Internet DRAFT - draft-li-sava-intra-domain-use-cases
draft-li-sava-intra-domain-use-cases
Network Working Group D. Li
Internet-Draft J. Wu
Intended status: Informational Tsinghua
Expires: January 13, 2021 Y. Gu
Huawei
L. Qin
Tsinghua
T. Lin
H3C
July 12, 2020
Soure Address Validation Architecture (SAVA): Intra-domain Use Cases
draft-li-sava-intra-domain-use-cases-00
Abstract
This document identifies scenarios where existing approaches for
detection and mitigation of source address spoofing don't perform
perfectly. Either Ingress ACL filtering [RFC3704], unicast Reverse
Path Forwarding (uRPF) [RFC3704], feasible path uRPF [RFC 3704], or
Enhanced Feasible-Path uRPF [RFC8704] has limitations regarding
eihter automated implemetation objective or detection accuracy
objective (0% false positive and 0% false negative). This document
identifies two such scenarios and provides solution discussions.
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 13, 2021.
Li, et al. Expires January 13, 2021 [Page 1]
Internet-Draft SAVA Intra-domain Use Cases July 2020
Copyright Notice
Copyright (c) 2020 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Source Address Validation . . . . . . . . . . . . . . . . 2
1.2. Existing SAV Techniques Overview . . . . . . . . . . . . 3
1.3. SAV Requirements and Challenges . . . . . . . . . . . . . 4
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 6
3. Problem Statement . . . . . . . . . . . . . . . . . . . . . . 7
3.1. SAVA Intra-domain Use Case 1: Intra-AS Multi-homing . . . 7
3.2. SAVA Intra-domain Use Case 2: Inter-AS Multihoming . . . 8
4. Solution Consideration . . . . . . . . . . . . . . . . . . . 10
5. Security Considerations . . . . . . . . . . . . . . . . . . . 11
6. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 11
7. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 11
8. Normative References . . . . . . . . . . . . . . . . . . . . 11
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14
1. Introduction
1.1. Source Address Validation
The Internet is open to traffic, which means that a sender can
generate traffic and send to any receiver in the Internet without
permission of the receiver. Although this openness design improves
the scalability of the Internet, it also leaves security risks,
namely, a sender can forge his/her source address when sending the
packets, which is also well known as source address spoofing.
Due to the lack of source address spoofing detection mechanism,
Denial of Service (DoS) attacks seriously compromise network
security. By employing source address spoofing, attackers can well
hide themselves and pin the blame on the destination networks.
Administrators often spend a lot of effort identifying attack packets
Li, et al. Expires January 13, 2021 [Page 2]
Internet-Draft SAVA Intra-domain Use Cases July 2020
without being able to locate the attacker's true source address. In
addition to DOS attacks, source address spoofing is also used in a
multitude of ways. The threats of source address spoofing have been
well documented in [RFC6959]. To briefly summarize, the possible
attacks by source address spoofing includes single-packet attack,
flood-based DoS, poisoning attack, spoof-based worm/malware
propagation, reflective attack, accounting subversion, man-in-the-
middle attack, third-party recon, etc.
1.2. Existing SAV Techniques Overview
Source address validation (SAV) verifies the authenticity of the
packet's source address to detect and mitigate source address
spoofing [RFC2827]. Source Address Validation Improvement (SAVI)
method [RFC7039] implements SAV at a fine granularity of host-level
IP address validataion. The unicast Reverse Path Forwarding (uRPF)
techniques (such as Strict uRPF, Feasible uRPF and Loose uRPF)
[RFC3704] are particularly designed to perform SAV in the granularity
of IP network. The Enhanced Feasible-Path Unicast Reverse Path
Forwarding (EFP-uRPF) methods [RFC8704] further improve Feasible uRPF
to reduce false positives in the case of inter-AS routing asymmetry
and multihoming.
SAVI, typically performed at the access network, is enforced in
switches, where the mapping relationship between an IP address and
other "trust anchor" is maintained. A "trust anchor" can be link-
layer information (such as MAC address), physical port of a switch to
connect a host, etc. It enforces hosts to use legitimate IP source
addresses. However, given numerous access networks managed by
different operators, it is far away from practice for all the access
networks to simultaneously deploy SAVI. Therefore, in order to
mitigate the security risks raised by source address spoofing, SAV
performed in network border routers is also necessary. Although it
does not provide the same filtering granualarity as SAVI does, it
still helps the tracing of spoofing to a minimized network range.
Ingress ACLs [RFC2827], typically performed at the network border
routers, is performed by manually maintaining a traffic filtering
access list which contains acceptable source address for each
interface. Only packets with a source address encompassed in the
access list can be accepted. It strictly specifies the source
address space of incoming packets. However, manual configuration
brings scalability and reliability issues.
Strict uRPF, typically performed at the network (IGP areas or ASes)
boarder routers, requires that a data packet can be only accepted
when the FIB contains a prefix that encompasses the source address
and the corresponding out-interface matches the data incoming
Li, et al. Expires January 13, 2021 [Page 3]
Internet-Draft SAVA Intra-domain Use Cases July 2020
interface. It has the advantages of simple operation, easy
deployment, and automatic update. However, in the case of
multihoming, when the data imcoming interface is different from the
out-interface of the packet source IP address, using the longest
prefix match , also refered to as asymmetric routing of data packets,
Strict uRPF exibits false positive.
Loose uRPF, sacrificing the directionality of Strict uRPF, only
requires that the packet's source IP exists as a FIB entry.
Intuitively, Loose uRPF cannot prevent the attacker from forging a
source address that already exists in the FIB.
Feasible uRPF, typically performed at the network border routers,
helps mitigate false positive of Strict uRPF in the multihoming
scenarios. Instead of installing only the best route into FIB as
Strict uRPF does, Feasible uRPF installs all alternative paths into
the FIB. It helps reduce false positive filtering compared with the
Strict uRPF, in the case when multiple paths are learnt from
different interfaces. However, it should be noted that Feasible uRPF
only works when multiple paths is learnt. There are cases when a
device only learns one path but still has packets coming from other
valid interfaces.
EFP-uRPF, specifically performed at the AS border routers, further
improves Feasible uRPF in the inter-AS scenario. An AS performing
EFP-uRPF maintains an individual RPF list on every customer/peer
interface. It introduces two algorihtms (i.e., Algorithm A and
Algorithm B) regarding different application scenarios. In the case
that a customer interface fails to learn any route from the directly
connected customer AS, enabling Algorithm A at this customer
interface may exibit false postive filtering. In this case, enabling
Algorithm B may mitigate the false positive. However, in case of
directly connected customer ASes spoofing each other, Algorithm B
exibits false negative.
1.3. SAV Requirements and Challenges
As the above overview indicates, to evaluate the quality of a
specific SAV technique, one should balance between two general
requirements: precise filtering and automatic implementation.
o Precise filtering: Two important indicators for precise filtering.
1) 0% false positive. If legitimate packets may be dropped, it
can seriously affect the user's internet experience. 2) 0% false
negative. If some packets with a forged source address may pass
through the SAV smoothly, it will pose potential security risks.
Li, et al. Expires January 13, 2021 [Page 4]
Internet-Draft SAVA Intra-domain Use Cases July 2020
o Automatic implementation: In reality, the address space of an
administrative domain (AD) may grow or update, and the routing
policy within the address domain may be dynamically adjusted. One
solution that relies entirely on manual configuration is neither
scalable nor easy to deploy.
Then to consider the whole network SAV soltuion, one should never
rely on a single point but a systematic SAV technique combination
depoyled at different network levels. As shown in Figure 1, packet
filtering at different levels from the access network to the AS
boarder are all needed. In Figure 1, the administrive domain (AD)
concept is used, which refers to a network domain managed by the same
operator (OTT, ISP and so on). One AD is allowed to be divided into
several sub-ADs and managed by different inner groups. There may
exist different levels for sub-ADs. For example, sub-AD1 is the
upper level compared to sub-AD2, meaning that sub-AD2 needs to
connect through sub-AD1 for external reachability (i.e., networks
outside AD1). So filtering at sub-AD boarders (between different
levels and within the same level) is also necessary. Further,
different sub-ADs can belong to one single AS or multiple ASes, which
makes the filtering at the sub-AD boarders either intra-AS filtering
or inter-AS filetering. In the rest of this document, we use the
term SAVA (SAV architecture) to refer to the discussion of the
systematic SAV solution.
Li, et al. Expires January 13, 2021 [Page 5]
Internet-Draft SAVA Intra-domain Use Cases July 2020
+-------------------------------------+
| AD1 |
| |
| +---------------------------------+ |
| | Sub-AD1 +--------+ | |
| | |Router 4| | | +-------------+
| | +--X---X-+ | | | AD2 |
| | X X | | | +--------+ |
| | X X | | +-----------+Router 6| |
| | X X | | + | +--------+ |
| | +---X----+ +---X+--------+ SAVA-Inter| |
| | |Router 2| |Router 3| | | Domain | |
| | +--- X---+ +--X+-----------+ | +--------+ |
| +-------- X ---------- X ---------+ | +-----------+Router 5| |
| X X SAVA-Intra | | +--------+ |
| +-----------+X------ X+--Domain---+ | +-------------+
| | sub-AD2 +X-----X-+ | |
| | |Router 1| | |
| | ++-----+-+ | |
| | | | | |
| | | | | |
| | | | | |
| | +-------++ ++-------+ | |
| | |Switch 1| |Switch 2| | |
| | ++------++ ++-------+ | |
| | | | | SAVA-Access| |
| | | | | (SAVI) | |
| | | | | | | |
| | +--+-+ +--+-+ ++---+ ++---+ | |
| | |Host| |Host| |Host| |Host| | |
| | +----+ +----+ +----+ +----+ | |
| +---------------------------------+ |
| |
+-------------------------------------+
Figure 1: SAVA
Looking back at specific SAV approaches, most limitations are caused
by multihoming. Further, it is due to the routing information
asymmetry at the mutil-homed devices. This document identifies two
specific scenarios where existing SAV techniques fail to meet the
above mentioned requirements.
2. Terminology
IGP: Interior Gateway Protocol
IS-IS: Intermediate System to Intermediate System
Li, et al. Expires January 13, 2021 [Page 6]
Internet-Draft SAVA Intra-domain Use Cases July 2020
BGP: Boarder Gateway Protocol
FIB: Forwarding Information Base
SAV: Source Address Validation
SAVA: Source Address Validation Architecture
AD: Administrative Domain
3. Problem Statement
As stated in Section 1.3, existing methods, e.g., Loose/Strict mode
uRPF, FP-uRPF, EFP-uRPF are not able to achieve 100% accurate
filtering (i.e., 0% FN and 0% FP) in certain scenarios. This
document specifically indicate two typical intra-domain cases that
conventional approaches fail to cover: 1) all sub-ADs are under the
same AS; 2) sub-ADs are under different ASes.
3.1. SAVA Intra-domain Use Case 1: Intra-AS Multi-homing
Figure 2 illustrates an intra-AS multihoming case, where sub-AD1,
sub-AD2 and sub-AD3 are under the same AS.
Router 1 is multi-homed to Router 2 and Router 3. Router 1 doesn't
announce any of its routes to Router 2 nor Router 3. Static routes
are configured on Router 1, Router 2 and Router 3. Supposely, both
Router 2 and Router 3 should have static routes P1/P2 with Router 1
as next hop configured. However, due to configuration error, or
traffic control purpose, on Router 3, no P1/P2 static routes are
configured. Router 2 and Router 3 are connected with ISIS or OSPF.
P1/P2 are flooded from Router 2 to Router 3.
Router 5 is single-homed to Router 3. Router 5 announces P3 to
Router 3 using ISIS or OSPF. Router 3 floods P3 to Router 2 .
Now suppose two data flow coming from Router 1 to Router 3: Flow 1
with source IP as P1, and Flow 2 with source IP as P3 (IP spoofing).
Using existing SAV methods at Router 3, Flow 1 is supposed to be
passed, while Flow 2 is supposed to be dropped.
o Loose uRPF: works for Flow 1, but fails for Flow 2.
o Strict uRPF: works for Flow 2, but fails for Flow 1 (the incoming
interface does not match P1/P2's out-interface).
o FP-uRFP: works for Flow 2, but fails for Flow 1 (no feasible path
for P1/P2 other than the best route exists).
Li, et al. Expires January 13, 2021 [Page 7]
Internet-Draft SAVA Intra-domain Use Cases July 2020
o EFP-uRPF: does not apply at the intra-AS case.
+----------------------------------------------------------------+
| AS +--------------------------------+ |
| |sub-AD1 +--------+ | |
|Static: | |Router 4| | Static: NA |
|Prefix: P1 | +--X---X-+ | |
|NH: Router 1 | X X | IGP: |
|Prefix: P2 | X X | Prefix: P1 |
|NH: Router 1 | +--------+ [P1,P2] +--------+ | NH: Router 2 |
| | | +----------> | | Prefix: P2 |
|IGP: | |Router 2| |Router 3| | NH: Router 2 |
|Prefix: P3 | | +<---------+ | | Prefix: P3 |
|NH: Router 3 | +--------+ [P3] +--------+ | NH: Router 5 |
| +-------X---------------X------X-+ |
| X X X |
| [no prefix adv] [no prefix adv] X [P3] |
| X X X |
| +----------+X------ X+----------+ +--X+---------+ |
| |sub-AD2 +X-----X-+ | |sub-AD3 | |
| | |Router 1| | | +---X----- | |
| | ++-----+-+ | | |Router 5| | |
| | P1 | | P2 | | +--------- | |
| | | | | | P3 | |
| | +-------++ ++-------+ | +-------------+ |
| | |Switch 1| |Switch 2| | |
| | ++------++ ++------++ | |
| | | | | | | |
| | +--+-+ +--+-+ ++---+ ++---+ | |
| | |Host| |Host| |Host| |Host| | |
| | +----+ +----+ +----+ +----+ | |
| +-------------------------------+ |
+----------------------------------------------------------------+
Figure 2: Asymmetric data flow in the Intra-AS scenario
3.2. SAVA Intra-domain Use Case 2: Inter-AS Multihoming
Figure 3 illustrates an inter-AS multihoming case, where sub-AD1,
sub-AD2 and sub-AD3 are under three different ASes.
Router 1 (AS2) is multi-homed to Router 2 (AS1) and Router 3 (AS1).
Router 1 announces P1/P2 to Router 2 through BGP. Router 1 doesn't
announce any of its routes to Router 3 due to policy control. P1/P2
are propagated from Router 2 to Router 3 through BGP.
Li, et al. Expires January 13, 2021 [Page 8]
Internet-Draft SAVA Intra-domain Use Cases July 2020
Router 5 (AS3) is single-homed to Router 3 (AS1). Router 5 announces
P3 to Router 3 through BGP. Router 3 propagates P3 to Router 2
through BGP.
Now suppose two data flow coming from Router 1 to Router 3: Flow 1
with source IP as P1, and Flow 2 with source IP as P3 (IP spoofing).
Using existing SAV methods at Router 3, Flow 1 is supposed to be
passed, while Flow 2 is supposed to be dropped.
o Loose uRPF: works for Flow 1, but fails for Flow 2.
o Strict uRPF: works for Flow 2, but fails for Flow 1 (the incoming
interface does not match P1/P2's out-interface).
o FP-uRFP: works for Flow 2, but fails for Flow 1 (no feasible path
for P1/P2 other than the best route exists).
o EFP-uRPF: works for Flow 1, but fails for Flow 2 using Algorithm
B. Works for Flow 2, but fails for Flow 1 when using Algorithm A.
Li, et al. Expires January 13, 2021 [Page 9]
Internet-Draft SAVA Intra-domain Use Cases July 2020
+----------------------------------------------------------------+
| +--------------------------------+ |
| |sub-AD1 +--------+ | |
| |AS1 |Router 4| | |
| BGP: | +--X---X-+ | BGP: |
| Prefix: P1 | X X | Prefix: P1 |
| NH: Router 1| X X | NH: Router 2 |
| Prefix: P2 | +--------+ [P1,P2] +--------+ | Prefix: P2 |
| NH: Router 1| | +----------> | | NH: Router 2 |
| | |Router 2| |Router 3| | |
| Prefix: P3 | | +<---------+ | | Prefix: P3 |
| NH: Router 3| +--------+ [P3] +--------+ | NH: Router 5 |
| +-------X---------------X------X-+ |
| X X X |
| [P1/P2] X [no prefix adv] X [P3] |
| X X X |
| +----------+X------ X+----------+ +--X+---------+ |
| |sub-AD2 +X-----X-+ | |sub-AD3 | |
| |AS2 |Router 1| | |AS3 X | |
| | ++-----+-+ | | +---X----- | |
| | P1 | | P2 | | |Router 5| | |
| | | | | | +--------- | |
| | +-------++ ++-------+ | | P3 | |
| | |Switch 1| |Switch 2| | +-------------+ |
| | ++------++ ++------++ | |
| | | | | | | |
| | +--+-+ +--+-+ ++---+ ++---+ | |
| | |Host| |Host| |Host| |Host| | |
| | +----+ +----+ +----+ +----+ | |
| +-------------------------------+ |
+----------------------------------------------------------------+
Figure 3: Asymmetric data flow in the Inter-AS scenario
4. Solution Consideration
Both EFP-uRPF and FP-uRPF try to achieve a balance between
flexibility (Loose uRPF) and directionality (Strict uRPF).
In the inter-AS multi-homing scenario, EFP-uRPF further improves FR-
uRPF's directionality, thanks to the availability of the route origin
information. More specifically, the construction of RPF lists using
EFP-uRPF Algorithm A or B is augmented with data from Route Origin
Authorization (ROA) [RFC6482], as well as Internet Routing Registry
(IRR) data, making EFP-uRPF performing better than FR-uRPF regarding
directionality. In fact, the global availability of ROA and IRR
databeses provides a way for the multiple transit providers of the
Li, et al. Expires January 13, 2021 [Page 10]
Internet-Draft SAVA Intra-domain Use Cases July 2020
same multihomed network to share such information without extra way
of data syncronization.
In addition, although ERP-uRPF is striving for more accurate RPF list
construction, there's still currenly no way of constructing an 100%-
accurate RPF list in the case shown in Figure 3. In order to to
conquer such problem, it could help if devices in the upper level
sub-AD(s) (i.e., Router 2 and Router 3) can share more information
with each other through certain way.
What's worse, in case of the intra-AS multi-homing, as indicated in
Figure2, there's no such prefix to sub-AD mapping (e.g., P3
originates from sub-AD3) database publiclly available as ROA or IRR
database, or automatically retrievable as RPKI ROA through RTR
protocol [RFC8210]. Thus, enhancing such information sharing between
devices of the upper level sub-AD(s) (i.e., Router 2 and Router 3)
for the same multi-homed network, by extending certain routing
protocols, could be a possible way.
5. Security Considerations
TBD
6. Contributors
TBD
7. Acknowledgments
TBD
8. Normative References
[I-D.brockners-inband-oam-requirements]
Brockners, F., Bhandari, S., Dara, S., Pignataro, C.,
Gredler, H., Leddy, J., Youell, S., Mozes, D., Mizrahi,
T., Lapukhov, P., and r. remy@barefootnetworks.com,
"Requirements for In-situ OAM", draft-brockners-inband-
oam-requirements-03 (work in progress), March 2017.
[I-D.ietf-grow-bmp-adj-rib-out]
Evens, T., Bayraktar, S., Lucente, P., Mi, K., and S.
Zhuang, "Support for Adj-RIB-Out in BGP Monitoring
Protocol (BMP)", draft-ietf-grow-bmp-adj-rib-out-07 (work
in progress), August 2019.
Li, et al. Expires January 13, 2021 [Page 11]
Internet-Draft SAVA Intra-domain Use Cases July 2020
[I-D.ietf-grow-bmp-local-rib]
Evens, T., Bayraktar, S., Bhardwaj, M., and P. Lucente,
"Support for Local RIB in BGP Monitoring Protocol (BMP)",
draft-ietf-grow-bmp-local-rib-07 (work in progress), May
2020.
[I-D.ietf-netconf-yang-push]
Clemm, A. and E. Voit, "Subscription to YANG Datastores",
draft-ietf-netconf-yang-push-25 (work in progress), May
2019.
[I-D.openconfig-rtgwg-gnmi-spec]
Shakir, R., Shaikh, A., Borman, P., Hines, M., Lebsack,
C., and C. Morrow, "gRPC Network Management Interface
(gNMI)", draft-openconfig-rtgwg-gnmi-spec-01 (work in
progress), March 2018.
[I-D.song-ntf]
Song, H., Zhou, T., Li, Z., Fioccola, G., Li, Z.,
Martinez-Julia, P., Ciavaglia, L., and A. Wang, "Toward a
Network Telemetry Framework", draft-song-ntf-02 (work in
progress), July 2018.
[RFC1157] Case, J., Fedor, M., Schoffstall, M., and J. Davin,
"Simple Network Management Protocol (SNMP)", RFC 1157,
DOI 10.17487/RFC1157, May 1990,
<https://www.rfc-editor.org/info/rfc1157>.
[RFC1191] Mogul, J. and S. Deering, "Path MTU discovery", RFC 1191,
DOI 10.17487/RFC1191, November 1990,
<https://www.rfc-editor.org/info/rfc1191>.
[RFC1195] Callon, R., "Use of OSI IS-IS for routing in TCP/IP and
dual environments", RFC 1195, DOI 10.17487/RFC1195,
December 1990, <https://www.rfc-editor.org/info/rfc1195>.
[RFC1213] McCloghrie, K. and M. Rose, "Management Information Base
for Network Management of TCP/IP-based internets: MIB-II",
STD 17, RFC 1213, DOI 10.17487/RFC1213, March 1991,
<https://www.rfc-editor.org/info/rfc1213>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
Li, et al. Expires January 13, 2021 [Page 12]
Internet-Draft SAVA Intra-domain Use Cases July 2020
[RFC2827] Ferguson, P. and D. Senie, "Network Ingress Filtering:
Defeating Denial of Service Attacks which employ IP Source
Address Spoofing", BCP 38, RFC 2827, DOI 10.17487/RFC2827,
May 2000, <https://www.rfc-editor.org/info/rfc2827>.
[RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, V.,
and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP
Tunnels", RFC 3209, DOI 10.17487/RFC3209, December 2001,
<https://www.rfc-editor.org/info/rfc3209>.
[RFC3704] Baker, F. and P. Savola, "Ingress Filtering for Multihomed
Networks", BCP 84, RFC 3704, DOI 10.17487/RFC3704, March
2004, <https://www.rfc-editor.org/info/rfc3704>.
[RFC3719] Parker, J., Ed., "Recommendations for Interoperable
Networks using Intermediate System to Intermediate System
(IS-IS)", RFC 3719, DOI 10.17487/RFC3719, February 2004,
<https://www.rfc-editor.org/info/rfc3719>.
[RFC3988] Black, B. and K. Kompella, "Maximum Transmission Unit
Signalling Extensions for the Label Distribution
Protocol", RFC 3988, DOI 10.17487/RFC3988, January 2005,
<https://www.rfc-editor.org/info/rfc3988>.
[RFC6232] Wei, F., Qin, Y., Li, Z., Li, T., and J. Dong, "Purge
Originator Identification TLV for IS-IS", RFC 6232,
DOI 10.17487/RFC6232, May 2011,
<https://www.rfc-editor.org/info/rfc6232>.
[RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed.,
and A. Bierman, Ed., "Network Configuration Protocol
(NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011,
<https://www.rfc-editor.org/info/rfc6241>.
[RFC6959] McPherson, D., Baker, F., and J. Halpern, "Source Address
Validation Improvement (SAVI) Threat Scope", RFC 6959,
DOI 10.17487/RFC6959, May 2013,
<https://www.rfc-editor.org/info/rfc6959>.
[RFC7039] Wu, J., Bi, J., Bagnulo, M., Baker, F., and C. Vogt, Ed.,
"Source Address Validation Improvement (SAVI) Framework",
RFC 7039, DOI 10.17487/RFC7039, October 2013,
<https://www.rfc-editor.org/info/rfc7039>.
Li, et al. Expires January 13, 2021 [Page 13]
Internet-Draft SAVA Intra-domain Use Cases July 2020
[RFC7752] Gredler, H., Ed., Medved, J., Previdi, S., Farrel, A., and
S. Ray, "North-Bound Distribution of Link-State and
Traffic Engineering (TE) Information Using BGP", RFC 7752,
DOI 10.17487/RFC7752, March 2016,
<https://www.rfc-editor.org/info/rfc7752>.
[RFC7854] Scudder, J., Ed., Fernando, R., and S. Stuart, "BGP
Monitoring Protocol (BMP)", RFC 7854,
DOI 10.17487/RFC7854, June 2016,
<https://www.rfc-editor.org/info/rfc7854>.
[RFC8210] Bush, R. and R. Austein, "The Resource Public Key
Infrastructure (RPKI) to Router Protocol, Version 1",
RFC 8210, DOI 10.17487/RFC8210, September 2017,
<https://www.rfc-editor.org/info/rfc8210>.
[RFC8231] Crabbe, E., Minei, I., Medved, J., and R. Varga, "Path
Computation Element Communication Protocol (PCEP)
Extensions for Stateful PCE", RFC 8231,
DOI 10.17487/RFC8231, September 2017,
<https://www.rfc-editor.org/info/rfc8231>.
[RFC8704] Sriram, K., Montgomery, D., and J. Haas, "Enhanced
Feasible-Path Unicast Reverse Path Forwarding", BCP 84,
RFC 8704, DOI 10.17487/RFC8704, February 2020,
<https://www.rfc-editor.org/info/rfc8704>.
Authors' Addresses
Dan Li
Tsinghua
Beijing
China
Email: tolidan@tsinghua.edu.cn
Jianping Wu
Tsinghua
Beijing
China
Email: jianping@cernet.edu.cn
Li, et al. Expires January 13, 2021 [Page 14]
Internet-Draft SAVA Intra-domain Use Cases July 2020
Yunan Gu
Huawei
Beijing
China
Email: guyunan@huawei.com
Lancheng Qin
Tsinghua
Beijing
China
Email: qlc19@mails.tsinghua.edu.cn
Tao Lin
H3C
Beijing
China
Email: lintao@h3c.com
Li, et al. Expires January 13, 2021 [Page 15]