A scenario of direct attacks by source address spoofing from provider/peer AS.</name>
            <artwork><![CDATA[
                        +----------------+
         Attacker(P2')+-+    AS 3(P3)    |
                        +-+/\-----+/\+/\++
                           /        \  \
                          /          \  \
                         /            \  \
                        / (C2P/P2P)    \  \
               +----------------+       \  \
               |    AS 4(P4)    |        \  \
               ++/\+/\+/\+/\+/\++         \  \
  P6[AS 1, AS 2] /  /  |  |    \           \  \
       P2[AS 2] /  /   |  |     \           \  \
               /  /    |  |      \           \  \
              /  /     |  |       \ P5[AS 5]  \  \ P5[AS 5]
             /  /      |  |        \           \  \
            /  /(C2P)  |  |         \           \  \
+----------------+     |  |          \           \  \
|    AS 2(P2)    |     |  | P1[AS 1]  \           \  \
+--------+/\+----+     |  | P6[AS 1]   \           \  \
  P6[AS 1] \           |  | NO_EXPORT   \           \  \
   P1[AS 1] \          |  |              \           \  \
   NO_EXPORT \         |  |               \           \  \
              \ (C2P)  |  | (C2P)    (C2P) \     (C2P) \  \
           +----------------+              +----------------+
   Victim+-+  AS 1(P1, P6)  |              |    AS 5(P5)    |
           +----------------+              +----------------+
P2' is the spoofed source prefix P2 by the attacker which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="direct-attack-p"/> showcases a scenario of direct attack by source address spoofing from provider/peer AS. In this case, the attacker spoofs another source address (P2) and directly targets the victim's IP address (P1), overwhelming its network resources. The arrows in <xref target="direct-attack-p"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>Also, in this scenario, both ACL-based ingress filtering and source-based RTBH filtering will induce additional operational overhead, and Loose uRPF may improperly permit spoofed packets <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 2 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P2 as source addresses can only arrive at the interface facing AS 2. Therefore, at the interface of AS 4 facing AS 3, the spoofing traffic can be blocked.</t>
        </section>
      </section>
    </section>
    <section anchor="partialincremental-deployment-considerations">
      <name>Partial/Incremental Deployment Considerations</name>
      <t>The inter-domain SAVNET architecture <bcp14>MUST</bcp14> ensure support for partial/incremental deployment as it is not feasible to deploy it simultaneously in all ASes. The partial/incremental deployment of the inter-domain SAVNET architecture consists of different aspects, which include the partial/incremental deployment of the architecture and the partial/incremental deployment of the information sources.</t>
      <t>Within the architecture, the general information like the prefixes and topological information from RPKI ROA Objects and ASPA Objects and the routing information from the RIB can be obtained locally when the corresponding sources are available. Even when both SAV-specific Information and the information from RPKI ROA Objects and ASPA Objects are not available, the routing information from the RIB can be used to generate SAV rules.</t>
      <t>Furthermore, it is not mandatory for all ASes to deploy SAVNET agents for SAV-specific Information. Instead, a SAVNET agent should be able to effortlessly establish a logical neighboring relationship with another AS that has deployed a SAVNET agent. The connections for communicating SAV-specific Information can be achieved by manual configurations set by operators or an automatic neighbor discovery mechanism. This flexibility enables the architecture to accommodate varying degrees of deployment, promoting interoperability and collaboration among participating ASes. During the partial/incremental deployment of SAVNET agent, the SAV-specific Information for the ASes which do not deploy SAVNET agent can not be obtained. To protect the prefixes of these ASes, inter-domain SAVNET architecture can use the SAV-related information from the general information in the SIB to generate SAV rules. At least, the routing information from the RIB can be always available in the SIB.</t>
      <t>As more ASes adopt the inter-domain SAVNET architecture, the "deployed area" expands, thereby increasing the collective defense capability against source address spoofing. Furthermore, if multiple "deployed areas" can be logically interconnected across "non-deployed areas", these interconnected "deployed areas" can form a logical alliance, providing enhanced protection against address spoofing. Especially, along with more ASes deploy SAVNET agent and support the communication of SAV-specific information, the generated SAV rules of the inter-domain SAVNET architecture to protect these ASes will become more accurate, as well as enhancing the protection capability against source address spoofing for the inter-domain SAVNET architecture.</t>
      <t>In addition, releasing the SAV functions of the inter-domain SAVNET architecture incrementally is one potential way to reduce the deployment risks and can be considered in its deployment by network operators:</t>
      <ul spacing="normal">
        <li>
          <t>First, the inter-domain SAVNET can only do the measurement in the data plane and do not take any other actions. Based on the measurement data, the operators can evaluate the effect of the inter-domain SAVNET on the legitimate traffic, including validation accuracy and forwarding performance, as well as the operational overhead.</t>
        </li>
        <li>
          <t>Second, the inter-domain SAVNET can open the function to limit the rate of the traffic that is justified as spoofing traffic. The operators can further evaluate the effect of the inter-domain SAVNET on the legitimate traffic and spoofing traffic, such as limiting the rate of all the spoofing traffic without hurting the legitimate traffic.</t>
        </li>
        <li>
          <t>Third, when the validation accuracy, forwarding performance, and operational overhead have been verified on a large scale by the live network, the inter-domain SAVNET can open the function to directly block the spoofing traffic that is justified by the SAV table in the data plane.</t>
        </li>
      </ul>
    </section>
    <section anchor="convergence-considerations">
      <name>Convergence Considerations</name>
      <t>Convergence issues <bcp14>SHOULD</bcp14> be carefully considered in inter-domain SAV mechanisms due to the dynamic nature of the Internet. Internet routes undergo continuous changes, and SAV rules <bcp14>MUST</bcp14> proactively adapt to these changes, such as prefix and topology changes, in order to prevent false positives and reduce false negatives. To effectively track these changes, the SIM should promptly collect SAV-related information from various SAV information sources and consolidate them in a timely manner.</t>
      <t>In particular, it is essential for the SAVNET agents to proactively communicate the changes of the SAV-specific Information between ASes and adapt to route changes promptly. However, during the routing convergence process, the traffic paths of the source prefixes can undergo rapid changes within a short period. The changes of the SAV-specific Information may not be communicated in time between ASes to update SAV rules, false positives or false negatives may happen. Such inaccurate validation is caused by the delays in communicating SAV-specific Information between ASes, which occur due to the factors like packet losses, unpredictable network latencies, or message processing latencies. The design of the SAV-specific communication mechanism should consider these issues to reduce the inaccurate validation.</t>
      <t>Besides, for the inter-domain SAVNET architecture, the potential ways to deal with the inaccurate validation issues during the convergence of the SAV-specific communication mechanism is to consider using the information from RPKI ROA objects and ASPA objects to generate SAV rules until the convergence process of the SAV-specific communication mechanism is finished, since these information is more stable and can help avoid false positives, and thus avoiding the impact to the legitimate traffic.</t>
    </section>
    <section anchor="manageability-considerations">
      <name>Manageability Considerations</name>
      <t>It is crucial to consider the operations and management aspects of SAV information sources, the SAV-specific communication mechanism, SIB, SIM, and SAV table in the inter-domain SAVNET architecture. The following guidelines should be followed for their effective management:</t>
      <t>First, management interoperability should be supported across devices from different vendors or different releases of the same product, based on a unified data model such as YANG <xref target="RFC6020"/>. This is essential because the Internet comprises devices from various vendors and different product releases that coexist simultaneously.</t>
      <t>Second, scalable operation and management methods such as NETCONF <xref target="RFC6241"/> and syslog protocol <xref target="RFC5424"/> should be supported. This is important as an AS may have hundreds or thousands of border routers that require efficient operation and management.</t>
      <t>Third, management operations, including default initial configuration, alarm and exception reporting, logging, performance monitoring and reporting for the control plane and data plane, as well as debugging, should be designed and implemented in the protocols or protocol extensions. These operations can be performed either locally or remotely, based on the operational requirements.</t>
      <t>By adhering to these rules, the management of SAV information sources and related components can be effectively carried out, ensuring interoperability, scalability, and efficient operations and management of the inter-domain SAVNET architecture.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>In the inter-domain SAVNET architecture, the SAVNET agent plays a crucial role in generating and disseminating SAV-specific messages across different ASes. To safeguard against the potential risks posed by a malicious AS generating incorrect or forged SAV-specific messages, it is important for the SAVNET agents to employ security authentication measures for each received SAV-specific Message. The majour security threats faced by inter-domain SAVNET can be categorized into two aspects: session security and content security. Session security pertains to verifying the identities of both parties involved in a session and ensuring the integrity of the session content. Content security, on the other hand, focuses on verifying the authenticity and reliability of the session content, thereby enabling the identification of forged SAV-specific Messages.</t>
      <t>The threats to session security include:</t>
      <ul spacing="normal">
        <li>
          <t>Session identity impersonation: This occurs when a malicious router deceitfully poses as a legitimate peer router to establish a session with the targeted router. By impersonating another router, the malicious entity can gain unauthorized access and potentially manipulate or disrupt the communication between the legitimate routers.</t>
        </li>
        <li>
          <t>Session integrity destruction: In this scenario, a malicious intermediate router situated between two peering routers intentionally tampers with or destroys the content of the relayed SAV-specific Message. By interfering with the integrity of the session content, the attacker can disrupt the reliable transmission of information, potentially leading to miscommunication or inaccurate SAV-related data being propagated.</t>
        </li>
      </ul>
      <t>The threats to content security include:</t>
      <ul spacing="normal">
        <li>
          <t>Message alteration: A malicious router has the ability to manipulate or forge any portion of a SAV-specific message. For example, the attacker may employ techniques such as using a spoofed Autonomous System Number (ASN) or modifying the AS Path information within the message. By tampering with the content, the attacker can potentially introduce inaccuracies or deceive the receiving ASes, compromising the integrity and reliability of the SAV-related information.</t>
        </li>
        <li>
          <t>Message injection: A malicious router injects a seemingly "legitimate" SAV-specific message into the communication stream and directs it to the corresponding next-hop AS. This type of attack can be likened to a replay attack, where the attacker attempts to retransmit previously captured or fabricated messages to manipulate the behavior or decisions of the receiving ASes. The injected message may contain malicious instructions or false information, leading to incorrect SAV rule generation or improper validation.</t>
        </li>
        <li>
          <t>Path deviation: A malicious router intentionally diverts a SAV-specific Message to an incorrect next-hop AS, contrary to the expected path defined by the AS Path. By deviating from the intended routing path, the attacker can disrupt the proper dissemination of SAV-related information and introduce inconsistencies or conflicts in the validation process. This can undermine the effectiveness and accuracy of source address validation within the inter-domain SAVNET architecture.</t>
        </li>
      </ul>
      <t>Overall, inter-domain SAVNET shares similar security threats with BGP and can leverage existing BGP security mechanisms to enhance both session and content security. Session security can be enhanced by employing session authentication mechanisms used in BGP. Similarly, content security can benefit from the deployment of existing BGP security mechanisms like RPKI, BGPsec, and ASPA. While these mechanisms can address content security threats, their widespread deployment is crucial. Until then, it is necessary to develop an independent security mechanism specifically designed for inter-domain SAVNET. One potential approach is for each origin AS to calculate a digital signature for each AS path and include these digital signatures within the SAV-specific messages. Upon receiving a SAV-specific Message, the SAVNET agent can verify the digital signature to ascertain the message's authenticity. Furthermore, it is worth noting that the information channel of the inter-domain SAVNET architecture may need to operate over a network link that is currently under a source address spoofing attack. As a result, it may experience severe packet loss and high latency due to the ongoing attack, and the implementation of the information channel should ensure uninterrupted communication. Detailed security designs and considerations will be addressed in a separate draft, ensuring the robust security of inter-domain SAVNET.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
    <section anchor="scope-and-assumptions">
      <name>Scope and Assumptions</name>
      <t>In this architecture, the choice of protocols used for communication between the SIM and different SAV information sources is not limited. The inter-domain SAVNET architecture presents considerations on how to consolidate SAV-related information from various sources to generate SAV rules and perform SAV using the SAV table in the dataplane. The detailed design and implementation for SAV rule generation and SAV execution depend on the specific inter-domain SAV mechanisms employed.</t>
      <t>This document does not cover administrative or business agreements that may be established between the involved inter-domain SAVNET parties. These considerations are beyond the scope of this document. However, it is assumed that authentication and authorization mechanisms can be implemented to ensure that only authorized ASes can communicate SAV-related information.</t>
      <t>This document makes the following assumptions:</t>
      <ul spacing="normal">
        <li>
          <t>All ASes where the inter-domain SAVNET is deployed are assumed to provide the necessary connectivity between SAVNET agent and any intermediate network elements. However, the architecture does not impose any specific limitations on the form or nature of this connectivity.</t>
        </li>
        <li>
          <t>Congestion and resource exhaustion can occur at various points in the inter-domain networks. Hence, in general, network conditions should be assumed to be hostile. The inter-domain SAVNET architecture must be capable of functioning reliably under all circumstances, including scenarios where the paths for delivering SAV-related information are severely impaired. It is crucial to design the inter-domain SAVNET system with a high level of resilience, particularly under extremely hostile network conditions. The architecture should ensure uninterrupted communication between inter-domain SAVNET agents, even when data-plane traffic saturates the link.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture does not impose rigid requirements for the SAV information sources that can be used to generate SAV rules. Similarly, it does not dictate strict rules on how to utilize the SAV-related information from diverse sources or perform SAV in the dataplane. Network operators have the flexibility to choose their approaches to generate SAV rules and perform SAV based on their specific requirements and preferences. Operators can either follow the recommendations outlined in the inter-domain SAVNET architecture or manually specify the rules for governing the use of SAV-related information, the generation of SAV rules, and the execution of SAV in the dataplane.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture does not impose restrictions on the selection of the local AS with which AS to communicate SAV-specific Information. The ASes have the flexibility to establish connections for SAV-specific communication based on the manual configurations set by operators or other automatic mechanisms.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture provides the flexibility to accommodate Quality-of-Service (QoS) policy agreements between SAVNET-enabled ASes or local QoS prioritization measures, but it does not make assumptions about their presence. These agreements or prioritization efforts are aimed at ensuring the reliable delivery of SAV-specific Information between SAVNET agents. It is important to note that QoS is considered as an operational consideration rather than a functional component of the inter-domain SAVNET architecture.</t>
        </li>
        <li>
          <t>The SAVNET communication mechanisms are loosely coupled and are used for communicating or gathering SAV-related information, and how the inter-domain SAVNET synchronizes the management and operation configurations is out of scope of this document.</t>
        </li>
      </ul>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Igor Lubashev<br/>
  Akamai Technologies<br/>
  145 Broadway<br/>
  Cambridge, MA, 02142<br/>
  United States of America<br/>
  Email: ilubashe@akamai.com</t>
      <t>Many thanks to Igor Lubashev for the significantly helpful revision suggestions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC5424">
          <front>
            <title>The Syslog Protocol</title>
            <author fullname="R. Gerhards" initials="R." surname="Gerhards"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way.</t>
              <t>This document has been written with the original design goals for traditional syslog in mind. The need for a new layered specification has arisen because standardization efforts for reliable and secure syslog extensions suffer from the lack of a Standards-Track and transport-independent RFC. Without this document, each other standard needs to define its own syslog packet format and transport mechanism, which over time will introduce subtle compatibility issues. This document tries to provide a foundation that syslog extensions can build on. This layered architecture approach also provides a solid basis that allows code to be written once for each syslog feature rather than once for each transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5424"/>
          <seriesInfo name="DOI" value="10.17487/RFC5424"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="inter-domain-ps" target="https://datatracker.ietf.org/doc/draft-ietf-savnet-inter-domain-problem-statement/">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="intra-domain-arch" target="https://datatracker.ietf.org/doc/draft-li-savnet-intra-domain-architecture/">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="RFC5635">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC8955">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8210">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="RFC959">
          <front>
            <title>File Transfer Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <author fullname="J. Reynolds" initials="J." surname="Reynolds"/>
            <date month="October" year="1985"/>
            <abstract>
              <t>This memo is the official specification of the File Transfer Protocol (FTP) for the DARPA Internet community. The primary intent is to clarify and correct the documentation of the FTP specification, not to change the protocol. The following new optional commands are included in this edition of the specification: Change to Parent Directory (CDUP), Structure Mount (SMNT), Store Unique (STOU), Remove Directory (RMD), Make Directory (MKD), Print Directory (PWD), and System (SYST). Note that this specification is compatible with the previous edition.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="9"/>
          <seriesInfo name="RFC" value="959"/>
          <seriesInfo name="DOI" value="10.17487/RFC0959"/>
        </reference>
        <reference anchor="manrs" target="https://www.manrs.org/netops/guide/antispoofing/">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="nist" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation">
          <front>
            <title>Resilient Interdomain Traffic Exchange: BGP Security and DDos Mitigation</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="rpki-time-of-flight" target="https://dl.acm.org/doi/10.1007/978-3-031-28486-1_18">
          <front>
            <title>RPKI Time-of-Flight&amp;#58; Tracking Delays in the Management, Control, and Data Planes</title>
            <author>
              <organization>ISOC</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="sav-table" target="https://datatracker.ietf.org/doc/draft-huang-savnet-sav-table/">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 847?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Alvaro Retana, Kotikalapudi Sriram, Rüdiger Volk, Xueyan Song, Ben Maddison, Jared Mauch, Joel Halpern, Aijun Wang, Jeffrey Haas, Xiangqing Chang, Changwang Lin, Mingxing Liu, Zhen Tan, Yuanyuan Zhang, Yangyang Wang, Antoin Verschuren etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
