Internet DRAFT - draft-geng-idr-bgp-savnet
draft-geng-idr-bgp-savnet
IDR N. Geng
Internet-Draft Z. Li
Intended status: Standards Track Z. Tan
Expires: 26 May 2024 M. Liu
Huawei Technologies
D. Li
Tsinghua University
F. Gao
Zhongguancun Laboratory
23 November 2023
BGP Extensions for Source Address Validation Networks (BGP SAVNET)
draft-geng-idr-bgp-savnet-03
Abstract
Many source address validation (SAV) mechanisms have been proposed
for preventing source address spoofing. However, existing SAV
mechanisms are faced with the problems of inaccurate validation or
high operational overhead in some scenarios. This document proposes
BGP SAVNET by extending BGP protocol for SAV. This protocol can
propagate SAV-related information through BGP messages. The
propagated information will help edge/border routers automatically
generate accurate SAV rules. These rules construct a validation
boundary for the network and help check the validity of source
addresses of arrival data packets.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 26 May 2024.
Geng, et al. Expires 26 May 2024 [Page 1]
Internet-Draft BGP Extensions for SAVNET November 2023
Copyright Notice
Copyright (c) 2023 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 4
1.2. Requirements Language . . . . . . . . . . . . . . . . . . 5
2. BGP Protocol Relationship . . . . . . . . . . . . . . . . . . 5
3. BGP SAVNET Solution . . . . . . . . . . . . . . . . . . . . . 5
3.1. Goals . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.2. Intra-domain BGP SAVNET . . . . . . . . . . . . . . . . . 7
3.3. Inter-domain BGP SAVNET . . . . . . . . . . . . . . . . . 10
4. BGP SAVNET Peering Models . . . . . . . . . . . . . . . . . . 12
4.1. Full-mesh IBGP Peering . . . . . . . . . . . . . . . . . 13
4.2. EBGP Peering between ASes . . . . . . . . . . . . . . . . 13
5. BGP SAVNET Protocol Extension . . . . . . . . . . . . . . . . 13
5.1. BGP SAVNET SAFI . . . . . . . . . . . . . . . . . . . . . 13
5.2. BGP SAVNET NLRI . . . . . . . . . . . . . . . . . . . . . 13
5.2.1. SPA TLVs for Intra-domain BGP SAVNET . . . . . . . . 14
5.2.2. SPA TLVs for Inter-domain BGP SAVNET . . . . . . . . 15
5.3. BGP SAVNET Refresh . . . . . . . . . . . . . . . . . . . 16
5.3.1. The SPD TLVs for Inter-domain BGP SAVNET . . . . . . 17
6. Decision Process with BGP SAVNET . . . . . . . . . . . . . . 18
6.1. BGP SAVNET NLRI Selection . . . . . . . . . . . . . . . . 18
6.1.1. Self-Originated NLRI . . . . . . . . . . . . . . . . 19
7. Error Handling . . . . . . . . . . . . . . . . . . . . . . . 19
7.1. Process of BGP SAVNET NLRIs . . . . . . . . . . . . . . . 19
7.2. Process of BGP SAVNET SPA TLVs . . . . . . . . . . . . . 19
7.3. Process of BGP SAVNET Refresh . . . . . . . . . . . . . . 20
7.4. Process of BGP SAVNET SPD TLVs . . . . . . . . . . . . . 20
8. Convergence Considerations . . . . . . . . . . . . . . . . . 21
9. Deployment Considerations . . . . . . . . . . . . . . . . . . 21
10. Security Considerations . . . . . . . . . . . . . . . . . . . 21
11. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 21
Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 22
References . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Geng, et al. Expires 26 May 2024 [Page 2]
Internet-Draft BGP Extensions for SAVNET November 2023
Normative References . . . . . . . . . . . . . . . . . . . . . 22
Informative References . . . . . . . . . . . . . . . . . . . . 22
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 24
1. Introduction
Source address validation (SAV) is essential for preventing source
address spoofing attacks ([RFC6959]) and helps trace back network
attackers. For a network, SAV mechanisms can be deployed on edge
routers or border routers for validating the packets from the
connected subnets or neighboring ASes [manrs-antispoofing].
ACL-based ingress filtering ([RFC2827], [RFC3704]) and Source-based
RTBH ([RFC5635]) can be used for source address filtering. However,
the two mechanisms are not specific for SAV. High operational
overhead may be induced if they are managed mostly by manual
configurations [I-D.ietf-savnet-intra-domain-problem-statement][I-D.i
etf-savnet-inter-domain-problem-statement]. Many SAV mechanisms,
such as strict uRPF, loose uRPF, FP-uRPF, VRF-uRPF, and EFP-uRPF
([RFC3704], [RFC8704]), leverage local routing information (FIB/RIB)
to automatically generate SAV rules. The rules indicate the wanted
incoming interfaces of source addresses and deny source addresses
coming from unwanted interfaces [I-D.huang-savnet-sav-table]. The
uRPF mechanisms can achieve good automation but may have inaccurate
validation problems under asymmetric routing [I-D.ietf-savnet-intra-d
omain-problem-statement][I-D.ietf-savnet-inter-domain-problem-stateme
nt]. This is because these uRPF mechanisms are "single-point"
designs. They leverage the local FIB or local RIB table to determine
the valid incoming interfaces for source addresses, which may not
match the real incoming interfaces. That is, purely relying on local
routing information for SAV is not enough for achieving both good
automation and high accuracy
This document proposes extensions of BGP protocol for SAV networks,
named as BGP SAVNET. Unlike existing "single-point" mechanisms, BGP
SAVNET allows coordination between the routers within a network or in
different ASes by propagating SAV-specific information through
extended BGP messages [I-D.li-savnet-intra-domain-architecture][I-D.w
u-savnet-inter-domain-architecture]. SAV-specific information
supplements the missing part of the local route information and
assists routers to generate accurate SAV rules. The following figure
shows a comparison of existing uRPF mechanisms and BGP SAVNET.
Geng, et al. Expires 26 May 2024 [Page 3]
Internet-Draft BGP Extensions for SAVNET November 2023
+-------------+ Normal BGP +------------+ (Good automation
| Routing |--------------> uRPF | but inaccurate
| Information |\ | Mechanisms | under asymmetric
+-------------+ \ +------------+ routing)
\ Normal BGP
+-------------+
|
+-------------+ +--\/--------+ (Accurate SAV
| SAV-specific| Extended BGP | BGP | rules and adaptive to
| Information |--------------> SAVNET | various scenarios)
+-------------+ +------------+
The BGP SAVNET protocol is suitable to generating SAV rules for both
IPv4 and IPv6 addresses. The SAV rules can be used for validating
any native IP packets or IP-encapsulated packets.
1.1. Terminology
SAV: Source address validation, an approach to preventing source
address spoofing.
SAV Rule: The rule that indicates the valid incoming interfaces for a
specific source prefix.
SAV Table: The table or data structure that implements the SAV rules
and is used for source address validation in the data plane.
Internal (or Local) Source Address: The source addresses owned by the
subnets of local AS. The source addresses of the connection link
between subnets and local AS can also be considered as internal
source addresses.
External (or Remote) Source Address: The source addresses owned by
other ASes. Some source addresses like anycast addresses can be both
internal and external source addresses.
Local Routing Information: The information in a router's local RIB or
FIB that can be used to infer SAV rules.
SAV-specific Information: The information specialized for SAV rule
generation, which is exchanged among routers.
Edge Router: An intra-domain router for an AS that is directly
connected to a subnet of the AS.
Geng, et al. Expires 26 May 2024 [Page 4]
Internet-Draft BGP Extensions for SAVNET November 2023
Border Router: An intra-domain router for an AS that is connected to
other ASes. A router in an AS can be both an edge router and a
border router, if it is connected to both the AS's subnets and other
ASes.
Source AS: The AS whose source prefixes need to be validated at
Validation AS.
Validation AS: The AS that conducts SAV for the source prefixes of
Source AS.
SPA: Source prefix advertisement, i.e., the process for advertising
the origin source addresses/prefixes of a router or an AS.
SPD: Source path discovery, i.e., the process for discovering the
real incoming directions of particular source addresses/prefixes.
1.2. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
2. BGP Protocol Relationship
The BGP extensions for BGP SAVNET follow a backward compatible manner
without impacting existing BGP functions. New BGP SAVNET subsequent
address families will be introduced under the IPv4 address family and
the IPv6 address family, respectively. The BGP UPDATE message
(specifically the MP_REACH_NLRI and the MP_UNREACH_NLRI attributes)
and the BGP Refresh message will be extended. AFI and SAFI will be
used for distinguishing the BGP SAVNET messages from other messages.
A few existing path attributes such as Originator_ID and Clister_list
or newly defined path attributes MAY be used for BGP SAVNET.
Actually, most existing path attributes are not necessarily required
for BGP SAVNET. However, if the unnecessary path attributes are
carried in BGP updates, they will be accepted, validated, and
propagated consistent with the BGP protocol.
3. BGP SAVNET Solution
Geng, et al. Expires 26 May 2024 [Page 5]
Internet-Draft BGP Extensions for SAVNET November 2023
3.1. Goals
For an AS, the goal of BGP SAVNET is to construct a validation
boundary for the AS. SAV-specific information propagated by extended
BGP messages can assist edge and border routers on the network
boundary to generate SAV rules. Edge routers connected to subnets
generate rules for validating packets from users, while border
routers connected to other ASes generate rules for validating packets
from other ASes. Figure 1 shows the example of validation boundary
for an AS
+-----+ +-----+
| AS3 | | AS4 |
+-----+ +-----+
\ /
+-------------\-----------/-------------+
| AS2 +-#--+ +--#-+ |
| | R7 |---| R8 | |
| +----+ +----+ |
| | | |
| +----+ +----+ |
| ------| R5 |---| R6 |------ |
| | +----+ +----+ | |
| | | | | |
| +----+ +----+ +----+ +----+ |
| | R1 | | R2 |---| R3 | | R4 | |
| +--*-+ +-*--+ +--#-+ +-#--+ |
+-------\-----/-----------\-----/-------+
+-------+ +-----+
|Subnet1| | AS1 |
+-------+ +-----+
Figure 1: An example of validation boundary for an AS
From a perspective of an AS, source addresses can be largely
classified into two categories: internal (or local) source address
and external (or remote) source address. The BGP SAVNET solution
consists two parts: intra-domain BGP SAVNET and inter-domain BGP
SAVNET. The parts of solution focus on the validation of internal
and external source address, respectively.
* Intra-domain BGP SAVNET: SAV for protecting internal source
addresses. In Figure 1, it can be deployed at '*' or '#' to
restrict a subnet to use only its own internal source addresses
and to block external packets from other ASes with any internal
source addresses. SAV rules are generated without any cooperation
or interactions (such as prefix advertisements) between the local
AS and subnets/other ASes.
Geng, et al. Expires 26 May 2024 [Page 6]
Internet-Draft BGP Extensions for SAVNET November 2023
* Inter-domain BGP SAVNET: SAV for protecting external source
addresses. In Figure 1, it can be deployed at '#' for blocking
the source addresses of packets coming from unwanted directions
(i.e., coming from unwanted neighbor ASes). Cooperation or
interactions between the local AS and other ASes are required.
3.2. Intra-domain BGP SAVNET
Figure 2 shows an example of intra-domain BGP SAVNET. Router 1 and
Router 2 are edge routers that enable SAV at the interfaces connected
to subnets. Router 3 is a border router that conducts SAV at the
interfaces connected to other ASes.
In general, there are four types of interfaces:
* Single-homing interface. When a subnet has only one uplink
connected to the upper-layer network, the connected interface at
the edge router of upper-layer network can be defined as a "Sigle-
homing interface", e.g., Intf.1 in Figure 2.
* Complete multi-homing interface. When a subnet has dual or
multiple uplinks that connect to a single upper-layer network with
BGP SAVNET deployed, the connected interfaces at the edge routers
of upper-layer network are called "Complete multi-homing
interfaces", which corresponds to Intf.2 and Intf.3 in Figure 2.
* Incomplete multi-homing interface. When a subnet has dual or
multiple uplinks that are connected to multiple upper-layer
networks, the interfaces at the edge routers of upper-layer
network are called the "Incomplete multi-homing interfaces", which
corresponds to Intf.4 in Figure 2.
* Internet interface. It's the external interfaces that are
connected to the Internet on border routers. Typically, a network
usually has multiple Internet interfaces for load balancing or
backup, which corresponds to Intf.5 and Intf.6 in Figure 2.
Geng, et al. Expires 26 May 2024 [Page 7]
Internet-Draft BGP Extensions for SAVNET November 2023
+-----------------------------------------+
| Other ASes |
+-----------------------------------------+
| | |
| | |
+-------------|------|----------------|---+
| AS | | | |
| Intf.5| |Intf.6 | |
| +-*------*-+ | |
| | Router 3 | | |
| +----------+ | |
| / \ | |
| / \ | |
| / \ | |
| +----------+ +----------+ | |
| | Router 1 | | Router 2 | | |
| +--#-----#-+ +-#-----*--+ | |
|Intf.1|Intf.2\ Intf.3/ \Intf.4 | |
| | \ / \ | |
| | \ / \ | |
| Subnet1 Subnet2 Subnet3 |
| |
+-----------------------------------------+
Intf '#' enables prefix allowlist
Intf '*' enables prefix blocklist
Figure 2: An example of intra-domain BGP SAVNET
The goal of intra-domain BGP SAVNET is to generate source prefix
allowlist or blocklist for the interfaces on edge or border routers.
For the "Single-homing interface" and "Complete multi-homing
interface", prefix allowlist is applied (i.e., "Interface-based
prefix allowlist" mode in [I-D.huang-savnet-sav-table]). The prefix
allowlist of an interface should only include all the source prefixes
of the connected subnet and denys any source addresses not covered by
the prefixes in the list. In Figure 2, the prefix allowlist of Intf.
1 should only include all the source prefixes of Subnet1, and the
prefix allowlists of Intf. 2 and Intf. 3 should only include all the
source prefixes of Subnet2.
For "Incomplete multi-homing interface" and "Internet interface",
prefix blocklist is enabled (i.e., "Interface-based prefix blocklist"
mode in [I-D.huang-savnet-sav-table]). For a specific interface, its
prefix blocklist should include the internal prefixes that are owned
by the subnets connected to "Single-homing interfaces" and "Complete
multi-homing interfaces". In Figure 2, the prefix blocklist of Intf.
4, Intf. 5, and Intf. 6 should include all the source prefixes of
Geng, et al. Expires 26 May 2024 [Page 8]
Internet-Draft BGP Extensions for SAVNET November 2023
Subnet1 and Subnet2. The reason why "Incomplete multi-homing
interface" like Intf. 4 not using prefix allowlist is that the local
AS itself can hardly learn the complete set of source prefixes of
Subnet3 if the subnet advertises asymmetric prefixes to the multi-
homed up-layer networks (i.e., the local AS is one of the up-layer
networks).
The above goal should be achieved while meeting two requirements of
high accuracy (even under asymmetric routing) and good automation.
To this end, Source Prefix Advertisement (SPA) process is designed in
intra-domain BGP SAVNET solution. During the SPA process, edge
routers will proactively announce all the source prefixes learned by
local "Single-homing interfaces" and local "Complete multi-homing
interfaces" from the connected subnets via SPA messages. Some
related information of each announced source prefix will also be
propagated together with the source prefix. The related information
of each announced source prefix can be:
* Multi-homing Interface Group Type (MIIG-Type): It indicates the
type of the interface that learns the prefix. MIIG-Type MUST be
one of the four types mentioned above.
* Multi-homing Interface Group Tag (MIIG-Tag): It is to identify the
subnet of the prefix. The prefixes belonging to the same subnet
MUST have the identical MIIG-Tag value. Different subnets MUST
have different MIIG-tag values.
* (Only) Source Flag: It indicates whether the prefix is owned by
one subnet. By default, the flag is set because most of the
prefixes are owned by one network. For anycast addresses/prefixes
or direct server return (DSR) addresses/prefixes
[I-D.ietf-savnet-inter-domain-problem-statement], the flag should
be unset (possibly manually).
It can be seen that the SPA message of a source prefix includes four
parts: source prefix, MIIG-Type, MIIG-Tag, and Source Flag. Next,
how to use the SPA messages to generate SAV rules will be introduced.
* In the case of "Single-homing interface", the prefix allowlist can
be generated only through local routing information (i.e., local
RIB), without the engagement of SPA messages. The method building
the allowlist is, each Dest Prefix in RIB that records this
interface as an outgoing interface will be added to the prefix
allowlist.
* In the case of "Complete multi-homing interface", in addition to
collecting prefixes of the target interface itself in local RIB,
routers also need merge prefixes from the received SPA messages
Geng, et al. Expires 26 May 2024 [Page 9]
Internet-Draft BGP Extensions for SAVNET November 2023
and other local interfaces into the allowlist to construct a
complete list. First, the prefixes in received SPA, which take
the same "MIIG-Type" and "MIIG-Tag" values as the target
interface, are added to the allowlist. Second, if there are local
interfaces having the same "MIIG-Type" and "MIIG-Tag" values, they
will share prefixes collected from local RIB into each other's
allowlist.
* Routers with "Incomplete multi-homing interface" or "Internet
interface" will generate prefix blocklist for the target
interface. First, the prefixes of local "Single-homing
interfaces" or "Complete Multi-homing interfaces" on the local
router will be put into the blocklist. Second, the prefixes in
the received SPA messages which have the MIIG-Types of either
"Single-homing interface" or "Complete Multi-homing interface" but
with Source Flag being set, will also be added into the blocklist.
The prefix with Source Flag being unset will not be included into
the blocklist because the prefix is multi-source and the
"Incomplete multi-homing interface" or "Internet interface" may be
the legitimate incoming interface of the multi-source prefix.
Note that, intra-domain BGP SAVNET solution can also work if the
subnet is a stub AS (e.g., the subnets are replaced with stub ASes in
Figure 2). The source prefixes of the stub AS can be considered as
the internal prefixes of the local AS when conducting the solution.
3.3. Inter-domain BGP SAVNET
As described previously, inter-domain BGP SAVNET is for protecting
external source addresses that are owned by other ASes (usually
remote ASes). Cooperation or interactions between the local AS and
other ASes are required.
The local AS that deploys inter-domain BGP SAVNET and conducts
validation on the external source addresses is defined as Validation
AS. Source AS is defined as the AS whose source prefixes need to be
validated at Validation AS. For any AS, it can be configured as
Source AS or Validation AS, or it can also act as both Source AS and
Validation AS.
The goal of inter-domain BGP SAVNET is to help Validation AS generate
prefix blocklist for the source prefixes of Source AS at the proper
external interfaces of Validation AS. Which source prefixes that
need to be validated and which external interfaces should block these
prefixes depend on the indication of Source AS. Inter-domain BGP
SAVNET provides the communication channel for Source AS and
Validation AS.
Geng, et al. Expires 26 May 2024 [Page 10]
Internet-Draft BGP Extensions for SAVNET November 2023
Figure 3 shows an example of inter-domain BGP SAVNET. AS 1 and AS 4
have deployed SAVNET on the border routers (i.e., ASBRs) connected to
other ASes. Suppose AS 1 is configured as Source AS and AS 4 acts as
Validation AS. In the example, AS 4 can help block P1 of AS 1 at the
interfaces connected to specific neighbor ASes.
+----------------+ +----------------+
| AS 5 (P5) | | AS 6 (P6) |
+-----------+/\+-+ +-+/\+-------+/\++
\ / |
\ / |
\ / |
\ / |
+----------------+ |
| AS 4 (P4) | |
| SAVNET deployed| |
++/\+---+----+/\++ |
/ ^ \ |
/ ^ \ |
/ ^ \ |
/ ^ \ |
+----------------+ ^ +----------------+
| AS 2 (P2) | ^ | AS 3 (P3) |
+----------+/\+--+ ^ +--+/\+----------+
\ ^ /
\ ^ /
\ ^ /
\ ^ /
+--------+-------+
| AS 1 (P1) |
| SAVNET deployed|
+----------------+
RIB in AS 1:
To P2, preferred AS_PATH = [AS 2]
To P3, preferred AS_PATH = [AS 3]
To P4, preferred AS_PATH = [AS 2, AS 4]
To P5, preferred AS_PATH = [AS 3, AS 4, AS 5]
To P6, preferred AS_PATH = [AS 3, AS 4, AS 6]
Figure 3: An example of inter-domain BGP SAVNET
When Source AS and Validation AS enable BGP SAVNET, a BGP SAVNET
session between the two ASes will be established. Figure 3 shows the
session between AS 1 and AS 4 by ">>>>>". The solution of inter-
domain BGP SAVNET consists of two processes: SPA and Source Path
Discovery (SPD).
Geng, et al. Expires 26 May 2024 [Page 11]
Internet-Draft BGP Extensions for SAVNET November 2023
* SPA process: Source AS advertises its own AS number and its own
source prefixes to Validation AS through SPA messages. SPA
messages contain the complete set of source prefixes of Source AS
or only the source prefixes that want to be protected. Some
hidden source prefixes that do not appear can also be advertised
to Validation AS through SPA messages. The advertised source
prefixes MUST be authorized to Source AS by RPKI ROAs. When
Validation AS receives the messages, it MUST conduct ROV on the
messages and only stores the target source prefixes with the
"valid" ROV state. The "Unknown" and "Invalid" target source
prefixes will be ignored. In Figure 3, P1 MUST be authorized to
AS 1, and then AS 1 advertises its own AS number and P1 to AS 4
through an SPA message.
- Validation AS can also obtain the target source prefixes
directly from RPKI ROAs or other RPKI data.
* SPD process: After SPA process, Source AS can send SPD messages to
Validation AS for notifying the wanted incoming directions of
target source prefixes. That is, Source AS can specify from which
neighbor ASes of Validation AS the target source prefixes will
arrive. Validation AS will learn the specified incoming
directions of target source prefixes and will use prefix blocklist
for denying the target source prefixes coming from unwanted
directions (neighbor ASes). The wanted incoming directions of
target source prefixes can be obtained via the following methods
for different purposes:
- Automatically obtained from the RIB of Source AS. In Figure 3,
AS 1 can specify that AS 2 and AS 3 are the wanted incoming
directions of P1. AS 4 will block the packets with source
addresses of P1 coming from neighbor ASes of AS 5 and AS 6.
The use cases can be 1) proactive SAV for customer's prefixes
or 2) key source address's forwarding path protection (i.e.,
keeping control plane path and data plane path consistent).
- Obtained from security center of Source AS or Validation AS.
Security center can detect source address-spoofed DDoS attacks
and disseminates rules through BGP SAVNET to reactively filter
source address at specific interfaces for mitigating DDoS
suffered by customers.
- Obtained from RPKI ASPA records or other RPKI data.
4. BGP SAVNET Peering Models
Geng, et al. Expires 26 May 2024 [Page 12]
Internet-Draft BGP Extensions for SAVNET November 2023
4.1. Full-mesh IBGP Peering
This peering model is for both intra- and inter-domain BGP SAVNET.
In this model, Edge or border routers enabling BGP SAVNET MUST
establish full-mesh iBGP sessions either through direct iBGP sessions
or route-reflectors. SAVNET messages within an AS can be advertised
through the full-mesh BGP SAVNET sessions. The extensions of BGP
messages for carrying SAVNET messages will be introduced in
Section 5.
4.2. EBGP Peering between ASes
Inter-domain BGP SAVNET requires eBGP sessions which can be single-
hop or multi-hop. In this peering model, for the AS enabling BGP
SAVNET, at least one border router in Source AS MUST establish the
BGP SAVNET sessions with the border routers in Validation AS. SAVNET
messages between ASes will be advertised through these sessions. The
extensions of BGP messages for carrying SAVNET messages will be
introduced in Section 5.
5. BGP SAVNET Protocol Extension
5.1. BGP SAVNET SAFI
To make good isolation with existing BGP services, this section
defines BGP SAVNET SAFIs under the IPv4 address family and the IPv6
address family, respectively. The values require IANA registration
as specified in Section 11. Two BGP SAVNET speakers MUST establish a
BGP SAVNET peer and MUST exchange the Multiprotocol Extensions
Capability [RFC5492] to ensure that they are both capable of
processing BGP SAVNET messages properly.
5.2. BGP SAVNET NLRI
The BGP SAVNET NLRI is used to transmit SPA messages (either IPv4 or
IPv6). The BGP SAVNET NLRI TLVs are carried in BGP UPDATE messages
as (1) route advertisement carried within Multiprotocol Reachable
NLRI (MP_REACH_NLRI) [RFC4760], and (2) route withdraw carried within
Multiprotocol Unreachable NLRI (MP_UNREACH_NLRI).
While encoding an MP_REACH_NLRI attribute containing BGP SAVNET NLRI
TLVs, the "Length of Next Hop Network Address" field SHOULD be set to
0 upon the sender. The "Network Address of Next Hop" field SHOULD
not be encoded upon the sender, because it has a 0 length and MUST be
ignored upon the receiver.
Geng, et al. Expires 26 May 2024 [Page 13]
Internet-Draft BGP Extensions for SAVNET November 2023
5.2.1. SPA TLVs for Intra-domain BGP SAVNET
The BGP SAVNET NLRI TLV each carries a SPA message including a source
prefix and related information. Therefore, the NLRI TLV is called
SPA TLV. This type of TLVs are used in SPA process within an AS.
The format is shown below:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RouteType (1) | Length (1) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Origin router-id (4) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MaskLen (1) | IP Prefix (variable) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MIIG-Type (1) | Flags (1) |S|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MIIG-Tag (4) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 4: SPA TLV format
The meaning of these fields are as follows:
* RouteType (key): Type of the BGP SAVNET NLRI TLV, the value is 1
for SPA TLV within an AS.
* Length: The length of the BGP SAVNET NLRI value, the RouteType and
Length fields are excluded.
* Origin router-id (key): The router ID of the originating node of
the source prefix in the deployment domain.
* MaskLen (key): The mask length in bits, which also indicates the
valid bits of the IP Prefix field.
* IP Prefix (key): IP address. The length ranges from 1 to 4 bytes
for IPv4 and ranges from 1 to 16 bytes for IPv6. Format is
consistent with BGP IPv4/IPv6 unicast address.
* MIIG-Type (non-key): Multi-homing Ingress Interface Group Type.
- Type value 0: Unknown. Indicates that this prefix does not
come from any subnets. It can be a local prefix or a local
domain prefix.
Geng, et al. Expires 26 May 2024 [Page 14]
Internet-Draft BGP Extensions for SAVNET November 2023
- Type value 1: Single-homing interface. Indicates that this
prefix comes from a subnet that is single-homed to the local
domain.
- Type value 2: Complete multi-homing interface. Indicates that
this prefix comes from a subnet that is multi-homed to the
local domain, and is connected only to the local domain.
- Type value 3: Incomplete multi-homing interface. Indicates
that this prefix comes from a subnet that is multi-homed to the
local domain and other domains.
- Type value 4: Internet interface. Indicates that this prefix
comes from a interface that is connected to the Internet.
- Type value 5~255: Reserved for future use.
- Notes: The type values of 3 and 4 are pre-defined for future
use, and they should not appear in SPA TLVs (i.e., no need to
advertise the prefixes from the interfaces of Type 3 and Type
4).
* Flags (non-key): Bitmap, indicating the attribute flag of the SPA
prefix, currently taken:
- bit 0 (S bit) : Source Flag. The value of 1 indicates that the
SPA prefix is owned by one subnet. The value of 0 indicates
that the SPA prefix is not owned by only one subnet.
* MIIG-Tag (non-key): Multi-homing Ingress Interface Group Tag. The
value ranges from 1 to 0xFFFFFFFF. The value 0 is invalid and the
value 0xFFFFFFFF is reserved.
5.2.2. SPA TLVs for Inter-domain BGP SAVNET
This type of TLVs are used in SPA process between ASes.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RouteType (1) | Length (1) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source AS Number (4) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MaskLen (1) | IP Prefix (variable) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flags (1) |
+-+-+-+-+-+-+-+-+
Geng, et al. Expires 26 May 2024 [Page 15]
Internet-Draft BGP Extensions for SAVNET November 2023
Figure 5: SPA TLV format
The meaning of these fields are as follows:
* RouteType (key): Type of the BGP SAVNET NLRI TLV, the value is 2
for SPA TLV between ASes.
* Length: The length of the BGP SAVNET NLRI value, the RouteType and
Length fields are excluded.
* Source AS Number (key): The AS number of the originating AS of
this advertised source prefix.
* MaskLen (key): The mask length in bits, which also indicates the
valid bits of the IP Prefix field.
* IP Prefix (key): IP address. The length ranges from 1 to 4 bytes
for IPv4 and ranges from 1 to 16 bytes for IPv6. Format is
consistent with BGP IPv4/IPv6 unicast address.
* Flags (non-key): Reserved for future use.
5.3. BGP SAVNET Refresh
Two BGP SAVNET speakers MUST exchange Route Refresh Capability
[RFC2918] to ensure that they are both capable of processing the SPD
message carried in the BGP Refresh message.
The SPD TLV is carried in a BGP Refresh message after the BGP Refresh
message body, as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| AFI (2) | Subtype (1) | SAFI (1) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| SPD TLV (variable) |
~ ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 6: BGP-REFRESH with SPD TLV format
Geng, et al. Expires 26 May 2024 [Page 16]
Internet-Draft BGP Extensions for SAVNET November 2023
The AFI field is either 1 (IPv4) or 2 (IPv6). The SAFI field is the
newly defined SAVNET SAFI. The Subtype field should be a new value
assigned to SAVNET [RFC7313]. By carrying an SPD TLV, a BGP SAVNET
Refresh message MUST NOT be processed as a Route-Refresh (as a re-
advertisement request) and SHOULD only be used in the SPD process. A
BGP SAVNET Refresh message without an SPD TLV SHOULD be processed as
a Route-Refresh as defined in Route Refresh Capability [RFC2918].
5.3.1. The SPD TLVs for Inter-domain BGP SAVNET
This type of TLVs are used in SPD process between ASes.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type (1) | SubType (1) | Length (2) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence Number (4) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Origin router-id (4) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source AS Number (4) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Validation AS Number (4) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Optional Data Length (2) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Optional Data (variable) |
~ ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Neighbor AS Number List (variable) |
~ ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 7: SPD TLV format
The meaning of these fields are as follows:
* Type: TLV Type, the value is 2 for SPD TLV.
* SubType: TLV Sub-Type, value is 2 for SPD TLV between an AS.
* Length: The length of the SPD TLV value, the Type, SubType and
Length fields are excluded.
* Sequence Number: Indicates the sequence of Source Path Discovery
process. The initial value is 0 and the value increases
monotonically.
Geng, et al. Expires 26 May 2024 [Page 17]
Internet-Draft BGP Extensions for SAVNET November 2023
* Origin router-id: The router ID of the originating node of the
Source Path Discovery process.
* Source AS Number (key): The AS number of the source AS whose
source prefixes need to be validated in the validation AS.
* Validation AS Number (key): The AS number of the validation AS who
conducts validation for the source prefixes of source AS.
* Optional Data Length: The length of the optional data field in
bytes. The value can be 0 when there is no optional data.
* Optional Data: Reserved for future use.
* Neighbor AS Number List: List of neighbor AS, from which the
validation AS will receive the data packets with the source
prefixes of the source AS.
6. Decision Process with BGP SAVNET
The Decision Process described in [RFC4271] works to determines a
degree of preference among routes with the same prefix. The Decision
Process involves many BGP Path attributes, which are not necessary
for BGP SAVNET SPA and SPD process, such as next-hop attributes and
IGP-metric attributes. Therefore, this document introduces a
simplified Decision Process for SAVNET SAFI.
The purpose of SPA is to maintain a uniform Source Prefix list, which
is the mapping from original router-id to IP addresses, across all
routers in the deploy domain. To ensure this, it is RECOMMENDED that
all routers deploy no ingress or egress route-policies for BGP
SAVNET.
6.1. BGP SAVNET NLRI Selection
The Decision Process described in [RFC4271] no longer apply, and the
Decision Process for BGP SAVNET NLRI are as follows:
1. The locally imported route is preferred over the route received
from a peer.
2. The route received from a peer with the numerically larger
originator is preferred.
3. The route received from a peer with the numerically larger Peer
IP Address is preferred.
Geng, et al. Expires 26 May 2024 [Page 18]
Internet-Draft BGP Extensions for SAVNET November 2023
6.1.1. Self-Originated NLRI
BGP SAVNET NLRI with origin router-id matching the local router-id is
considered self-originated. All locally imported routes should be
considered self-originated by default.
Since the origin router-id is part of the NLRI key, it is very
unlikely that a self-originated NLRI would be received from a peer.
Unless a router-id conflict occurs due to incorrect configuration.
In this case, the self-originated NLRI MUST be discarded upon the
receiver, and appropriate error logging is RECOMMENDED.
On the other hand, besides the route learn from peers, a BGP SAVNET
speaker MUST NOT advertise NLRI which is not self-originated.
7. Error Handling
7.1. Process of BGP SAVNET NLRIs
When a BGP SAVNET speaker receives a BGP Update containing a
malformed MP_REACH_NLRI or MP_UNREACH_NLRI, it MUST ignore the
received TLV and MUST NOT pass it to other BGP peers. When
discarding a malformed TLV, a BGP SAVNET speaker MAY log a specific
error.
If duplicate NLRIs exist in a MP_REACH_NLRI or MP_UNREACH_NLRI
attribute, only the last one SHOULD be used.
7.2. Process of BGP SAVNET SPA TLVs
When a BGP SAVNET speaker receives an SPA TLV with an undefined type,
it SHOULD be ignored or stored without parsing.
When a BGP SAVNET speaker receives an SPA TLV with a 0 origin router-
id, or the origin router-id is the same as the local router-id, it
MUST be considered malformed.
When a BGP SAVNET speaker receives an SPA TLV with an invalid MaskLen
field, which is out of the range 1~32 for IPv4 and 1~128 for IPv6, it
MUST be considered malformed.
When a BGP SAVNET speaker receives an SPA TLV with an address field,
whose length in bytes do not match with the remaining data, it MUST
be considered malformed.
When a BGP SAVNET speaker receives an SPA TLV with an unsupported
MIIG-Type, it SHOULD be ignored or stored without parsing.
Geng, et al. Expires 26 May 2024 [Page 19]
Internet-Draft BGP Extensions for SAVNET November 2023
When a BGP SAVNET speaker receives an SPA TLV with a MIIG-Type 0
(Unkonwn), its MIIG-Tag MUST also be 0, vice versa. Otherwise this
SPA TLV MUST be considered malformed.
When a BGP SAVNET speaker receives a malformed SPA TLV, it MUST
ignore the received TLV and MUST NOT pass it to other BGP peers.
When discarding a malformed TLV, a BGP SAVNET speaker MAY log a
specific error.
When a BGP SAVNET speaker processes Flags in an SPA TLV, the defined
bits MUST be processed and the undefined bits MUST be ignored.
7.3. Process of BGP SAVNET Refresh
Each BGP Refresh message MUST contain at most one SPD TLV. When a
BGP SAVNET speaker receives a BGP Refresh packet with multiple SPD
TLVs, only the first one SHOULD be processed.
7.4. Process of BGP SAVNET SPD TLVs
When a BGP SAVNET speaker receives an SPD TLV with an undefined type
or subtype, it SHOULD be ignored.
When a BGP SAVNET speaker receives an SPD TLV with a 0 origin router-
id, or the origin router-id is the same as the local router-id, it
MUST be considered malformed.
When a BGP SAVNET speaker receives an SPD TLV with a validation AS
number, 0 source AS number, AS_TRANS number (23456), or the source AS
number equals the validation AS number, it MUST be considered
malformed.
When a BGP SAVNET speaker receives an SPD TLV with an optional data
sub-TLV that is an undefined type, it SHOULD be ignored.
When a BGP SAVNET speaker receives an SPD TLV with a DestList field
that is not a multiple of 4 in length, it MUST be considered
malformed.
When a BGP SAVNET speaker receives a Refresh message with a malformed
SPD TLV, it MUST ignore the received message. When discarding a
malformed message, a BGP SAVNET speaker MAY log a specific error.
When a BGP SAVNET speaker receives an SPD TLV with a sequence number
that does not match the local recorded sequence number:
Geng, et al. Expires 26 May 2024 [Page 20]
Internet-Draft BGP Extensions for SAVNET November 2023
* If the newly received sequence number is numerically larger, the
local recorded sequence number SHOULD be updated to the newly
received sequence number.
* If the newly received sequence number is numerically smaller, the
local recorded sequence number SHOULD NOT be updated, and the BGP
SAVNET speaker SHOULD log a specific error.
8. Convergence Considerations
The convergence process of BGP SAVNET is relatively simple. First,
the convergence process is mainly the message propagation process.
BGP SAVNET messages should have similar propagation speed to normal
routes. Second, BGP SAVNET supports independent and incremental
update. Routers enable SAVNET can update local SAV rules immediately
and there is no need to wait for complete information updates.
9. Deployment Considerations
Both intra- and inter-domain BGP SAVNET have good deployability. For
intra-domain BGP SAVNET, upgrading part of routers can also work
well. For example, only upgrade the routers (two or more) multi-
homed by the same subnet, or upgrade one edge router and one border
router. With more routers getting deployed, the network can get more
protection. For inter-domain BGP SAVNET, any pair of ASes can
upgrade and work well. There is no dependence on other ASes.
10. Security Considerations
Security problems are mainly in inter-domain scenarios.
* For communication security, inter-domain BGP SAVNET takes a point-
to-point communication model and thus has a simple trust model.
The communication between source AS and validation AS can be
protected by TLS.
* For content security, the advertised source prefixes of Source AS
MUST be authorized to Source AS by RPKI ROAs. When Validation AS
receives the messages, it MUST conduct ROV on the messages.
11. IANA Considerations
The BGP SAVNET SAFIs under the IPv4 address family and the IPv6
address family need to be allocated by IANA.
Geng, et al. Expires 26 May 2024 [Page 21]
Internet-Draft BGP Extensions for SAVNET November 2023
Acknowledgements
Many thanks to the comments from Jeff Haas, Antoin Verschuren, Zhibin
Dai, Keyur Patel, Shunwan Zhuang, David Lamparter, etc.
References
Normative References
[RFC2918] Chen, E., "Route Refresh Capability for BGP-4", RFC 2918,
DOI 10.17487/RFC2918, September 2000,
<https://www.rfc-editor.org/info/rfc2918>.
[RFC4760] Bates, T., Chandra, R., Katz, D., and Y. Rekhter,
"Multiprotocol Extensions for BGP-4", RFC 4760,
DOI 10.17487/RFC4760, January 2007,
<https://www.rfc-editor.org/info/rfc4760>.
[RFC5492] Scudder, J. and R. Chandra, "Capabilities Advertisement
with BGP-4", RFC 5492, DOI 10.17487/RFC5492, February
2009, <https://www.rfc-editor.org/info/rfc5492>.
[I-D.li-savnet-intra-domain-architecture]
Li, D., Wu, J., Qin, L., Geng, N., Chen, L., Huang, M.,
and F. Gao, "Intra-domain Source Address Validation
(SAVNET) Architecture", Work in Progress, Internet-Draft,
draft-li-savnet-intra-domain-architecture-05, 23 October
2023, <https://datatracker.ietf.org/doc/html/draft-li-
savnet-intra-domain-architecture-05>.
[I-D.wu-savnet-inter-domain-architecture]
Wu, J., Li, D., Huang, M., Chen, L., Geng, N., Liu, L.,
and L. Qin, "Inter-domain Source Address Validation
(SAVNET) Architecture", Work in Progress, Internet-Draft,
draft-wu-savnet-inter-domain-architecture-05, 23 October
2023, <https://datatracker.ietf.org/doc/html/draft-wu-
savnet-inter-domain-architecture-05>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
Informative References
Geng, et al. Expires 26 May 2024 [Page 22]
Internet-Draft BGP Extensions for SAVNET November 2023
[RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A
Border Gateway Protocol 4 (BGP-4)", RFC 4271,
DOI 10.17487/RFC4271, January 2006,
<https://www.rfc-editor.org/info/rfc4271>.
[RFC6959] McPherson, D., Baker, F., and J. Halpern, "Source Address
Validation Improvement (SAVI) Threat Scope", RFC 6959,
DOI 10.17487/RFC6959, May 2013,
<https://www.rfc-editor.org/info/rfc6959>.
[RFC3704] Baker, F. and P. Savola, "Ingress Filtering for Multihomed
Networks", BCP 84, RFC 3704, DOI 10.17487/RFC3704, March
2004, <https://www.rfc-editor.org/info/rfc3704>.
[RFC8704] Sriram, K., Montgomery, D., and J. Haas, "Enhanced
Feasible-Path Unicast Reverse Path Forwarding", BCP 84,
RFC 8704, DOI 10.17487/RFC8704, February 2020,
<https://www.rfc-editor.org/info/rfc8704>.
[RFC7313] Patel, K., Chen, E., and B. Venkatachalapathy, "Enhanced
Route Refresh Capability for BGP-4", RFC 7313,
DOI 10.17487/RFC7313, July 2014,
<https://www.rfc-editor.org/info/rfc7313>.
[RFC2827] Ferguson, P. and D. Senie, "Network Ingress Filtering:
Defeating Denial of Service Attacks which employ IP Source
Address Spoofing", BCP 38, RFC 2827, DOI 10.17487/RFC2827,
May 2000, <https://www.rfc-editor.org/info/rfc2827>.
[I-D.ietf-savnet-intra-domain-problem-statement]
Li, D., Wu, J., Qin, L., Huang, M., and N. Geng, "Source
Address Validation in Intra-domain Networks Gap Analysis,
Problem Statement, and Requirements", Work in Progress,
Internet-Draft, draft-ietf-savnet-intra-domain-problem-
statement-02, 17 August 2023,
<https://datatracker.ietf.org/doc/html/draft-ietf-savnet-
intra-domain-problem-statement-02>.
[I-D.ietf-savnet-inter-domain-problem-statement]
Wu, J., Li, D., Liu, L., Huang, M., and K. Sriram, "Source
Address Validation in Inter-domain Networks Gap Analysis,
Problem Statement, and Requirements", Work in Progress,
Internet-Draft, draft-ietf-savnet-inter-domain-problem-
statement-02, 22 August 2023,
<https://datatracker.ietf.org/doc/html/draft-ietf-savnet-
inter-domain-problem-statement-02>.
Geng, et al. Expires 26 May 2024 [Page 23]
Internet-Draft BGP Extensions for SAVNET November 2023
[I-D.huang-savnet-sav-table]
Huang, M., Cheng, W., Li, D., Geng, N., Liu, Chen, L., and
C. Lin, "General Source Address Validation Capabilities",
Work in Progress, Internet-Draft, draft-huang-savnet-sav-
table-03, 5 November 2023,
<https://datatracker.ietf.org/doc/html/draft-huang-savnet-
sav-table-03>.
[manrs-antispoofing]
"MANRS Implementation Guide", January 2023,
<https://www.manrs.org/netops/guide/antispoofing>.
Authors' Addresses
Nan Geng
Huawei Technologies
Beijing
China
Email: gengnan@huawei.com
Zhenbin Li
Huawei Technologies
Beijing
China
Email: lizhenbin@huawei.com
Zhen Tan
Huawei Technologies
Beijing
China
Email: tanzhen6@huawei.com
Mingxing Liu
Huawei Technologies
Beijing
China
Email: liumingxing7@huawei.com
Dan Li
Tsinghua University
Beijing
China
Email: tolidan@tsinghua.edu.cn
Geng, et al. Expires 26 May 2024 [Page 24]
Internet-Draft BGP Extensions for SAVNET November 2023
Fang Gao
Zhongguancun Laboratory
Beijing
China
Email: gaofang@zgclab.edu.cn
Geng, et al. Expires 26 May 2024 [Page 25]