<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wu-savnet-inter-domain-architecture-09" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="Inter-domain SAVNET Architecture">Inter-domain Source Address Validation (SAVNET) Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-09"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 101?>

<t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV-specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
    </abstract>
  </front>
  <middle>
    <?line 105?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Attacks based on source IP address spoofing, such as reflective DDoS and flooding attacks, continue to present significant challenges to Internet security. Mitigating these attacks in inter-domain networks requires effective source address validation (SAV). While BCP84 <xref target="RFC3704"/> <xref target="RFC8704"/> offers some SAV solutions, such as ACL-based ingress filtering and uRPF-based mechanisms, existing inter-domain SAV mechanisms have limitations in terms of validation accuracy and operational overhead in different scenarios <xref target="inter-domain-ps"/>.</t>
      <t>There are various existing general information from different sources including RPKI ROA objects and ASPA objects, RIB, FIB, and Internet Routing Registry (IRR) data, which can be used for inter-domain SAV. Generating SAV rules based on general information, however, cannot well satisfy the requirements for new inter-domain SAV mechanisms proposed in <xref target="inter-domain-ps"/>. As analyzed in <xref target="savinfo-sec"/>, general information from RPKI ROA objects and ASPA objects can be used to infer the prefixes and their permissible incoming directions yet cannot be updated in a timely manner to adapt to the prefix or route changes, and the local routing information, which represents the general information from RIB or FIB, cannot deal with the asymmetric routing scenarios and may lead to improper blocks or improper permits, while IRR data do not update in a timely manner either and are not always accurate.</t>
      <t>Consequently, to address these issues, the inter-domain SAVNET architecture focuses on providing a comprehensive framework and guidelines for the design and implementation of new inter-domain SAV mechanisms. Inter-domain SAVNET architecture proposes SAV-specific information and uses it to generate SAV rules. SAV-specific information consists of prefixes and their corresponding legitimate incoming direction to enter an AS. Inter-domain SAVNET architecture can use it to generate more accurate SAV rules. In order to gather the SAV-specific information, a SAV-specific information communication mechanism would be developed for origination, processing, propagation, and termination of the messages which carry the SAV-specific information, and it can be implemented by a new protocol or extending an existing protocol. When the prefixes or routes change, it can update the SAV-specific information automatically in a timely manner. Also, the inter-domain SAVNET architecture will communicate the SAV-specific information over a secure connection between authenticated ASes.</t>
      <t>Moreover, during the incremental/partial deployment period of the SAV-specific information, the inter-domain SAVNET architecture can leverage the general information to generate SAV rules, if the SAV-specific information of an AS is unavailable. Multiple information sources may exist concurrently, to determine the one used for generating SAV rules, the inter-domain SAVNET architecture assigns priorities to the SAV-specific information and different general information and generates SAV rules using the SAV-related information with the highest-priority. SAV-specific information has the highest priority and the priorities of RPKI ROA objects and ASPA objects, RIB, FIB, and IRR data decrease in turn.</t>
      <figure anchor="exp-inter-sav">
        <name>An example for illustrating the incentive of deploying inter-domain SAVNET architecture.</name>
        <artwork><![CDATA[
+-----------+
| AS 1 (P1) #
+-----------+ \
               \           Spoofed Packets
             +-+#+-------+ with Source Addresses in P1 +-----------+
             |    AS 2   #-----------------------------#   AS 4    |
             +-+#+-------+                             +-----------+
               / 
+-----------+ /
|   AS 3    #
+-----------+
AS 4 sends spoofed packets with source addresses in P1 to AS 3 
through AS 2.
If AS 1 and AS 2 deploy inter-domain SAV, the spoofed packets 
can be blocked at AS 2.
]]></artwork>
      </figure>
      <t>The inter-domain SAVNET architecture provides the incentive to deploy inter-domain SAV for operators. <xref target="exp-inter-sav"/> illustrates this using an example. P1 is the source prefix of AS 1, and AS 4 sends spoofing packets with P1 as source addresses to AS 3 through AS 2. Assume AS 4 does not deploy intra-domain SAV, these spoofing packets cannot be blocked by AS 4. Although AS 1 can deploy intra-domain SAV to block incoming packets which spoof the addresses of AS 1, these spoofing traffic from AS 4 to AS 3 do not go through AS 1, so they cannot be blocked by AS 1. Inter-domain SAVNET architecture can help in this scenario. If AS 1 and AS 2 deploy inter-domain SAVNET architecture, AS 2 knows that the packets with P1 as source addresses should come from AS 1, and the spoofing packets can thus be blocked by AS 2 since they come from the incorrect direction. Specifically, by proposing SAV-specific information and using it to generate SAV rules, the inter-domain SAVNET architecture gives more deployment incentive compared to existing inter-domain SAV mechanisms, which will be analyzed in <xref target="usecases"/>.</t>
      <t>In addition, this document primarily proposes a high-level architecture for describing the communication flow of SAV-specific information and general information, guiding how to utilize the SAV-specific information and general information for generating SAV rules and deploy an inter-domain SAV mechanism between ASes. This document does not specify protocol extensions or implementations. Its purpose is to provide a conceptual framework and guidance for the design and development of inter-domain SAV mechanisms, allowing implementers to adapt and implement the architecture based on their specific requirements and network environments.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV Rule:</dt>
        <dd>
          <t>The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        </dd>
        <dt>SAV Table:</dt>
        <dd>
          <t>The table or data structure that implements the SAV rules and is used for performing source address validation on the data plane.</t>
        </dd>
        <dt>SAV-specific Information:</dt>
        <dd>
          <t>The information that is specialized for SAV rule generation, includes the source prefixes and their legitimate incoming directions to enter an AS, and is gathered by the communication between ASes with the SAV-specific information communication mechanism.</t>
        </dd>
        <dt>SAV-specific Information Communication Mechanism:</dt>
        <dd>
          <t>The mechanism that is used to communicate SAV-specific information between ASes and can be implemented by a new protocol or an extension to an existing protocol.</t>
        </dd>
        <dt>Local Routing Information:</dt>
        <dd>
          <t>The information that is stored in ASBR's local RIB or FIB and can be used to generate SAV rules in addition to the routing purpose.</t>
        </dd>
        <dt>General Information:</dt>
        <dd>
          <t>The information that is not specialized for SAV but can be utilized to generate SAV rules, and is initially utilized for other purposes. Currently, the general information consists of the information from RPKI ROA objects and ASPA objects, local routing information, and the one from IRR data.</t>
        </dd>
        <dt>SAV-related Information:</dt>
        <dd>
          <t>The information that can be used to generate SAV rules and includes SAV-specific information and general information.</t>
        </dd>
        <dt>SAVNET Agent:</dt>
        <dd>
          <t>The agent within a SAVNET-adopting AS that is responsible for gathering SAV-related information and utilizing it to generate SAV rules.</t>
        </dd>
        <dt>SAV Information Base:</dt>
        <dd>
          <t>SAV information base is a table or data structure for storing SAV-related information collected from different SAV information sources and is a component within SAVNET agent.</t>
        </dd>
        <dt>SAV Information Base Manager:</dt>
        <dd>
          <t>SAV information base manager maitains the SAV-related information in the SAV information base and uses it to generate SAV rule accordingly, and is a component within SAVNET agent.</t>
        </dd>
        <dt>Improper Block:</dt>
        <dd>
          <t>The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Improper Permit:</dt>
        <dd>
          <t>The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Source AS:</dt>
        <dd>
          <t>The AS which deploys SAVNET agent and communicates its own SAV-specific information to other ASes for generating SAV rules.</t>
        </dd>
        <dt>Validation AS:</dt>
        <dd>
          <t>The AS which deploys SAVNET agent and generates SAV rules according to the received SAV-specific information from source ASes.</t>
        </dd>
      </dl>
    </section>
    <section anchor="goal-sec">
      <name>Design Goals</name>
      <t>The inter-domain SAVNET architecture aims to improve SAV accuracy and facilitate partial deployment with low operational overhead, while guaranteeing convergence and providing security guarantees to the communicated information, which corresponds to the requirements for new inter-domain SAV mechanisms proposed in the inter-domain SAVNET architecture draft <xref target="inter-domain-ps"/>. The overall goal can be broken down into the following aspects:</t>
      <ul spacing="normal">
        <li>
          <t><strong>G1</strong>: The inter-domain SAVNET architecture should learn the real paths of source prefixes to any destination prefixes or permissible paths that can cover their real paths, and generate accurate SAV rules automatically based on the learned information to avoid improper blocks and reduce improper permits as much as possible.</t>
        </li>
        <li>
          <t><strong>G2</strong>: The inter-domain SAVNET architecture should provide sufficient protection for the source prefixes of ASes that deploy it, even if only a portion of the Internet does the deployment.</t>
        </li>
        <li>
          <t><strong>G3</strong>: The inter-domain SAVNET architecture should adapt to dynamic networks and asymmetric routing scenarios automatically.</t>
        </li>
        <li>
          <t><strong>G4</strong>: The inter-domain SAVNET architecture should promptly detect the network changes and launch the convergence process in a timely manner, while reducing improper blocks and improper permits during the convergence process.</t>
        </li>
        <li>
          <t><strong>G5</strong>: The inter-domain SAVNET architecture should provide security guarantees for the communicated SAV-specific information.</t>
        </li>
      </ul>
      <t>Other design goals, such as low operational overhead and easy implementation, are also very important and should be considered in specific protocols or protocol extensions.</t>
    </section>
    <section anchor="inter-domain-savnet-architecture-overview">
      <name>Inter-domain SAVNET Architecture Overview</name>
      <figure anchor="expcase">
        <name>Inter-domain SAVNET architecture.</name>
        <artwork><![CDATA[
 +~~~~~~~~~~~~~~~~~~~~~~~~+       +--------------------+
 |RPKI Cache Server/IRR DB|       | AS X's Provider AS |
 +~~~~~~~~~~~~~~~~~~~~~~~~+       +------------+/\+/\+-+
   ROA & ASPA |                 BGP /            |  |
Obj./IRR Data |            Message /             |  |
              |                   /              |  | BGP
+-----------+\/+----------------+\/+-+           |  | Message
|                AS X                |  BGP  +--------------+
| +--------------------------------+ |<------|AS X's Lateral|          
| |          SAVNET Agent          | |Message|   Peer  AS   |
| +--------------------------------+ |       +--------------+
+-----+/\+/\+----------------+/\+/\+-+
        |  |                   |  |
    BGP |  | SAV-specific      |  |
Message |  | Message           |  |
+------------------+           |  |
|AS X's Customer AS|           |  |
+-------+/\+-------+           |  |
          \                    |  |
       BGP \  SAV-specific     |  | BGP
    Message \ Message          |  | Message
    +------------------------------------+
    |          AS X's Customer AS        |
    | +--------------------------------+ |
    | |         SAVNET Agent           | |
    | +--------------------------------+ |
    +------------------------------------+
AS X and one of its customer ASes have deployed SAVNET agent
and can exchange SAV-specific information with each other.
]]></artwork>
      </figure>
      <t><xref target="expcase"/> provides an overview of the inter-domain SAVNET architecture, showcasing an AS topology and the flow of SAV-related information among ASes. The topology captures the full spectrum of AS relationships in the Internet, displaying all peer ASes of AS X including customers, lateral peers, and providers and the existence of multiple physical links between ASes. Arrows in the figure indicate the direction of the corresponding SAV-related information from its source to AS X, such as gathering RPKI ROA objects and ASPA objects from RPKI cache server. The inter-domain SAVNET architecture conveys the SAV-related information through various mediums such as SAV-specific messages, BGP messages, RTR messages, and FTP messages. Based on the SAV-related information, AS X generates SAV rules. It is also worth noting that the inter-domain SAVNET architecture discusses AS-level inter-domain SAV.</t>
      <t><xref target="expcase"/> uses AS X as the representative to illustrate that what SAV-related information the SAVNET agent within AS X will collect and where the information is from. AS X has deployed SAVNET agent and can generate SAV rules to perform inter-domain SAV by consolidating the SAV-related information. It can obtain SAV-specific information from its customer AS which deploys SAVNET agent and local routing information originating from the BGP update messages of its neighbor ASes. Also, AS X can obtain RPKI ROA objects and ASPA objects from RPKI cache server and IRR data from IRR database.</t>
      <t>The inter-domain SAVNET architecture proposes SAV-specific information, which is more accurate and trustworthy than existing general information, and can update in a timely manner. SAV-specific information consists of prefixes and their legitimate incoming directions. The SAVNET agent communicates SAV-specific information between ASes via SAV-specific messages, when prefixes or routes change, it can launch SAV-specific messages timely to update SAV-specific information. Additionally, when SAVNET agent receives SAV-specific messages, it will validate whether the SAV-specific connections for communicating SAV-specific messages are authentic connections from authenticated ASes. Therefore, when SAV-specific information of an AS is available, SAVNET agent will use it to generate SAV rules.</t>
      <t>Furthermore, if the SAV-specific information is needed to communicate between ASes, a new SAV-specific information communication mechanism would be developed to exchange the SAV-specific messages between ASes which carry the SAV-specific information. It should define the data structure or format for communicating the SAV-specific information and the operations and timing for originating, processing, propagating, and terminating the SAV-specific messages. Also, it can be implemented by a new protocol or extending an existing protocol.</t>
      <t>The SAVNET agent should launch SAV-specific messages to adapt to the route changes in a timely manner. The SAV-specific information communication mechanism should handle route changes carefully to avoid improper blocks. The reasons for leading to improper blocks may include late detection of route changes, delayed message transmission, or packet losses. During the convergence process of the SAV-specific information communication mechanism, the inter-domain SAVNET architecture can use the information from RPKI ROA objects and ASPA objects to generate SAV rules until the convergence process is finished, since these information includes topological information and is more stable, and can thus avoid improper blocks. However, the detailed design of the SAV-specific information communication mechanism for dealing with route changes is outside the scope of this document.</t>
      <t>In the incremental/partial deployment stage of the inter-domain SAVNET architecture, when the SAV-specific information of some ASes is unavailable, SAVNET agent can leverage general information to generate SAV rules. If all these general information is available, it is recommended to use RPKI ROA objects and ASPA objects to generate SAV rules. Since compared to the local routing information and IRR data, they can provide authoritative prefixes and topological information and have less improper blocks. The systematic recommendations for the utilizations of SAV-related information and the corresponding rationale will be illustrated in <xref target="sib-sec"/>.</t>
      <t>Regarding the security concerns, the inter-domain SAVNET architecture shares the similar security threats with BGP and can leverage existing BGP security mechanisms to enhance both session and content security.</t>
      <figure anchor="arch">
        <name>SAVNET agent and SAV table within AS X in Figure 2.</name>
        <artwork><![CDATA[
+-----------------------------------------------------------+
|                           AS X                            |
| +-------------------------------------------------------+ |
| |                      SAVNET Agent                     | |
| | +---------------------+  +--------------------------+ | |
| | | General Information |  | SAV-specific Information | | |
| | +---------------------+  +--------------------------+ | |
| |            |                           |              | |
| |           \/                          \/              | |
| | +---------------------------------------------------+ | |
| | | +-----------------------------------------------+ | | |
| | | |              SAV Information Base             | | | |
| | | +-----------------------------------------------+ | | |
| | |            SAV Information Base Manager           | | |
| | +---------------------------------------------------+ | |
| |                          |SAV Rules                   | |
| +-------------------------------------------------------+ |
|                            |                              |
|                           \/                              |
| +-------------------------------------------------------+ |
| |                      SAV Table                        | |
| +-------------------------------------------------------+ |
+-----------------------------------------------------------+
]]></artwork>
      </figure>
      <t><xref target="arch"/> displays the SAVNET agent and SAV table within AS X. The SAVNET agent can obtain the SAV-specific information and general information from various SAV information sources including SAV-specific messages from other ASes, RPKI cache server, and RIB or FIB as long as they are available. The SAV information base (SIB) within the SAVNET agent can store the SAV-specific information and general information and is maintained by the SIB manager. And SIB manager generates SAV rules based on the SIB and fills out the SAV table on the data plane. Moreover, the SIB can be managed by network operators using various methods such as YANG <xref target="RFC6020"/>, Command-Line Interface (CLI), remote triggered black hole (RTBH) <xref target="RFC5635"/>, and Flowspec <xref target="RFC8955"/>. The detailed collection methods of the SAV-related information depend on the deployment and implementation of the inter-domain SAV mechanisms and are out of scope for this document.</t>
      <t>In the data plane, the packets coming from other ASes will be validated by the SAV table and only the packets which are permitted by the SAV table will be forwarded to the next hop. To achieve this, the router looks up each packet's source address in its local SAV table and gets one of three validity states: "Valid", "Invalid" or "Unknown". "Valid" means that there is a source prefix in SAV table covering the source address of the packet and the valid incoming interfaces covering the actual incoming interface of the packet. According to the SAV principle, "Valid" packets will be forwarded. "Invalid" means there is a source prefix in SAV table covering the source address, but the incoming interface of the packet does not match any valid incoming interface so that such packets will be dropped. "Unknown" means there is no source prefix in SAV table covering the source address. The packet with "unknown" addresses can be dropped or permitted, which depends on the choice of operators. The structure and detailed usage of SAV table can refer to <xref target="sav-table"/>.</t>
    </section>
    <section anchor="savinfo-sec">
      <name>SAV-related Information</name>
      <t>SAV-related information represents the information that can be used for SAV and consists of RPKI ROA objects and ASPA objects, local routing information, IRR data, and SAV-specific information. In the inter-domain SAVNET architecture, RPKI ROA objects and ASPA objects, local routing information, and IRR data are categorized into general information. In the future, if a new information source is created and can be used for SAV, but is not originally and specially used for SAV, its information can be categorized into general information. In other words, general information can also be considered as dual-use information.</t>
      <section anchor="general-information">
        <name>General Information</name>
        <t>General information refers to the information that is not directly designed for SAV but can be utilized to generate SAV rules, and includes RPKI ROA objects and ASPA objects, local routing information, and IRR data.</t>
        <section anchor="rpki-roa-objects-and-aspa-objects">
          <name>RPKI ROA objects and ASPA Objects</name>
          <t>The RPKI ROA objects and ASPA objects are originally designed for the routing security purpose. RPKI ROA objects consists of {prefix, maximum length, origin AS} information and are originally used to mitigate the route origin hijacking, while RPKI ASPA objects consists of {ASN, Provider AS Set} information and are originally used to mitigate the route leaks. Both the objects are verified and authoritative. They are also stable and will not be updated frequently.</t>
          <t>Based on ASPA objects, the AS-level network topology can be constructed. And according to the ROA objects and the constructed AS-level topology information, an AS can learn all the permissible paths of the prefixes from its customer cone. Therefore, the prefixes and all its permissible incoming directions can be obtained. All the permissible incoming directions, however, do not only consist of the real incoming directions of the prefixes, but also the extra non-used incoming directions by the legitimate traffic, which would lead to improper permits.</t>
          <t>Additionally, according to a recent study <xref target="rpki-time-of-flight"/>, the process of updating RPKI information typically requires several minutes to an hour. This encompasses the addition or deletion of RPKI objects and the subsequent retrieval of updated information by ASes.</t>
        </section>
        <section anchor="local-routing-information">
          <name>Local Routing Information</name>
          <t>The local routing information is originally used to guide the packet forwarding on each router and can be stored in the local RIB or FIB. It can be parsed from the BGP update messages communicated between ASes. Existing uRPF-based SAV mechanisms use the local routing information to generate SAV rules. As analyzed in <xref target="inter-domain-ps"/>, in the asymmetric routing scenarios, these mechanisms have accuracy problems and would lead to improper permits or improper blocks.</t>
        </section>
        <section anchor="irr-data">
          <name>IRR Data</name>
          <t>The IRR data consist of ASes and their corresponding prefixes and can be used to augment the SAV table <xref target="RFC8704"/>. However, only using IRR data for SAV would limit the functioning scope of SAV, in inter-domain networks, it may only be able to prevent spoofing by a stub AS. In addition, the IRR data are not always accurate.</t>
        </section>
      </section>
      <section anchor="sav-specific-information">
        <name>SAV-specific Information</name>
        <t>SAV-specific information is the information that is specifically designed for SAV and consists of prefixes and their legitimate incoming directions to enter ASes. It can be contained in the SAV-specific messages which are communicated between ASes which deploy the inter-domain SAVNET architecture. When parsing the SAV-specific messages and obtaining the SAV-specific information, ASes can learn the prefixes and their legitimate incoming direction to enter themselves.</t>
        <t>Moreover, in the inter-domain SAVNET architecture, a SAV-specific information communication mechanism is used to communicate SAV-specific information between ASes and distribute the updated information to the relative ASes automatically in a timely manner once the prefixes or routes change.</t>
      </section>
      <section anchor="distinctions-of-different-sav-related-information">
        <name>Distinctions of Different SAV-related Information</name>
        <figure anchor="diffsavinfo">
          <name>The comprehensive comparasions between different SAV-related information.</name>
          <artwork><![CDATA[
+-------------------------+-----------+----------+---------------+
| SAV-related Information |  Accurate |Real-time |Trustworthiness|
|                         |    SAV    | Update   |               |
+-----------+-------------+-----------+----------+---------------+
|           |RPKI ROA Obj.|           |    NO    |      YES      |
|           | & ASPA Obj. |           |          |               |
|           +-------------+  Improper +----------+---------------+
|General    |Local Routing|   Block   |    YES   |       NO      |
|Information| Information |     &     |          |               |
|           +-------------+  Improper +----------+---------------+
|           |  IRR Data   |   Permit  |    NO    |       NO      |
|           |             |           |          |               |
+-----------+-------------+-----------+----------+---------------+
|                         |Functioning|          |               |
|SAV-specific Information |    as     |    YES   |       YES     |
|                         | Expected  |          |               |
+-------------------------+-----------+----------+---------------+
]]></artwork>
        </figure>
        <t><xref target="diffsavinfo"/> shows the comprehensive comparasions between different SAV-related information when only using the corresponding information as the source to generate SAV rules and can help clarify their distinctions. Compared against general information, SAV-specific information is more accurate and trustworthy, while it can update the SAV rules in a timely manner to adapt to the prefix or route changes.</t>
      </section>
    </section>
    <section anchor="sib-sec">
      <name>SAV Information Base</name>
      <figure anchor="sav_src">
        <name>Priority ranking for the SAV information sources.</name>
        <artwork><![CDATA[
+---------------------------------------------------+----------+
|              SAV Information Sources              |Priorities|
+---------------------------------------------------+----------+
|              SAV-specific Information             |     1    |
+---------------------+-----------------------------+----------+
|                     | RPKI ROA Obj. and ASPA Obj. |     2    |
|                     +-----------------------------+----------+
|                     |             RIB             |     3    |
| General Information +-----------------------------+----------+
|                     |             FIB             |     4    |
|                     +-----------------------------+----------+
|                     |           IRR Data          |     5    |
+---------------------+-----------------------------+----------+
Priority ranking from 1 to 5 represents high to low priority.
]]></artwork>
      </figure>
      <t>The SIB is managed by the SIB manager, which can consolidate SAV-related information from different sources. <xref target="sav_src"/> presents the priority ranking for the SAV-specific information and general information. Priority ranking from 1 to 5 represents high to low priority. Inter-domain SAVNET architecture can use SAV-related information from different sources to generate SAV rules based on their priorities. Once the SAV-specific information for a prefix is available within the SIB, the inter-domain SAVNET uses it to generate SAV rules; otherwise, the inter-domain SAVNET can generate SAV rules based on general information. The inter-domain SAVNET architecture assigns priorities to the information from different sources, and recommends using the information with the highest priority from all the available information to generate SAV rules.</t>
      <t>The priority ranking recommendation for different SAV information sources in <xref target="sav_src"/> is based on the accuracy, timeliness, trustworthiness of the information from these sources. SAV-specific information has higher priority than the general information, since it is specifically designed to carry more accurate SAV information, and can be updated in a timely manner to adapt to the prefix or route changes. The general information from RPKI ROA objects and ASPA objects, RIB, FIB, IRR data has different priorities, ranking 2, 3, 4, and 5, respectively. RPKI ROA objects and ASPA objects have higher priority than the one from RIB, FIB, and IRR data, this is because they can provide authoritative prefixes and topology information, which can be used to generate more accurate SAV rules. Also, they are more stable and can be used to reduce the risk of improper blocks during the convergence process of the network. Although the information source for RIB and FIB is the same, the RIB consists of more backup path information than the FIB, which can reduce improper blocks. IRR data have the lowest priority compared to others, since they are usually updated in a slower manner than the real network changes and not always correct.</t>
      <t>It is noteworthy that the priority ranking of SAV information sources in <xref target="sav_src"/> is recommended rather than mandated. If a new inter-domain SAV mechanism needs to generate SAV rules using low-priority SAV informaiton sources, it should ensure that the correct information is obtained from the corresponding sources and adopts appropriate SAV actions in the data plane to avoid improper block and minimize improper permit. A new inter-domain SAVNET mechanism, in line with the inter-domain SAVNET architecture, has the flexibility to determine the utilized SAV information sources and their priorities accordingly. Especially, when using RPKI ROA objects and ASPA objects as the SAV information source, the new inter-domain SAVNET mechanism should avoid jeopardizing the use of RPKI in routing security.</t>
      <figure anchor="as-topo">
        <name>An example of AS topology.</name>
        <artwork><![CDATA[
                        +----------------+
                        |    AS 3(P3)    |
                        +-+/\-----+/\+/\++
                           /        \  \
                 P3[AS 3] /          \  \ P3[AS 3]
                         /            \  \
                        / (C2P)        \  \
               +----------------+       \  \
               |    AS 4(P4)    |        \  \
               ++/\+/\+/\+/\+/\++         \  \
  P6[AS 1, AS 2] /  /  |  |    \           \  \
       P2[AS 2] /  /   |  |     \           \  \
               /  /    |  |      \           \  \
              /  /     |  |       \ P5[AS 5]  \  \ P5[AS 5]
             /  /      |  |        \           \  \
            /  /(C2P)  |  |         \           \  \
+----------------+     |  |          \           \  \  
|    AS 2(P2)    |     |  | P1[AS 1]  \           \  \
+--------+/\+----+     |  | P6[AS 1]   \           \  \
  P6[AS 1] \           |  | NO_EXPORT   \           \  \
   P1[AS 1] \          |  |              \           \  \
   NO_EXPORT \         |  |               \           \  \
              \ (C2P)  |  | (C2P/P2P) (C2P)\     (C2P) \  \
           +----------------+              +----------------+
           |  AS 1(P1, P6)  |              |    AS 5(P5)    |
           +----------------+              +----------------+
Both AS 1 and AS 4 deploy the inter-domain SAVNET architecture 
and can exchange the SAV-specific information with each other, 
while other ASes do not deploy it.
]]></artwork>
      </figure>
      <figure anchor="sib">
        <name>An example for the SAV information base of AS 4 in Figure 6.</name>
        <artwork><![CDATA[
+-----+------+------------------+--------+------------------------+
|Index|Prefix|Incoming Direction|Relation| SAV Information Source |
+-----+------+------------------+--------+------------------------+
|  0  |  P1  |       AS 2       |Customer|SAV-specific Information| 
+-----+------+------------------+--------+------------------------+
|  1  |  P1  |       AS 1       |Customer|  General Information   |
+-----+------+------------------+--------+------------------------+
|  2  |  P2  |       AS 2       |Customer|  General Information   |
+-----+------+------------------+--------+------------------------+
|  3  |  P3  |       AS 3       |Provider|  General Information   |
+-----+------+------------------+--------+------------------------+
|  4  |  P5  |       AS 3       |Provider|  General Information   |
+-----+------+------------------+--------+------------------------+
|  5  |  P5  |       AS 5       |Customer|  General Information   |
+-----+------+------------------+--------+------------------------+
|  6  |  P6  |       AS 2       |Customer|  General Information   |
|     |      |                  |        |SAV-specific Information|
+-----+------+------------------+--------+------------------------+
|  7  |  P6  |       AS 1       |Customer|  General Information   |
+-----+------+------------------+--------+------------------------+
]]></artwork>
      </figure>
      <t>We use the examples shown in <xref target="as-topo"/> and <xref target="sib"/> to introduce SIB and illustrate how to generate SAV rules based on the SIB. <xref target="sib"/> depicts an example of the SIB established in AS 4 displayed in <xref target="as-topo"/>. Each row of the SIB contains an index, prefix, incoming direction of the prefix, reltation between ASes, and the corresponding sources of the information. The incoming direction consists of customer, provider, and peer. For example, in <xref target="sib"/>, the row with index 0 indicates the incoming direction of P1 is AS 2 and the information source is SAV-specific information. Note that the same SAV-related information may have multiple sources and the SIB records them all, such as the row indexed 6. Moreover, SIB should be carefully implemented in the specific protocol or protocol extensions to avoid becoming a heavy burden of the router, and the similar optimization approaches used for the RIB may be applied.</t>
      <t>Recall that inter-domain SAVNET architecture generates SAV rules based on the SAV-related information in the SIB and their priorities. In addition, in the case of an AS's interfaces facing provider or lateral peer ASes where loose SAV rules are applicable, the inter-domain SAVNET architecture recommends to use blocklist at such directions to only block the prefixes that are sure not to come at these directions, while in the case of an AS's interfaces facing customer ASes that necessitate stricter SAV rules, the inter-domain SAVNET architecture recommends to use allowlist to only permit the prefixes that are allowed to come at these directions.</t>
      <t>Based on the above rules, taking the SIB in <xref target="sib"/> as an example to illustrate how the inter-domain SAVNET generates rules, AS 4 can conduct SAV as follows: SAV at the interfaces facing AS 3 blocks P1, P2, and P6 according to the rows indexed 0, 2, and 6 in the SIB, SAV at the interfaces facing AS 2 permits P1, P2, and P6 according to the rows indexed 0, 2, and 6 in the SIB, SAV at the interfaces facing AS 1 does not permit any prefixes according to the row indexed 0, 1, 6, and 7 in the SIB, and SAV at the interfaces facing AS 5 permits P5 according to the row indexed 5 in the SIB.</t>
    </section>
    <section anchor="savnet-communication-mechanism">
      <name>SAVNET Communication Mechanism</name>
      <figure anchor="sav_agent_config">
        <name>Gathering SAV-related information from different SAV information sources.</name>
        <artwork><![CDATA[
+------+
|      | SAV-specific Information +-----------------------------+ 
|      |<=========================|  SAVNET Agent in other ASes |
|      |                          +-----------------------------+
|      |                        +---------------------------------+
|      |                        | +-----------------------------+ |
|      |                        | | RPKI ROA Obj. and ASPA Obj. | |
|      |                        | +-----------------------------+ |
|      |                        | +-----------------------------+ |
|      |                        | |             RIB             | |
|SAVNET|  General Information   | +-----------------------------+ |
|Agent |<-----------------------| +-----------------------------+ |
|      |                        | |             FIB             | |
|      |                        | +-----------------------------+ |
|      |                        | +-----------------------------+ |
|      |                        | |         IRR Database        | |
|      |                        | +-----------------------------+ |
|      |                        +---------------------------------+
|      |Configuration Information +-----------------------------+
|      |<-------------------------|      Network Operators      |
|      |                          +-----------------------------+
+------+
]]></artwork>
      </figure>
      <t>SAV-specific information relies on the communication between SAVNET agents, and general information can be from RPKI ROA objects and ASPA objects, RIB, FIB, and IRR data. Therefore, as illustrated in <xref target="sav_agent_config"/>, the SAVNET agent needs to receive the SAV-related information from these SAV information sources. SAVNET agent also needs to accept the configurations from network operators for the management operations. Gathering these types of information relies on the SAVNET communication mechanism, which includes SAV-specific information communication mechanism, general information communication mechanism, and management mechanism.</t>
      <section anchor="sav-specific-information-communication-mechanism">
        <name>SAV-specific Information Communication Mechanism</name>
        <figure anchor="sav_msg">
          <name>An example for exchanging SAV-specific information with SAV-specific information communication mechanism between AS 1 and AS 4.</name>
          <artwork><![CDATA[
          +----------------+                     +----------------+
          |    AS 4(P4)    |                     |    AS 4(P4)    |
          | +------------+ |                     | +------------+ |
          | |   SAVNET   | |                     | |   SAVNET   | |
          | |   Agent    | |                     | |   Agent    | |
          | +------------+ |                     | +------------+ |
          +----------------+                     +-+/\+/\+--------+
            /  /   |  |                             /  /   |  |
  P4[AS 4] /  /    |  |              SAV-specific  /  /    |  |
          /  /     |  |               Messages[   /  /     |  |
         /  /      |  | P4[AS 4]    (P1, AS 2),  /  /      |  |
        /  /       |  |             (P6, AS 2)] /  /       |  |
       /  /        |  |                        /  /        |  |
+----+\/+\/+-+     |  |               +------------+       |  |
|  AS 2(P2)  |     |  |               |  AS 2(P2)  |       |  |
+------------+     |  |               +------+/\+--+       |  |
         \         |  |           SAV-specific \           |  |
 P4[AS 2, \        |  |              Messages[  \          |  |
    AS 4]  \       |  |            (P1, AS 2),   \         |  |
            \      |  |            (P6, AS 2)]    \        |  |
        +--+\/+---\/+\/+-+                     +----------------+
        |  AS 1(P1, P6)  |                     |  AS 1(P1, P6)  |
        | +------------+ |                     | +------------+ |
        | |   SAVNET   | |                     | |   SAVNET   | |
        | |   Agent    | |                     | |   Agent    | |
        | +------------+ |                     | +------------+ |
        +----------------+                     +----------------+
            (a)                                    (b)
(a) The path of the legitimate traffic with source addresses in P1
    or P6 and destination addresses in P4 is [AS 1, AS 2, AS 4].
]]></artwork>
        </figure>
        <t><xref target="sav_msg"/> uses an example to illustrate how AS 1 obtains its own SAV-specific information and communicates it using SAV-specific messages to AS 4. The SAV-specific information can be expressed as &lt;Prefix, Incoming Direction&gt; pairs, such as (P1, AS 2), (P6, AS 2) in <xref target="sav_msg"/>. As shown in <xref target="sav_msg"/>(a), the prefix P4 of AS 4 is propagated along the paths [AS 4, AS 2, AS 1] and [AS 4, AS 1], and AS 1 selects the path [AS 1, AS 2, AS 4] as the best path for the legitimate traffic with source addresses in P1 or P6 and destination addresses in P4. Thus, AS 1 can know that its legitimate traffic whose source prefixes are P1 or P6 will enter AS 4 from the direction of AS 2. As a result, AS 1 obtains its SAV-specific information and assembles it into the SAV-specific messages to send to AS 4 with the SAV-specific information communication mechanism. This example shows that the source AS (AS 1) obtains its own SAV-specific information sent to the validation AS (AS 4) according to the AS path from its local RIB.</t>
        <t>The SAV-specific information can be exchanged between ASes via SAV-specific messages. SAV-specific messages are used to propagate or originate the SAV-specific information between ASes by the SAVNET agent. For an AS which initiates its own SAV-specific messages, its SAVNET agent can obtain the incoming direction of its own prefixes to enter other ASes based on the local RIB and assembles them into the SAV-specific messages to the corresponding ASes. When ASes receive the SAV-specific messages, they parse the messages to obtain source prefixes and their corresponding incoming directions.</t>
        <t>Additionally, if SAV-specific information is communicated between ASes, a new SAV-specific information communication mechanism would need to be developed to communicate it and can be implemented by a new protocol or extending an existing protocol. The SAV-specific information communication mechanism needs to define the data structure or format to communicate the SAV-specific messages and the operations and timing for originating, processing, propagating, and terminating the messages. If an extension to an existing protocol is used to exchange SAV-specific information, the corresponding existing protocol should not be affected. The SAVNET agent is the entity to support the SAV-specific communication mechanism. By parsing the SAV-specific messages, it obtains the prefixes and their incoming AS direction for maintaining the SIB. It is important to note that the SAVNET agent within an AS has the capability to establish connections with multiple SAVNET agents within different ASes, relying on either manual configurations by operators or an automatic mechanism. In addition, SAVNET agents should validate the authenticity of the connection for communicating the SAV-specific information to verify whether the SAV-specific information is provided over a secure connection with an authenticated AS.</t>
        <t>The need for a SAV-specific communication mechanism arises from the facts that the SAV-specific information needs to be obtained and communicated between ASes. Different from the general information such as routing information from the RIB, there are no existing mechanism which can support the perception and communication of SAV-specific information between ASes. Hence, a SAV-specific communication mechanism is needed to provide a medium and set of rules to establish communication between different ASes for the exchange of SAV-specific information.</t>
        <t>Furthermore, an AS needs to assemble its source prefixes into the SAV-specific messages. In order to obtain all the source prefixes of an AS, the inter-domain SAVNET architecture can communicate with the intra-domain SAVNET architecture <xref target="intra-domain-arch"/> to obtain all the prefixes belonging to an AS.</t>
        <t>Some scenarios, such as the ones where policy-based routing or static route exist in the inter-domain networks, may rely on the wider deployment of SAVNET agent to make the inter-domain SAVNET work better. In these scenarios, operators may override the default BGP decision by using policy-based routing or static route. For example, in <xref target="sav_msg"/>(a), AS 2 may use another AS which does not in the AS path [AS 1, AS 2, AS 4] to transmit the legitimate traffic with source addresses in P1 or P6 to AS 4. Thus, the inter-domain SAVNET requires AS 2 to deploy SAVNET agent to make AS 1 obtain its SAV-specific information for the legitimate traffic with source addresses in P1 or P6 to AS 4.</t>
        <t>The preferred AS paths of an AS may change over time due to route changes caused by operator configurations or network failures. In addition, the SAVNET agent of the source AS, e.g., AS 1 in <xref target="sav_msg"/>(b), should be aware of the route changes and launch SAV-specific messages to adapt to the route changes in a timely manner. Especially, when network failures happen between source AS and validation AS, if the source AS cannot be aware of the route changes, it cannot be aware of the failures. A wider deployment of SAVNET agent can make network failure sensing more sensitive. The SAV-specific information communication mechanism should handle route changes carefully to avoid improper blocks. The reasons for leading to improper blocks may include late detection of route changes, delayed message transmission, or packet losses. However, the detailed design of SAV-specific information communication mechanism for dealing with route changes is outside the scope of this document.</t>
      </section>
      <section anchor="general-information-communication-mechanism">
        <name>General Information Communication Mechanism</name>
        <t>The general information communication mechanism is used for communicating routing information between ASes, obtaining RPKI ROA objects and ASPA objects from RPKI cache servers, and obtaining the information about ASes and their prefixes from IRR databases. The general communication mechanism can be implemented by using existing protocols for collecting the relative information, such as BGP, RTR <xref target="RFC8210"/>, and FTP <xref target="RFC959"/>.</t>
      </section>
      <section anchor="management-mechanism">
        <name>Management Mechanism</name>
        <t>The primary purpose of the management mechanism is to deliver manual configurations of network operators. Examples of the management configurations include, but are not limited to:</t>
        <ul spacing="normal">
          <li>
            <t>SAVNET configurations using YANG, CLI, RTBH, or Flowspec.</t>
          </li>
          <li>
            <t>SAVNET operation.</t>
          </li>
          <li>
            <t>Inter-domain SAVNET provisioning.</t>
          </li>
        </ul>
        <t>Note that the configuration information can be delivered at any time and requires reliable delivery for the management mechanism implementation. Additionally, the management mechanism can carry telemetry information, such as metrics pertaining to forwarding performance, the count of spoofing packets and discarded packets, provided that the inter-domain SAVNET has access to such data. It can include information regarding the prefixes associated with the spoofing traffic, as observed until the most recent time.</t>
      </section>
    </section>
    <section anchor="usecases">
      <name>Use Cases</name>
      <t>This section utilizes the sample use cases to showcase that the inter-domain SAVNET architecture can improve the validation accuracy in the scenarios of limited propagation of prefixes, hidden prefixes, reflection attacks, and direct attacks, compared to existing SAV mechanisms, which are also utilized for the gap analysis of existing inter-domain SAV mechanisms in <xref target="inter-domain-ps"/>. In the following, these use cases are discussed for SAV at customer interfaces and SAV at provider/peer interfaces, respectively.</t>
      <section anchor="sav-at-customer-interfaces">
        <name>SAV at Customer Interfaces</name>
        <t>In order to prevent the source address spoofing, operators can enable ACL-based ingress filtering, source-based RTBH filtering, and/or uRPF-based mechanisms at customer interfaces, namely Strict uRPF, FP-uRPF, VRF uRPF, or EFP-uRPF <xref target="manrs"/> <xref target="nist"/>. However, as analyzed in <xref target="inter-domain-ps"/>, uRPF-based mechanisms may lead to false positives in two inter-domain scenarios: limited propagation of prefixes and hidden prefixes, or may lead to false negatives in the scenarios of source address spoofing attacks within a customer cone, while ACL-based ingress filtering and source-based RTBH filtering need to update SAV rules in a timely manner and lead to high operational overhead. The following showcases that the inter-domain SAVNET architecture can avoid false positives and false negatives in these scenarios.</t>
        <section anchor="limited-propagation-of-prefixes">
          <name>Limited Propagation of Prefixes</name>
          <figure anchor="no-export">
            <name>Limited propagation of prefixes caused by NO_EXPORT.</name>
            <artwork><![CDATA[
                        +----------------+
                        |    AS 3(P3)    |
                        +-+/\-----+/\+/\++
                           /        \  \
                 P3[AS 3] /          \  \ P3[AS 3]
                         /            \  \
                        / (C2P)        \  \
               +----------------+       \  \
               |    AS 4(P4)    |        \  \
               ++/\+/\+/\+/\+/\++         \  \
                 /  /  |  |    \           \  \
       P2[AS 2] /  /   |  |     \           \  \
               /  /    |  |      \           \  \
              /  /     |  |       \ P5[AS 5]  \  \ P5[AS 5]
             /  /      |  |        \           \  \
            /  /(C2P)  |  |         \           \  \
+----------------+     |  |          \           \  \  
|    AS 2(P2)    |     |  | P1[AS 1]  \           \  \
+--------+/\+----+     |  | P6[AS 1]   \           \  \
           \           |  | NO_EXPORT   \           \  \
   P1[AS 1] \          |  |              \           \  \
   NO_EXPORT \         |  |               \           \  \
              \ (C2P)  |  | (C2P/P2P) (C2P)\     (C2P) \  \
           +----------------+              +----------------+
           |  AS 1(P1, P6)  |              |    AS 5(P5)    |
           +----------------+              +----------------+
]]></artwork>
          </figure>
          <t><xref target="no-export"/> presents a scenario where the limited propagation of prefixes occurs due to the NO_EXPORT community attribute. In this scenario, AS 1 is a customer of AS 2, AS 2 is a customer of AS 4, AS 4 is a customer of AS 3, and AS 5 is a customer of both AS 3 and AS 4. The relationship between AS 1 and AS 4 can be either customer-to-provider (C2P) or peer-to-peer (P2P). AS 1 advertises prefixes P1 to AS 2 and adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 2, preventing AS 2 from further propagating the route for prefix P1 to AS 4. Similarly, AS 1 adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 4, resulting in AS 4 not propagating the route for prefix P6 to AS 3. Consequently, AS 4 only learns the route for prefix P1 from AS 1 in this scenario. Suppose AS 1 and AS 4 have deployed inter-domain SAV while other ASes have not, and AS 4 has deployed EFP-uRPF at its customer interfaces.</t>
          <t>In this scenario, existing uRPF-based SAV mechanisms would block the traffic with P1 as source addresses improperly, and thus suffer from the problem of false positives <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P1 as source addresses can arrive at the interfaces facing AS 1 and AS 2. As a result, the false positive problem can be avoided.</t>
        </section>
        <section anchor="hidden-prefixes">
          <name>Hidden Prefixes</name>
          <figure anchor="dsr">
            <name>A Direct Server Return (DSR) scenario.</name>
            <artwork><![CDATA[
                             +----------------+
             Anycast Server+-+    AS 3(P3)    |
                             +-+/\-----+/\+/\++
                                /        \  \
                      P3[AS 3] /          \  \ P3[AS 3]
                              /            \  \
                             / (C2P)        \  \
                     +----------------+      \  \
                     |    AS 4(P4)    |       \  \
                     ++/\+/\+/\+/\+/\++        \  \
        P6[AS 1, AS 2] /  /  |  |   \           \  \
             P2[AS 2] /  /   |  |    \           \  \
                     /  /    |  |     \           \  \
                    /  /     |  |      \ P5[AS 5]  \  \ P5[AS 5]
                   /  /      |  |       \           \  \
                  /  /(C2P)  |  |        \           \  \
      +----------------+     |  |         \           \  \  
User+-+    AS 2(P2)    |     |  | P1[AS 1] \           \  \
      +--------+/\+----+     |  | P6[AS 1]  \           \  \
        P6[AS 1] \           |  | NO_EXPORT  \           \  \
         P1[AS 1] \          |  |             \           \  \
         NO_EXPORT \         |  |              \           \  \
                    \ (C2P)  |  | (C2P)   (C2P) \     (C2P) \  \
                 +----------------+            +----------------+
    Edge Server+-+  AS 1(P1, P6)  |            |    AS 5(P5)    |
                 +----------------+            +----------------+
P3 is the anycast prefix and is only advertised by AS 3 through BGP.
]]></artwork>
          </figure>
          <t><xref target="dsr"/> illustrates a direct server return (DSR) scenario where the anycast IP prefix P3 is only advertised by AS 3 through BGP. In this example, AS 3 is the provider of AS 4 and AS 5, AS 4 is the provider of AS 1, AS 2, and AS 5, and AS 2 is the provider of AS 1. AS 1 and AS 4 have deployed inter-domain SAV, while other ASes have not. When users in AS 2 send requests to the anycast destination IP, the forwarding path is AS 2-&gt;AS 4-&gt;AS 3. The anycast servers in AS 3 receive the requests and tunnel them to the edge servers in AS 1. Finally, the edge servers send the content to the users with source addresses in prefix P3. The reverse forwarding path is AS 1-&gt;AS 4-&gt;AS 2.</t>
          <t>In this scenario, existing uRPF-based mechanisms will improperly block the legitimate response packets from AS 1 at the customer interface of AS 4 facing AS 1 <xref target="inter-domain-ps"/>. In contrast, if the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P3 as source addresses can arrive at the interfaces facing AS 1 and AS 3. As a result, the legitimate response packets with P3 as source addresses from AS 1 can be allowed and the false positive problem can be avoided.</t>
        </section>
        <section anchor="reflection_attack_customer">
          <name>Reflection Attacks</name>
          <figure anchor="customer-reflection-attack">
            <name>A scenario of reflection attacks by source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                   +----------------+
                                   |    AS 3(P3)    |
                                   +-+/\-----+/\+/\++
                                         /     \  \
                                        /       \  \
                                       /         \  \
                                      / (C2P)     \  \
                             +----------------+    \  \
                             |    AS 4(P4)    |     \  \
                             ++/\+/\+/\+/\+/\++      \  \
                P6[AS 1, AS 2] /  /  |  |    \        \  \
                     P2[AS 2] /  /   |  |     \        \  \
                             /  /    |  |      \        \  \
                            /  /     |  |       \P5[AS 5]\  \ P5[AS 5]
                           /  /      |  |        \        \  \
                          /  /(C2P)  |  |         \        \  \
              +----------------+     |  |          \        \  \  
Attacker(P1')-+    AS 2(P2)    |     |  | P1[AS 1]  \        \  \
              +--------+/\+----+     |  | P6[AS 1]   \        \  \
                P6[AS 1] \           |  | NO_EXPORT   \        \  \
                 P1[AS 1] \          |  |              \        \  \
                 NO_EXPORT \         |  |               \        \  \
                            \ (C2P)  |  | (C2P) (C2P)    \  (C2P) \  \
                         +----------------+           +----------------+
                 Victim+-+  AS 1(P1, P6)  |   Server+-+    AS 5(P5)    |
                         +----------------+           +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="customer-reflection-attack"/> depicts the scenario of reflection attacks by source address spoofing within a customer cone. The reflection attack by source address spoofing takes place within AS 4's customer cone, where the attacker spoofs the victim's IP address (P1) and sends requests to servers' IP address (P5) that are designed to respond to such requests. As a result, the server sends overwhelming responses back to the victim, thereby exhausting its network resources. The arrows in <xref target="customer-reflection-attack"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>In this scenario, EFP-uRPF with algorithm A/B will improperly permit the spoofing attacks originating from AS 2 <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P1 as source addresses can only arrive at the interface facing AS 1. Therefore, at the interface of AS 4 facing AS 2, the spoofing traffic can be blocked.</t>
        </section>
        <section anchor="direct_attack_customer">
          <name>Direct Attacks</name>
          <figure anchor="customer-direct-attack">
            <name>A scenario of the direct attacks by source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                   +----------------+
                                   |    AS 3(P3)    |
                                   +-+/\-----+/\+/\++
                                      |        \  \
                                      |         \  \
                                      |          \  \
                                      | (C2P)     \  \
                             +----------------+    \  \
                             |    AS 4(P4)    |     \  \
                             ++/\+/\+/\+/\+/\++      \  \
                P6[AS 1, AS 2] /  /  |  |   \         \  \
                     P2[AS 2] /  /   |  |    \         \  \
                             /  /    |  |     \         \  \
                            /  /     |  |      \P5[AS 5] \  \ P5[AS 5]
                           /  /      |  |       \         \  \
                          /  /(C2P)  |  |        \         \  \
              +----------------+     |  |         \         \  \  
Attacker(P5')-+    AS 2(P2)    |     |  | P1[AS 1] \         \  \
              +--------+/\+----+     |  | P6[AS 1]  \         \  \
                P6[AS 1] \           |  | NO_EXPORT  \         \  \
                 P1[AS 1] \          |  |             \         \  \
                 NO_EXPORT \         |  |              \         \  \
                            \ (C2P)  |  | (C2P)   (C2P) \   (C2P) \  \
                         +----------------+           +----------------+
                 Victim+-+  AS 1(P1, P6)  |           |    AS 5(P5)    |
                         +----------------+           +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="customer-direct-attack"/> portrays a scenario of direct attacks by source address spoofing within a customer cone and is used to analyze the gaps of uRPF-based mechanisms below. The direct attack by source address spoofing takes place within AS 4's customer cone, where the attacker spoofs a source address (P5) and directly targets the victim's IP address (P1), overwhelming its network resources. The arrows in <xref target="customer-direct-attack"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 4 and AS 5 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>In this scenario, EFP-uRPF with algorithm A/B will improperly permit the spoofing attacks <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 5 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P5 as source addresses can arrive at the interface facing AS 3 and AS 5. Therefore, at the interface of AS 4 facing AS 2, the spoofing traffic can be blocked.</t>
        </section>
      </section>
      <section anchor="sav_at_p">
        <name>SAV at Provider/Peer Interfaces</name>
        <t>In order to prevent packets with spoofed source addresses from the provider/peer AS, ACL-based ingress filtering, Loose uRPF, and/or source-based RTBH filtering can be deployed <xref target="nist"/>. <xref target="inter-domain-ps"/> exposes the limitations of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF for SAV at provider/peer interfaces in scenarios of source address spoofing attacks from provider/peer AS. The source address spoofing attacks from provider/peer AS include reflection attacks from provider/peer AS and direct attacks from provider/peer AS. The following showcases that the inter-domain SAVNET architecture can avoid false negatives in these scenarios.</t>
        <section anchor="reflect_attack_p">
          <name>Reflection Attacks</name>
          <figure anchor="reflection-attack-p">
            <name>A scenario of reflection attacks by source address spoofing from provider/peer AS.</name>
            <artwork><![CDATA[
                               +----------------+
                Attacker(P1')+-+    AS 3(P3)    |
                               +-+/\-----+/\+/\++
                                  /        \  \
                                 /          \  \
                                /            \  \
                               / (C2P/P2P)    \  \
                       +----------------+      \  \
                       |    AS 4(P4)    |       \  \
                       ++/\+/\+/\+/\+/\++        \  \
          P6[AS 1, AS 2] /  /  |  |    \          \  \
               P2[AS 2] /  /   |  |     \          \  \
                       /  /    |  |      \          \  \
                      /  /     |  |       \ P5[AS 5] \  \ P5[AS 5]
                     /  /      |  |        \          \  \
                    /  /(C2P)  |  |         \          \  \
        +----------------+     |  |          \          \  \
Server+-+    AS 2(P2)    |     |  | P1[AS 1]  \          \  \
        +--------+/\+----+     |  | P6[AS 1]   \          \  \
          P6[AS 1] \           |  | NO_EXPORT   \          \  \
           P1[AS 1] \          |  |              \          \  \
           NO_EXPORT \         |  |               \          \  \
                      \ (C2P)  |  | (C2P)    (C2P) \    (C2P) \  \
                   +----------------+             +----------------+
           Victim+-+  AS 1(P1, P6)  |             |    AS 5(P5)    |
                   +----------------+             +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="reflection-attack-p"/> depicts the scenario of reflection attacks by source address spoofing from provider/peer AS. In this case, the attacker spoofs the victim's IP address (P1) and sends requests to servers' IP address (P2) that respond to such requests. The servers then send overwhelming responses back to the victim, exhausting its network resources. The arrows in <xref target="reflection-attack-p"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>Both ACL-based ingress filtering and source-based RTBH filtering will induce additional operational overhead, and Loose uRPF may improperly permit spoofed packets <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P1 as source addresses can arrive at the interface facing AS 1 and AS 2. Therefore, at the interface of AS 4 facing AS 3, the spoofing traffic can be blocked.</t>
        </section>
        <section anchor="direct_attack_p">
          <name>Direct Attacks</name>
          <figure anchor="direct-attack-p">
            <name>A scenario of direct attacks by source address spoofing from provider/peer AS.</name>
            <artwork><![CDATA[
                        +----------------+
         Attacker(P2')+-+    AS 3(P3)    |
                        +-+/\-----+/\+/\++
                           /        \  \
                          /          \  \
                         /            \  \
                        / (C2P/P2P)    \  \
               +----------------+       \  \
               |    AS 4(P4)    |        \  \
               ++/\+/\+/\+/\+/\++         \  \
  P6[AS 1, AS 2] /  /  |  |    \           \  \
       P2[AS 2] /  /   |  |     \           \  \
               /  /    |  |      \           \  \
              /  /     |  |       \ P5[AS 5]  \  \ P5[AS 5]
             /  /      |  |        \           \  \
            /  /(C2P)  |  |         \           \  \
+----------------+     |  |          \           \  \
|    AS 2(P2)    |     |  | P1[AS 1]  \           \  \
+--------+/\+----+     |  | P6[AS 1]   \           \  \
  P6[AS 1] \           |  | NO_EXPORT   \           \  \
   P1[AS 1] \          |  |              \           \  \
   NO_EXPORT \         |  |               \           \  \
              \ (C2P)  |  | (C2P)    (C2P) \     (C2P) \  \
           +----------------+              +----------------+
   Victim+-+  AS 1(P1, P6)  |              |    AS 5(P5)    |
           +----------------+              +----------------+
P2' is the spoofed source prefix P2 by the attacker which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="direct-attack-p"/> showcases a scenario of direct attack by source address spoofing from provider/peer AS. In this case, the attacker spoofs another source address (P2) and directly targets the victim's IP address (P1), overwhelming its network resources. The arrows in <xref target="direct-attack-p"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>Also, in this scenario, both ACL-based ingress filtering and source-based RTBH filtering will induce additional operational overhead, and Loose uRPF may improperly permit spoofed packets <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 2 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P2 as source addresses can only arrive at the interface facing AS 2. Therefore, at the interface of AS 4 facing AS 3, the spoofing traffic can be blocked.</t>
        </section>
      </section>
    </section>
    <section anchor="meeting-the-design-requirements-of-inter-domain-savnet">
      <name>Meeting the Design Requirements of Inter-domain SAVNET</name>
      <t>The inter-domain SAVNET architecture proposes the guidelines for the design of new inter-domain SAV mechanisms to meet the requirments defined in <xref target="inter-domain-ps"/>. The followings illustrate the design guidelines to meet the requirements one by one.</t>
      <section anchor="improving-validation-accuracy-over-existing-mechanisms">
        <name>Improving Validation Accuracy over Existing Mechanisms</name>
        <t>As analyzed in <xref target="usecases"/>, existing uRPF-based SAV mechanisms may have improper block or improper permit problems in the scenarios of limited propagation of prefixes, hidden prefixes, reflection attacks, and direct attacks for SAV at customer interfaces, and the scenarios of reflection attacks and direct attacks for SAV at provider/peer interfaces.</t>
        <t>Inter-domain SAVNET proposes SAV-specific information, which consists of the source prefixes of ASes and their corresponding legitimate incoming direction to enter other ASes. ASes which deploy SAVNET agent can communicate SAV-specific information with each other and generate accurate SAV rules for the prefixes from the SAV-specific information. The use cases shown in <xref target="usecases"/> has demonstrated inter-domain SAVNET can improve validation accuracy compared to existing SAV mechanisms. Along with more ASes deploy SAVNET agent and communicate SAV-specific information with each other, accurate SAV rules can be generated for these ASes and their prefixes can obtain better protection.</t>
      </section>
      <section anchor="working-in-incrementalpartial-deployment">
        <name>Working in Incremental/Partial Deployment</name>
        <t>A new inter-domain SAVNET mechanism should consider incremental/partial deployment as it is not feasible to deploy SAVNET agent simultaneously in all ASes, due to various constraints, such as device capabilities, versions, or vendors.</t>
        <t>Inter-domain SAVNET can support incremental/partial deployment, as it is not mandatory for all ASes to deploy SAVNET agents for communicating SAV-specific information. ASes which deploy SAVNET agents can establish a logical neighboring relationship with other ASes. The connections for communicating SAV-specific information can be achieved by manual configurations set by operators or an automatic neighbor discovery mechanism. An automatic neighbor discovery mechanism can utilize existing protocols or tools to collect the SAVNET neighboring information. This flexibility enables the inter-domain SAVNET to accommodate varying degrees of deployment, promoting interoperability and collaboration among participating ASes. During the partial/incremental deployment of SAVNET agent, the SAV-specific information for the ASes which do not deploy SAVNET agent cannot be obtained. To protect the prefixes of these ASes, inter-domain SAVNET can use the general information in the SIB to generate SAV rules. When using the general information, inter-domain SAVNET needs to guarantee the SAV accuracy for the corresponding application scenarios. The use cases in <xref target="usecases"/> demonstrates that inter-domain SAVNET supports incremental/partial deployment.</t>
        <t>As more ASes adopt the inter-domain SAVNET, the "deployed area" expands, thereby increasing the collective defense capability against source address spoofing. Furthermore, if multiple "deployed areas" can be logically interconnected across "non-deployed areas", these interconnected "deployed areas" can form a logical alliance, providing enhanced protection against address spoofing. Especially, along with more ASes deploy SAVNET agent and support the communication of SAV-specific information, the generated SAV rules will become more accurate, as well as enhancing the protection capability against source address spoofing.</t>
        <t>In addition, releasing the SAV functions of the inter-domain SAVNET incrementally is <bcp14>RECOMMENDED</bcp14> as one potential way to reduce the deployment risks and can be considered in its deployment by network operators:</t>
        <ul spacing="normal">
          <li>
            <t>First, the inter-domain SAVNET can only do the measurement in the data plane and do not take any other actions. Based on the measurement data, the operators can evaluate the effect of the inter-domain SAVNET on the legitimate traffic, including validation accuracy and forwarding performance, as well as the operational overhead.</t>
          </li>
          <li>
            <t>Second, the inter-domain SAVNET can open the function to limit the rate of the traffic that is justified as spoofing traffic. The operators can further evaluate the effect of the inter-domain SAVNET on the legitimate traffic and spoofing traffic, such as limiting the rate of all the spoofing traffic without hurting the legitimate traffic.</t>
          </li>
          <li>
            <t>Third, when the validation accuracy, forwarding performance, and operational overhead have been verified on a large scale by the live network, the inter-domain SAVNET can open the function to directly block the spoofing traffic that is justified by the SAV table in the data plane.</t>
          </li>
        </ul>
      </section>
      <section anchor="reducing-operational-overhead">
        <name>Reducing Operational Overhead</name>
        <t>The inter-domain routes or the prefixes of ASes usually change dynamically, which requires the SAV rules to be updated acutomatically. ACL-based ingress filtering and source-based RTBH filtering requires manual configuration to update SAV rules to adapt to the routing or prefix changes, which leads to high operational overhead.</t>
        <t>Inter-domain SAVNET proposes the SAV-specific information communication mechanism and utilizes it to communicate SAV-specific information automatically between ASes which deploy SAVNET agent. Upon receiving the SAV-specific information, SAVNET agent will use it to generate SAV rules. The use cases displayed in <xref target="sav_at_p"/> show that inter-domain SAVNET reduces operational overhead compared to ACL-based ingress filtering and source-based RTBH filtering.</t>
      </section>
      <section anchor="guaranteeing-convergence">
        <name>Guaranteeing Convergence</name>
        <t>Convergence issues <bcp14>SHOULD</bcp14> be carefully considered due to the dynamic nature of the Internet. Internet routes undergo continuous changes, and SAV rules <bcp14>MUST</bcp14> proactively adapt to these changes, such as prefix and route changes, in order to avoid improper block and reduce improper permit. To effectively track these changes, the SAVNET agent should proactively communicate the changes of SAV-specific information between ASes and generate SAV rules in a timely manner.</t>
        <t>The SAVNET agent should launch SAV-specific messages to adapt to the route or prefix changes in a timely manner. During the routing convergence process, the traffic paths of the source prefixes can undergo rapid changes within a short period. The changes of the SAV-specific information may not be communicated in time between ASes to update SAV rules, improper block or improper permit may happen. Such inaccurate validation is caused by the delays in communicating SAV-specific information between ASes, which occur due to the factors like packet losses, unpredictable network latencies, or message processing latencies. The detailed design of the SAV-specific information communication mechanism should consider these issues to reduce the inaccurate validation.</t>
        <t>Besides, for the inter-domain SAVNET, the potential ways to deal with the inaccurate validation issues during the convergence of the SAV-specific information communication mechanism is to consider using the information from RPKI ROA objects and ASPA objects to generate SAV rules until the convergence process of the SAV-specific communication mechanism is finished, since these information is more stable and can help avoid improper block, and thus avoiding the impact to the legitimate traffic.</t>
      </section>
      <section anchor="providing-necessary-security-guarantee">
        <name>Providing Necessary Security Guarantee</name>
        <t>For inter-domain SAVNET, the SAVNET agent plays a crucial role in generating and disseminating SAV-specific messages across different ASes. To safeguard against the potential risks posed by a malicious AS generating incorrect or forged SAV-specific messages, it is important for the SAVNET agents to employ security authentication measures for each received SAV-specific message. The majour security threats faced by inter-domain SAVNET can be categorized into two aspects: session security and content security. Session security pertains to verifying the identities of both parties involved in a session and ensuring the integrity of the session content. Content security, on the other hand, focuses on verifying the authenticity and reliability of the session content, thereby enabling the identification of forged SAV-specific messages.</t>
        <t>The threats to session security include:</t>
        <ul spacing="normal">
          <li>
            <t>Session identity impersonation: This occurs when a malicious router deceitfully poses as a legitimate peer router to establish a session with the targeted router. By impersonating another router, the malicious entity can gain unauthorized access and potentially manipulate or disrupt the communication between the legitimate routers.</t>
          </li>
          <li>
            <t>Session integrity destruction: In this scenario, a malicious intermediate router situated between two peering routers intentionally tampers with or destroys the content of the relayed SAV-specific message. By interfering with the integrity of the session content, the attacker can disrupt the reliable transmission of information, potentially leading to miscommunication or inaccurate SAV-related data being propagated.</t>
          </li>
        </ul>
        <t>The threats to content security include:</t>
        <ul spacing="normal">
          <li>
            <t>Message alteration: A malicious router has the ability to manipulate or forge any portion of a SAV-specific message. For example, the attacker may employ techniques such as using a spoofed Autonomous System Number (ASN) or modifying the AS path information within the message. By tampering with the content, the attacker can potentially introduce inaccuracies or deceive the receiving ASes, compromising the integrity and reliability of the SAV-related information.</t>
          </li>
          <li>
            <t>Message injection: A malicious router injects a seemingly "legitimate" SAV-specific message into the communication stream and directs it to the corresponding next-hop AS. This type of attack can be likened to a replay attack, where the attacker attempts to retransmit previously captured or fabricated messages to manipulate the behavior or decisions of the receiving ASes. The injected message may contain malicious instructions or false information, leading to incorrect SAV rule generation or improper validation.</t>
          </li>
          <li>
            <t>Path deviation: A malicious router intentionally diverts a SAV-specific message to an incorrect next-hop AS, contrary to the expected path defined by the AS path. By deviating from the intended routing path, the attacker can disrupt the proper dissemination of SAV-related information and introduce inconsistencies or conflicts in the validation process. This can undermine the effectiveness and accuracy of source address validation within the inter-domain SAVNET architecture.</t>
          </li>
        </ul>
        <t>Overall, inter-domain SAVNET shares similar security threats with BGP and can leverage existing BGP security mechanisms to enhance both session and content security. Session security can be enhanced by employing session authentication mechanisms used in BGP. Similarly, content security can benefit from the deployment of existing BGP security mechanisms like RPKI, BGPsec, and ASPA. While these mechanisms can address content security threats, their widespread deployment is crucial. Until then, it is necessary to develop an independent security mechanism specifically designed for inter-domain SAVNET. One potential approach is for each source AS to calculate a digital signature for each AS path and include these digital signatures within the SAV-specific messages. Upon receiving a SAV-specific message, the SAVNET agent can verify the digital signature to ascertain the message's authenticity. Furthermore, it is worth noting that the SAV-specific information communication mechanism may need to operate over a network link that is currently under a source address spoofing attack. As a result, it may experience severe packet loss and high latency due to the ongoing attack, and the implementation of the SAV-specific communication mechanism should ensure uninterrupted communication. Detailed security designs and considerations will be addressed in a separate draft, ensuring the robust security of inter-domain SAVNET.</t>
      </section>
    </section>
    <section anchor="manageability-considerations">
      <name>Manageability Considerations</name>
      <t>It is crucial to consider the operations and management aspects of SAV information sources, the SAV-specific communication mechanism, SIB, SIM, and SAV table in the inter-domain SAVNET architecture. The following guidelines should be followed for their effective management:</t>
      <t>First, management interoperability should be supported across devices from different vendors or different releases of the same product, based on a unified data model such as YANG <xref target="RFC6020"/>. This is essential because the Internet comprises devices from various vendors and different product releases that coexist simultaneously.</t>
      <t>Second, scalable operation and management methods such as NETCONF <xref target="RFC6241"/> and syslog protocol <xref target="RFC5424"/> should be supported. This is important as an AS may have hundreds or thousands of border routers that require efficient operation and management.</t>
      <t>Third, management operations, including default initial configuration, alarm and exception reporting, logging, performance monitoring and reporting for the control plane and data plane, as well as debugging, should be designed and implemented in the protocols or protocol extensions. These operations can be performed either locally or remotely, based on the operational requirements.</t>
      <t>By adhering to these rules, the management of SAV information sources and related components can be effectively carried out, ensuring interoperability, scalability, and efficient operations and management of the inter-domain SAVNET architecture.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
    <section anchor="scope-and-assumptions">
      <name>Scope and Assumptions</name>
      <t>In this architecture, the choice of protocols used for communication between the SIM and different SAV information sources is not limited. The inter-domain SAVNET architecture presents considerations on how to consolidate SAV-related information from various sources to generate SAV rules and perform SAV using the SAV table in the dataplane. The detailed design and implementation for SAV rule generation and SAV execution depend on the specific inter-domain SAV mechanisms employed.</t>
      <t>This document does not cover administrative or business agreements that may be established between the involved inter-domain SAVNET parties. These considerations are beyond the scope of this document. However, it is assumed that authentication and authorization mechanisms can be implemented to ensure that only authorized ASes can communicate SAV-related information.</t>
      <t>This document makes the following assumptions:</t>
      <ul spacing="normal">
        <li>
          <t>All ASes where the inter-domain SAVNET is deployed are assumed to provide the necessary connectivity between SAVNET agent and any intermediate network elements. However, the architecture does not impose any specific limitations on the form or nature of this connectivity.</t>
        </li>
        <li>
          <t>Congestion and resource exhaustion can occur at various points in the inter-domain networks. Hence, in general, network conditions should be assumed to be hostile. The inter-domain SAVNET architecture must be capable of functioning reliably under all circumstances, including scenarios where the paths for delivering SAV-related information are severely impaired. It is crucial to design the inter-domain SAVNET system with a high level of resilience, particularly under extremely hostile network conditions. The architecture should ensure uninterrupted communication between inter-domain SAVNET agents, even when data-plane traffic saturates the link.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture does not impose rigid requirements for the SAV information sources that can be used to generate SAV rules. Similarly, it does not dictate strict rules on how to utilize the SAV-related information from diverse sources or perform SAV in the dataplane. Network operators have the flexibility to choose their approaches to generate SAV rules and perform SAV based on their specific requirements and preferences. Operators can either follow the recommendations outlined in the inter-domain SAVNET architecture or manually specify the rules for governing the use of SAV-related information, the generation of SAV rules, and the execution of SAV in the dataplane.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture does not impose restrictions on the selection of the local AS with which AS to communicate SAV-specific Information. The ASes have the flexibility to establish connections for SAV-specific communication based on the manual configurations set by operators or other automatic mechanisms.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture provides the flexibility to accommodate Quality-of-Service (QoS) policy agreements between SAVNET-enabled ASes or local QoS prioritization measures, but it does not make assumptions about their presence. These agreements or prioritization efforts are aimed at ensuring the reliable delivery of SAV-specific Information between SAVNET agents. It is important to note that QoS is considered as an operational consideration rather than a functional component of the inter-domain SAVNET architecture.</t>
        </li>
        <li>
          <t>The SAVNET communication mechanisms are loosely coupled and are used for communicating or gathering SAV-related information, and how the inter-domain SAVNET synchronizes the management and operation configurations is out of scope of this document.</t>
        </li>
      </ul>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Igor Lubashev<br/>
  Akamai Technologies<br/>
  145 Broadway<br/>
  Cambridge, MA, 02142<br/>
  United States of America<br/>
  Email: ilubashe@akamai.com</t>
      <t>Many thanks to Igor Lubashev for the significantly helpful revision suggestions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC5424">
          <front>
            <title>The Syslog Protocol</title>
            <author fullname="R. Gerhards" initials="R." surname="Gerhards"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way.</t>
              <t>This document has been written with the original design goals for traditional syslog in mind. The need for a new layered specification has arisen because standardization efforts for reliable and secure syslog extensions suffer from the lack of a Standards-Track and transport-independent RFC. Without this document, each other standard needs to define its own syslog packet format and transport mechanism, which over time will introduce subtle compatibility issues. This document tries to provide a foundation that syslog extensions can build on. This layered architecture approach also provides a solid basis that allows code to be written once for each syslog feature rather than once for each transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5424"/>
          <seriesInfo name="DOI" value="10.17487/RFC5424"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="inter-domain-ps" target="https://datatracker.ietf.org/doc/draft-ietf-savnet-inter-domain-problem-statement/">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="intra-domain-arch" target="https://datatracker.ietf.org/doc/draft-li-savnet-intra-domain-architecture/">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="RFC5635">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC8955">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8210">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="RFC959">
          <front>
            <title>File Transfer Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <author fullname="J. Reynolds" initials="J." surname="Reynolds"/>
            <date month="October" year="1985"/>
            <abstract>
              <t>This memo is the official specification of the File Transfer Protocol (FTP) for the DARPA Internet community. The primary intent is to clarify and correct the documentation of the FTP specification, not to change the protocol. The following new optional commands are included in this edition of the specification: Change to Parent Directory (CDUP), Structure Mount (SMNT), Store Unique (STOU), Remove Directory (RMD), Make Directory (MKD), Print Directory (PWD), and System (SYST). Note that this specification is compatible with the previous edition.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="9"/>
          <seriesInfo name="RFC" value="959"/>
          <seriesInfo name="DOI" value="10.17487/RFC0959"/>
        </reference>
        <reference anchor="manrs" target="https://www.manrs.org/netops/guide/antispoofing/">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="nist" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation">
          <front>
            <title>Resilient Interdomain Traffic Exchange: BGP Security and DDos Mitigation</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="rpki-time-of-flight" target="https://dl.acm.org/doi/10.1007/978-3-031-28486-1_18">
          <front>
            <title>RPKI Time-of-Flight&amp;#58; Tracking Delays in the Management, Control, and Data Planes</title>
            <author>
              <organization>ISOC</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="sav-table" target="https://datatracker.ietf.org/doc/draft-huang-savnet-sav-table/">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 881?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Alvaro Retana, Kotikalapudi Sriram, Rüdiger Volk, Xueyan Song, Ben Maddison, Jared Mauch, Joel Halpern, Aijun Wang, Jeffrey Haas, Xiangqing Chang, Changwang Lin, Mingxing Liu, Zhen Tan, Yuanyuan Zhang, Yangyang Wang, Antoin Verschuren, Olaf Struck, Siyuan Teng etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
