<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" submissionType="IETF" docName="draft-ys-savnet-use-cases-02" category="info" ipr="trust200902" obsoletes="" updates="" xml:lang="en" symRefs="true" sortRefs="true" tocInclude="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.0 -->
  <!-- Generated by id2xml 1.5.2 on 2024-08-28T07:30:11Z -->
	<front>
    <title>SAVNET Use Cases</title>
    <seriesInfo name="Internet-Draft" value="draft-ys-savnet-use-cases-02"/>
    <author initials="S." surname="Yue" fullname="Shengnan Yue">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <street/>
         <city/>
          <region/>
          <code/>
          <country>China</country>
        </postal>
	   <email>yueshengnan@chinamobile.com</email>
      </address>
    </author>
    <author initials="X." surname="Song" fullname="Xueyan Song">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <street/>
         <city/>
          <region/>
          <code/>
          <country>China</country>
        </postal>
	   <email>song.xueyan2@zte.com.cn</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <postal>
          <street/>
         <city/>
          <region/>
          <code/>
          <country>China</country>
        </postal>
	   <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street/>
         <city/>
          <region/>
          <code/>
          <country>China</country>
        </postal>
	   <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="3"/>
    <workgroup>SAVNET Group</workgroup>
    <abstract>
      <t>
   This document introduces the use case for Source Address Validation
   (SAV) applied in intra-domain and inter-domain telecommunication
   networks.  It describes the typical routing implements and possible
   improvements for SAV in the use cases.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="sect-1" numbered="true" toc="default">
      <name>Introduction</name>
      <t>
   The Source Address Validation in Intra-domain and Inter-domain
   Networks (SAVNET) use cases provides the typical applications at
   telecommunication field.  Considering the network topology and
   technology used in these applications have big difference, the
   possible improvement schema for Source Address Validation (SAV) may
   have different considerations.</t>
<t>
This document specifically identifies the SAV use case for
telecommunication networks and provides possible SAV validation
location but does not suggests any specific design for SAV
architecture and protocol.  The SAVNET architecture introduced at
 <xref target="I-D.ietf-savnet-inter-domain-architecture" format="default"/> and 
 <xref target="I-D.ietf-savnet-intra-domain-architecture" format="default"/>.</t>
      <t>
   This document serves the purpose of helping those learning SAVNET
   applications and understand the possible influence brought by SAVNET
   to telecommunication scenarios and provides necessary considerations
   for SAV solution design.</t>
    </section>
    <section anchor="sect-2" numbered="true" toc="default">
      <name>Conventions and Definitions</name>
      <t>
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all
   capitals, as shown here.</t>
    </section>
    <section anchor="sect-3" numbered="true" toc="default">
      <name>Mobile Transport Network</name>
      <section anchor="sect-3.1" numbered="true" toc="default">
        <name>Description</name>
        <t>
   A telecom network refers to the network composed of user terminal
   equipment, transmission equipment, switches and telecom operators
   room.  The communication devices and equipment interconnect to
   provide high flexible and dedicated services to users.  The telecom
   network in this document is mainly related to 5G transport network,
   6G transport network, etc.</t>
      </section>
      <section anchor="sect-3.2" numbered="true" toc="default">
        <name>Implementation</name>
        <t>
   The following figure shows a typical 5G Transport network
   architecture.</t>
        <figure anchor="ure-an-example-for-mobile-transport-network-scenario">
          <name>An example for mobile transport network Scenario</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
                 ____             ____           ____
                /    \           /    \         /    \
+-------+     _/      \        _/      \      _/      \     +---------+
| User  |    / Access  \      / Aggrega \    /   Core  \    |5G Mobile|
|System +---+  Network  +----+  Network  +---+  Network +---+ System  |
+-------+    \_       _/      \_       _/     \_       _/   +---------+
               \_____/          \_____/         \_____/

            |                                            |
    Option1 |   IPoETH   |           MPLS/SRv6           |
            |--------------------------------------------|
    Option2 |     IPoETH      |      MPLS/SRv6           |
            |--------------------------------------------|
    Option3 |  IPoL2VPN  |           MPLS/SRv6           |
            |--------------------------------------------|
    Option4 |     IPoL2VPN    |       MPLS/SRv6          |
            |--------------------------------------------|
            |                                            |
]]></artwork>
        </figure>
        <t>
   From the implementation in NG (R)AN network there are optional
   connection links between CSG and Edge Node (between Access Network
   and Aggregation Network) which use IP or Ethernet technology.  The
   more common deployment is to use MPLS/SRv6 as overlay technology to
   carry data packets.  The LTE or 5G traffic will be transported
   through either a L3VPN or an L2VPN or EVPN over MPLS or SRv6 with or
   without segment routing.</t>
        <t>
   Please noted the scope of SAVNET is the validation of IPv4 and IPV6
   addresses.  The validation of label packets with MPLS deployments
   in Mobile Transport Network is out of the scope of the SAVNET.
   When the transport network is an SRv6 network, it may use IGP or BGP 
   protocol extensions to support the necessary SAV information transport.</t>

      <section anchor="sect-3.2.1" numbered="true" toc="default">
        <name>Possible improvements for SAV</name>
        <t>
   As described and analyzed at the previous section, there is no need
   for SAVNET in MPLS/VPN network.  The only location for SAVNET is in
   Access Network but SAVI function MAY be required and enough for
   source address validation.</t>
        <t>
   However, in the case of an AS cross-domain network for the
   communication between different Service Providers, the raw IPv4/IPv6
   traffic is transported through EBGP technology so in order to reduce
   source address spoofing attack EBGP protocol SHOULD support SAVNET
   feature to validate the traffic accessed from other external AS
   domains.</t>
         </section>
      </section>

      <section anchor="sect-3.3" numbered="true" toc="default">
        <name>Multi-homing Scenario</name>

   <t> The following figure shows an example for multi-homing scenario in mobile transport network. When network access users are dual-homed to aggregation network devices, 
   assume that the network access users have two prefixes, P1 and P2, which are advertised to the aggregation devices. Due to the asymmetric configuration of routing priorities, 
   deploying strict uRPF on the aggregation devices may lead to false blocking, while loose uRPF may result in false passing. The existing technologies cannot solve this problem, 
   and the optimized SAVNET technology needs to be adopted.</t>
	  
        <figure anchor="ure-an-example-for-multi-homing-network-scenario">
          <name>An example for multi-homing network Scenario</name>
	<artwork align="left"> <![CDATA[
	
                          +------------+
                       ---|   Aggrega  |---
                      /   |   Network  |   \
   DestP| NH         /    +------------+    \       DestP | NH
   -----|----   Int3/                        \Int4  ------|----
     P2 |Int3 +-----+                        +-------+ P1 |Int4
     P1 |Int1 | ER1 |                        |  ER2  | P2 |Int2
              +-----+                        +-------+
                Int1\                         /Int2
                  P1 \                       / P2
                      \   +-----------+     /
                       \  |  Access   |    /
                        --|  Network  |---
                          +-----------+
                             (P1, P2)					   
	]]></artwork>
        </figure>  
	  
	 <t> Case1: Users from Access Network advertise P1 to ER1 and P2 to ER2. On both ER1 and ER2, the routing priority of the user-side for the same prefix is higher than that of the network-side. The FIB on ER1 and ER2 are showed below:</t>
	 <t> For ER1: Prefix P1, outgoing interface: Int1; Prefix P2, outgoing interface: Int3.</t>
     <t> For ER2: Prefix P2, outgoing interface: Int2; Prefix P1, outgoing interface: Int4.</t>
     <t> Case2: Users from Access Network advertise both P1 and P2 to ER1 and ER2. The routing priority settings are as follows:</t>
     <t> On ER1, the routing priority of the user-side for P1 is higher than that of the network-side, while the routing priority of the user-side for P2 is lower than that of the network-side.</t>
     <t> On ER2, the routing priority of the user-side for P2 is higher than that of the network-side, while the routing priority of the user-side for P1 is lower than that of the network-side. The FIB on ER1 and ER2 are showed below:</t>
     <t> For ER1: Prefix P1, the outgoing interface is Int1; Prefix P2, the outgoing interface is Int3.</t>
     <t> For ER2: Prefix P2, the outgoing interface is Int2; Prefix P1, the outgoing interface is Int4.</t>
     <t> Case3: Users from Access Network advertise the sub-prefix of P1 and the parent prefix of P1+P2 to ER1, and advertise the sub-prefix of P2 and the parent prefix of P1+P2 to ER2. On both ER1 and ER2, 
	 the routing priority of the user-side for the same prefix is higher than that of the network-side. The FIB on ER1 and ER2 are showed below:</t>
     <t> For ER1: Prefix P1, outgoing interface: Int1; Prefix P2, outgoing interface: Int3; Parent prefix, outgoing interface: Int1.</t>
     <t> For ER2: Prefix P2, outgoing interface: Int2; Prefix P1, outgoing interface: Int4; Parent prefix, outgoing interface: Int2. </t>

      <section anchor="sect-3.3.1" numbered="true" toc="default">
        <name>Possible improvements for SAV</name>
        <t> In the dual-homing scenario described in Section 3.3.1, there may be traffic with the source address of P1 flowing in through the Int2 interface of the ER2 device. If strict uRPF is 
		deployed, there will be problems of improper filtering. If loose uRPF is deployed, there will be problems of improper passing. Optimized SAVNET rules are required to achieve more accurate source 
		address filtering.</t>
         </section>	  	  
        </section>	  
      </section>	
	
	
    <section anchor="sect-4" numbered="true" toc="default">
      <name>Fixed Transport Network</name>
      <section anchor="sect-4.1" numbered="true" toc="default">
        <name>Description</name>
        <t>
   A Fixed Transport Network refers to the network consists of optical
   transport, which physically connects all the fixed network nodes, may
   involve residential gateway, optical equipment, switch/router and
   broadband network gateway.  The typical fixed transport network may
   across the wireline and wireless access, metro and backbone IP
   networks.</t>
      </section>
      <section anchor="sect-4.2" numbered="true" toc="default">
        <name>Implementation</name>
        <t>
   The following figure shows a typical Fixed Transport Network
   architecture.</t>
        <figure anchor="ure-an-example-for-fixed-transport-network-scenario">
          <name>An example for fixed transport network Scenario</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
                         ________                        ___/ \
               _____    /        \                      / Data \_
              /     \__/          \                     +_Center/
 +------|    /+----+    +----+    \_____               /  |____/
 | User |   / |    |    |    |          \_______      /
 |System+--+--+BNG +----+ P  +----+              \   /         _
 |      |  |  |    |    |    |    |           +-----+      ___/ \
 +------+  |  +--+-+    +----+    |        +--+-+ |       /       \_
            \     |               |        |    | |      / Backbone \
             \    |   +----+    +-+--+  +--+Edge|-------+  Network _/
              \   |   |    |    |    |  |  |    | |      \_      _/
               \  +---+ P  +----+ P  +--+  +----+ |        \____/
                \___  |    |    |    |           /
                    \ +----+__  +----+     _____/
                     \_____/  \___________/
            |                                     |Backbone|
            |           Metro Area Network        |Network |
            |-------------------------------------|--------|
            |                  IGP                |  BGP   |
            |                                     |        |
]]></artwork>
        </figure>
        <t>
   From the network levels perspective, it divides into residential
   Access Network (AN), Metro Area Network (MAN) and Backbone Network
   (BN).</t>
        <t>
   From the implementation in AN network there are optical connection
   links between fixed user and broadband network gateway (BNG) nodes
   which use IP or Ethernet technology.  The BNG attached AAA server
   allocates ipv4/ipv6 address to fixed users the access traffic from
   user to fixed network will be validated at BNG.</t>
        <t>
   The MAN network usually implements IGP (i.e., ISIS, OSPF) routes to
   achieve the path connection between network nodes.  Meanwhile the
   service traffic uses MPLS/VPN with/without segment routing technology
   as traffic overlay.</t>
        <t>
   The BN network usually implements BGP (i.e., eBGP) to achieve inter-
   domain network path connection.</t>
      </section>
      <section anchor="sect-4.3" numbered="true" toc="default">
        <name>Possible improvements for SAV</name>
        <t>
   It's assumed that the most feasible way for packets validation is at
   the location closest to the traffic for filtering invalid address or
   mitigating source address spoofing.  As described at the previous
   section, the traffic directed from user to network server the BNG is
   considered as a suitable validation entity.  And for the reverse
   traffic directed from DC/contents server to user the most feasible
   way to validate external spoofing traffic is at the location of edge
   routers of BN network.  If there is no SAV function implemented at
   edge routers of BN network, it's expected to implement SAV function
   at MAN network nodes.</t>
        <t>
   With the selection of the SAV validation entity and the use of SAV
   function to the network nodes at Fixed Transport Network, the
   incoming traffic from user and the external traffic from DC/content
   server can be validated effectively.  It may use IGP or BGP protocol
   extension to support necessary SAV information transport.</t>
        <t>
   For the SAV function used at BNG, there is an optional way to achieve
   source validation function:</t>
        <t>
   For the upstream traffic (from user to server)</t>
        <ol spacing="normal" type="1">
	
	<li>
            <t>After receiving a packet from a broadband user, the BNG applies
       the SAV function to determine whether the source address of the
       packet belongs to the legitimate user and the inbound port.</t>
          </li>
          <li>
            <t>If yes, packets are forwarded according to the specified rules.</t>
          </li>
          <li>
            <t>If no, packets are discarded or redirected according to the
       specified rules.</t>
          </li>
        </ol>
        <t>
   For the downstream traffic (from server to user)</t>
        <ol spacing="normal" type="1">
	
	<li>
            <t>BNG advertises the source route prefix of broadband users to the
       upstream routers and receives the reachable route from the
       upstream router.  The network topology is reachable.</t>
          </li>
          <li>
            <t>After receiving the traffic from the server, the BNG applies the
       SAV function to check whether the source address of the packet is
       valid and whether it matches the expected inbound port.</t>
          </li>
          <li>
            <t>If yes, packets are forwarded according to the specified rules.</t>
          </li>
          <li>
            <t>If no, packets are discarded or redirected according to the
       specified rules.</t>
          </li>
        </ol>
        <t>
   The SAV policy may be different to upstream and downstream traffic.
   For example, the upstream traffic is mainly from valid users the SAV
   function is suggested to use allowlistt filtering policy like ACL;
   while the downstream traffic from internet or DC servers the SAV
   policy may apply allowlistt and blocklist filtering policy.</t>
   <t>
   The detailed SAV policy and function is out of the scope of this
   document.  There is an optical way described at
   <xref target="I-D.cheng-savnet-intra-domain-sav-igp" format="default"/>.</t>

      </section>
    </section>
	
    <section anchor="sect-5" numbered="true" toc="default">
      <name>Data Center Network</name>
      <section anchor="sect-5.1" numbered="true" toc="default">
        <name>Description</name>
        <t> A data center network consists of routers, switches, firewalls,  
   storage systems and servers to provide reliable network connectivity
   and secured data transport to satisfy applications or business demands. 
   The network components require underlay infrastructure to support the
   data center hardware and software implementation. Driven by the scale
   of computing, the traditional network has scaled up and to satisfy
   large-scale requirements network virtualization is incorporated to
   data center to optimize network infrastructure. And network topology
   for data center has evolved from the traditional access-aggregation-core 
   to the Clos-based spine-leaf network architecture.</t>
      </section>
      <section anchor="sect-5.2" numbered="true" toc="default">
        <name>Implementation</name>
        <t>
   The following figure shows an example for data center network topology.</t>	
        <figure anchor="ure-an-example-for-fixed-transport-network">
          <name>An example for fixed transport network</name>
          <artwork name="" type="" align="left" alt=""><![CDATA[
                                                      ___/ \
                          +--------------------------/ Data \
                          +                +--------+_Center/
                      +---+-+         +----++         |____/
                      | ToF +  ...    + ToF |
                      +-+---+         +--+--+
                       /                 |
                      /       ...        |
             +-------+             +-----+-+
             | Spine +      ...    + Spine |
             +++-----+             +--+----+     
             /  \                    /     \
            /    \        ...       /       \
           /      \                /         \
  --------+--------+------    ----+-----------+------------- 
 |  +-----++    +---+--+ |   | +-+----+     ++-----+   PODn |
 |  | Leaf |    | Leaf | |   | | Leaf |  ...| Leaf |        |
 |  +---+--+    +--+---+ |   | +--+---+     +------+        |
 |      \        /       |   |   /           /    \         |
 |       \      /        |   |  /           /      \        |
 |       +-----+         |   | +-----+    ++----+  ++----+  |
 |       | VIM |         |   | | VNF | ...| VNF |  | PNF |  |
 |       +-----+  POD1   |   | +-----+    +-----+  +-----+  |
 |_______________________|   |______________________________|
]]></artwork>
        </figure>
		<t>
   Data center network deploys as underlay or overlay network model for 
   specific service requirements. Underlay networks typically use Ethernet 
   switching, VLAN, routing (e.g., OSPF, ISIS, BGP) to generate Equal-Cost 
   Multi-Path (ECMP) routs between network nodes at the same level to improve 
   network reliability and reduce network congestion. The packet encapsulation 
   may perform at layer 2 or layer 3. Overlay networks may configure BGP EVPN 
   service over VXLAN or GRE tunnels over IGP or BGP routing connections. 
   RFC7938 introduces a method to support routing in large-scale data centers 
   using BGP. RIFT protocol (see draft-ietf-rift-rift) is designed for spine-leaf 
   Clos networks and naturally support large-scale data center networks.</t>
      </section>	
      <section anchor="sect-5.3" numbered="true" toc="default">
        <name>Possible Improvements for SAV</name>
        <t>
The data center security is very critical for network storage, management 
and data processing to protect applications, data and users. Applying security 
controls to data center to protect it from threats that could compromise 
integrity, confidentiality, authentication and availability of data or applications. 
The threats of spoofing traffic with invalid source address for one specific 
interface is in the scope of the document, other threats are out of the scope.</t>	
<t>
If network nodes in the DC communicate with each other at layer 2, then the packet 
transport using MAC learning and MAC address spoofing is usually done when attacker
 is on the inside of the network. The MAC address spoofing mitigation is out of the 
 scope. If network nodes communicate with each other at layer 3, the IP address 
 spoofing attacks are usually from outside of the network. The incoming interface 
 of Leaf or Spine nodes requires to deploy SAV methods to filtering spoofing traffic. 
 The ToF nodes MAY require deploy SAV-similar methods to filtering the invalid 
 traffic from other DCs.</t>
<t>
To mitigate IP source address spoofing attacks, the physical/virtual switches and routers
in data center networks SHOULD have spoofing traffic filtering functions, such as ACL, uRPF-like,
and SAVNET mechanisms. The routing protocols such as IGP, BGP and RIFT need extensions to 
support SAVNET policies for filtering invalid route prefixes and make right decisions for 
packets processing.</t>
      </section>	
      </section>		
	
    <section anchor="sect-6" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>
   TBD.</t>
    </section>
    <section anchor="sect-7" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>
   This document has no requests for IANA.</t>
    </section>
    <section anchor="sect-8" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>
   TBD.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="I-D.cheng-savnet-intra-domain-sav-igp" target="https://datatracker.ietf.org/doc/html/draft-cheng-savnet-intra-domain-sav-igp" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.cheng-savnet-intra-domain-sav-igp.xml">
        <front>
          <title>Intra-domain SAVNET Support via IGP</title>
          <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Dan Li" initials="D." surname="Li">
            <organization>Tsinghua University</organization>
          </author>
          <author fullname="Changwang Lin" initials="C." surname="Lin">
            <organization>New H3C Technologies</organization>
          </author>
          <author fullname="Shengnan Yue" initials="" surname="Yue">
            <organization>China Mobile</organization>
          </author>
          <date day="27" month="June" year="2024"/>
          <abstract>
            <t>This document describes a Dynamic calculation SAVNET mechanism by extending IGP protocol in intra-domain scenarios. This mechanism can propagate SAV-related information through IGP messages to help routers automatically generate accurate SAV rules which are for checking the validity of data packets.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-cheng-savnet-intra-domain-sav-igp"/>
      </reference>
      <reference anchor="I-D.ietf-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-architecture" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-architecture.xml">
        <front>
          <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
          <author fullname="Dan Li" initials="D." surname="Li">
            <organization>Tsinghua University</organization>
          </author>
          <author fullname="Jianping Wu" initials="J." surname="Wu">
            <organization>Tsinghua University</organization>
          </author>
          <author fullname="Lancheng Qin" initials="L." surname="Qin">
            <organization>Tsinghua University</organization>
          </author>
          <author fullname="Nan Geng" initials="N." surname="Geng">
            <organization>Huawei</organization>
          </author>
          <author fullname="Li Chen" initials="L." surname="Chen">
            <organization>Zhongguancun Laboratory</organization>
          </author>
          <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
            <organization>Huawei</organization>
          </author>
          <author fullname="Fang Gao" initials="F." surname="Gao">
            <organization>Zhongguancun Laboratory</organization>
          </author>
          <date day="16" month="March" year="2024"/>
          <abstract>
            <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL rules that require manual efforts to accommodate to network dynamics, SAVNET routers learn the SAV rules automatically in a distributed way.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-architecture"/>
      </reference>
      <reference anchor="I-D.ietf-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-architecture" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-architecture.xml">
        <front>
          <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
          <author fullname="Dan Li" initials="D." surname="Li">
            <organization>Tsinghua University</organization>
          </author>
          <author fullname="Jianping Wu" initials="J." surname="Wu">
            <organization>Tsinghua University</organization>
          </author>
          <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
            <organization>Zhongguancun Laboratory</organization>
          </author>
          <author fullname="Li Chen" initials="L." surname="Chen">
            <organization>Zhongguancun Laboratory</organization>
          </author>
          <author fullname="Nan Geng" initials="N." surname="Geng">
            <organization>Huawei</organization>
          </author>
          <author fullname="Libin Liu" initials="L." surname="Liu">
            <organization>Zhongguancun Laboratory</organization>
          </author>
          <author fullname="Lancheng Qin" initials="L." surname="Qin">
            <organization>Zhongguancun Laboratory</organization>
          </author>
          <date day="6" month="August" year="2024"/>
          <abstract>
            <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-architecture"/>
      </reference>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
  </back>
</rfc>
