<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-geng-savnet-inter-domain-spa-02" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="SPA for Inter-domain SAVNET">Source Prefix Advertisement for Inter-domain SAVNET</title>
    <seriesInfo name="Internet-Draft" value="draft-geng-savnet-inter-domain-spa-02"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="K." surname="Sriram" fullname="Kotikalapudi Sriram">
      <organization>USA NIST</organization>
      <address>
        <postal>
          <city>Gaithersburg, MD 20899</city>
          <country>United States of America</country>
        </postal>
        <email>ksriram@nist.gov</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 62?>

<t>This document proposes a mechanism that enables neighboring ASes (Source ASes) to actively advertise their locally observed Customer Cone and prefix information via a new inter-domain message called Source Prefix Advertisement (SPA). The validating AS then combines this SPA-carried information with local source address validation-related information to construct more accurate prefix allowlists for interfaces connected to Source ASes.</t>
    </abstract>
  </front>
  <middle>
    <?line 66?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>The EFP-uRPF technique <xref target="RFC8704"/> performs effective source address filtering on customer interfaces and lateral peer interfaces. It constructs a source prefix allowlist for each customer or lateral peer interface based on the Customer Cone of the neighboring AS. Data packets received from a customer or lateral peer are only permitted if their source addresses fall within the Customer Cone of that neighbor. The enforcement is thus strictly limited to the Customer Cone of the respective neighbor, which includes the AS and the prefixes originated or delegated by the customer or lateral peer.</t>
      <t>Building an accurate prefix set representing the Customer Cone is therefore critical to the correct operation of these source address validation mechanisms. However, a locally constructed Customer Cone prefix set may not be accurate and can differ from the actual Customer Cone prefix set observed by the neighbor (i.e., the customer or lateral peer). This discrepancy can arise due to various factors, including BGP no-export communities, Direct Server Return (DSR), complex inter-domain commercial relationships (e.g., partial transit relationships), and other routing policy differences. Such inaccuracies may result in false positives (legitimate packets being incorrectly filtered) or false negatives (illegitimate packets being incorrectly allowed), which degrade the effectiveness and dependability of the source address validation mechanism. A concrete analysis of existing inter-domain Source Address Validation (SAV) mechanisms can be found in <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>.</t>
      <t>To address this problem, this document proposes a mechanism called Inter-domain Source Prefix Advertisement (SPA). A neighboring AS (either a customer or a lateral peer) actively advertise the prefix information and Customer Cone information that it observes locally. The advertised information helps the local AS construct a more accurate prefix allowlist on the corresponding customer or lateral peer interface. This mechanism follows the idea presented in <xref target="I-D.ietf-savnet-inter-domain-architecture"/> regarding the exchange of SAV-specific information between ASes. To carry such source prefix information between ASes, a new inter-domain SPA message is defined.</t>
      <t>Protocol extensions for the mechanism proposed in this document are out of scope.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Source Prefix Advertisement (SPA): The process that an AS can actively advertise the prefix information and Customer Cone information that it observes locally to a neighboring AS through the messages called SPA messages.</t>
        <t>Source AS: The AS which originates SPA messages to the Validating AS. Source AS is typically the customer or lateral peer of Validating AS.</t>
        <t>Validating AS: The AS which receives SPA messages from the Source AS, generates SAV rules, and conducts source address validation. Validating AS is typically the provider or lateral peer of Source AS.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-spa">
      <name>Inter-domain Source Prefix Advertisement</name>
      <t>The mechanism proposed in this document generally consists of the following three steps:</t>
      <figure anchor="fig-overview">
        <name>An overview of the inter-domain SPA mechanism.</name>
        <artwork><![CDATA[
    +-----------------+
    |  Validating AS  | Step3: Constrcut prefix list
    +------+/\+-------+ by combining EFP-uRPF and SPA
            |
            |
            | Step2: Advertise Customer Cone and 
            | Prefix set through SPA
            |
            |
    +-----------------+
    |    Source AS    | Step1: Construct Customer Cone
    +-----------------+ and prefix set
]]></artwork>
      </figure>
      <section anchor="step-1-construct-customer-cone-and-prefix-set-at-source-as">
        <name>Step 1: Construct Customer Cone and Prefix Set at Source AS</name>
        <t>First, the neighboring AS, referred to as the Source AS, constructs the Customer Cone and its corresponding prefix set based on its local observations, with specific considerations for the following factors to ensure the comprehensiveness and accuracy of the constructed set:</t>
        <t>Step 1.1: The Source AS constructs the Customer Cone (which includes itself) and the corresponding prefix set by integrating multiple authoritative data sources, primarily including local BGP routing information and RPKI data. This integration ensures that the prefix set is initially grounded in verifiable and widely-recognized routing and resource validation information.</t>
        <t>Step 1.2: For prefixes hidden in the DSR scenarios where prefixes that are not propagated through standard BGP routing and thus not captured by the above data sources, the Source AS adds such hidden prefixes to the constructed prefix set through administrative configuration. This step addresses the invisibility of DSR-related prefixes in normal routing propagation, preventing their omission from the Customer Cone.</t>
        <t>Step 1.3: If the Source AS itself acts as a Validating AS for its downstream neighboring ASes (which serve as Source ASes relative to it), it incorporates the prefix information carried in the SPA messages received from these downstream Source ASes. By integrating this SPA-sourced information with the locally derived Customer Cone and prefix data, the Source AS constructs a complete and accurate prefix set that reflects both its own resource scope and the valid prefixes of its downstream neighbors.</t>
      </section>
      <section anchor="step-2-advertise-customer-cone-and-prefix-set-through-spa">
        <name>Step 2: Advertise Customer Cone and Prefix Set through SPA</name>
        <t>Second, the Source AS generates SPA messages — a new inter-domain message specifically defined in this document to carry Customer Cone and prefix information between ASes — and advertises the locally observed Customer Cone and its corresponding prefix set to the adjacent Validating AS (the AS responsible for performing source address validation on the interface connecting the two ASes). The detailed implementation of this step is as follows:</t>
        <t>The Source AS may transmit the following required information to the Validating AS via one or more SPA messages:</t>
        <ul spacing="normal">
          <li>
            <t>The set of AS numbers belonging to the Customer Cone observed locally by the Source AS. This set includes the Source AS itself and all ASes within its Customer Cone, providing the Validating AS with the hierarchical scope of the Source AS's Customer Cone.</t>
          </li>
          <li>
            <t>The source prefix set of the Customer Cone observed locally by the Source AS. This set comprises all valid prefixes originated, delegated, or associated with the Customer Cone (including DSR-hidden prefixes added via administrative configuration, as specified in Step 1).</t>
          </li>
          <li>
            <t>The AS number of the Source AS. This field serves as an identifier to enable the Validating AS to associate the received SPA message with the correct neighboring AS and the corresponding interface, avoiding confusion when multiple neighbors send SPA messages.</t>
          </li>
          <li>
            <t>An Update/Withdraw Flag. This flag is used to explicitly indicate whether the information carried in the SPA message is intended to update the existing Customer Cone or prefix set information (Update Flag) or to withdraw previously advertised Customer Cone or prefix set information (Withdraw Flag). This ensures the Validating AS can dynamically maintain the accuracy of its prefix allowlists as the Source AS's Customer Cone changes over time.</t>
          </li>
        </ul>
        <t>Upon receiving SPA messages from the Source AS, the Validating AS may propagate the received Customer Cone and prefix information within its own AS. However, the Validating AS <bcp14>MUST NOT</bcp14> propagate the received SPA messages to other ASes.</t>
        <t>It should be noted that detailed implementation aspects such as the specific session establishment method between the Source AS and the Validating AS, potential capability negotiation processes (e.g., confirming support for SPA messages), and the encapsulation format of SPA messages are out of the scope of this document and shall be defined in subsequent protocol extension documents.</t>
      </section>
      <section anchor="step-3-construct-prefix-list-by-combining-efp-urpf-and-spa">
        <name>Step 3: Construct Prefix List by Combining EFP-uRPF and SPA</name>
        <t>Third, the Validating AS constructs an accurate prefix allowlist for the interface connecting to the Source AS, following the core logic of the EFP-uRPF algorithm <xref target="RFC8704"/> and integrating the information received from SPA messages. The detailed implementation of this step is as follows:</t>
        <t>Step 3.1: The Validating AS enables the EFP-uRPF algorithm (or some other algorithms like BAR-SAV <xref target="I-D.ietf-sidrops-bar-sav"/>) on the specific interface through which it receives SPA messages from the Source AS. This ensures that the source address validation mechanism is activated for the connection to that neighbor, aligning with the foundational approach of EFP-uRPF for customer and lateral peer interfaces.</t>
        <t>Step 3.2: The Validating AS merges two sets of information to form a complete and accurate prefix set for the interface: one is the Customer Cone and its corresponding prefix set generated locally by the Validating AS in accordance with the EFP-uRPF algorithm specified in <xref target="RFC8704"/> (integrating local BGP routing information, RPKI data, and other relevant sources); the other is the Customer Cone and prefix set information carried in the SPA messages advertised by the Source AS.</t>
        <t>This merging process supplements the locally generated prefix set with the Source AS's observed Customer Cone and prefix information—information that the Validating AS may not be able to obtain through existing mechanisms due to factors such as BGP no-export communities or DSR. As a result, the combined prefix set becomes more comprehensive and accurate, effectively mitigating the risks of false positives and false negatives caused by incomplete locally constructed Customer Cone prefix sets.</t>
      </section>
      <section anchor="special-usage-of-inter-domain-spa">
        <name>Special Usage of Inter-domain SPA</name>
        <t>In the descriptions above, the information carried in SPA messages is merged into the information generated by the EFP-uRPF algorithm to enhance the comprehensiveness of the prefix allowlist. This section introduces a special usage of SPA messages: the Source AS may advertise SPA messages to instruct the Validating AS to remove specific AS numbers or source prefixes from the information generated by the EFP-uRPF algorithm on the corresponding interface.</t>
        <t>A typical application scenario for this special usage involves partial transit services. Specifically, a customer AS under the Source AS may purchase partial transit services for certain address prefixes from the Source AS. Traffic related to these address prefixes is only forwarded within the Customer Cone of the Source AS and will not access the external Internet through the connection between the Source AS and the Validating AS.</t>
        <t>In this scenario, the Source AS will not advertise these address prefixes to the Validating AS via BGP, as the partial transit service does not require propagating these prefixes to the external Internet. However, the Validating AS may still include these prefixes in the prefix allowlist of the interface connected to the Source AS. This can occur in two common cases: first, the customer AS of the Source AS may advertise these prefixes through other ASes, which are then propagated to the Validating AS; second, the customer AS may have registered RPKI ROA data for these prefixes, which the Validating AS obtains and uses to construct the prefix allowlist.</t>
        <t>To address this issue, the Source AS can advertise an SPA message carrying these specific address prefixes, explicitly instructing the Validating AS not to include these prefixes in the source prefix allowlist of the connected interface. This approach offers a key benefit: if the Source AS inadvertently leaks the prefixes related to the partial transit service, or if forged traffic using these prefixes originates within the Source AS's Customer Cone and is sent to the external Internet, the Validating AS can effectively intercept such traffic by excluding these prefixes from the allowlist, thereby enhancing the security of inter-domain source address.</t>
      </section>
    </section>
    <section anchor="sec-ops-deploy">
      <name>Operational and Deployment Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The mechanism proposed in this document operates between adjacent ASes. For the secure exchange of SPA messages between the Source AS and the Validating AS, existing BGP session protection mechanisms can be adopted, including GTSM/TTL-security <xref target="RFC5082"/>, BGP-MD5, and TCP-AO <xref target="RFC5925"/>. These mechanisms help ensure the confidentiality, integrity, and authenticity of SPA messages, preventing unauthorized tampering, eavesdropping, or spoofing of the message content during transmission. More Detailed guidelines can be found in Section 5 of <xref target="RFC7454"/> and Section 3 of <xref target="I-D.ietf-grow-bgpopsecupd"/>.</t>
      <t>Notably, the scope of influence of the Source AS is strictly limited to the prefix allowlist of the interface on the Validating AS that is directly connected to the Source AS. The information advertised by the Source AS via SPA messages directly determines whether the legitimate traffic sent from the Source AS to the Validating AS can pass source address validation, as well as whether attacks originating from the Source AS can be effectively intercepted by the Validating AS.</t>
      <t>This limited scope of influence inherently mitigates the risk of malicious behavior by the Source AS. Specifically, the Source AS has little incentive to intentionally advertise incorrect or malicious SPA information. Any false or malicious SPA advertisements would either result in legitimate traffic from the Source AS being incorrectly filtered (a false positive) or fail to intercept attacks originating from the Source AS (a false negative)—both of which are detrimental to the Source AS's own network connectivity and security.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>There is no IANA requirement.</t>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks a lot for the comments from Jeff Hass and Igor Lubashev.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-14" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Gap Analysis, Problem Statement, and Requirements for Inter-Domain SAV</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="14" month="February" year="2026"/>
            <abstract>
              <t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-14"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-architecture-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li"/>
            <author fullname="Li Chen"/>
            <author fullname="Nan Geng"/>
            <author fullname="Libin Liu"/>
            <author fullname="Lancheng Qin"/>
            <date day="1" month="March" year="2026"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for
   performing AS-level SAV and provides a comprehensive framework for
   guiding the design of inter-domain SAV mechanisms.  The proposed
   architecture empowers ASes to generate SAV rules by sharing SAV-
   specific information between themselves, which can be used to
   generate more accurate and trustworthy SAV rules in a timely manner
   compared to the general information.  During the incremental or
   partial deployment of SAV-specific information, it can utilize
   general information to generate SAV rules, if an AS's SAV-specific
   information is unavailable.  Rather than delving into protocol
   extensions or implementations, this document primarily concentrates
   on proposing SAV-specific and general information and guiding how to
   utilize them to generate SAV rules.  To this end, it also defines
   some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-architecture-03"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-sidrops-bar-sav" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-bar-sav-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-bar-sav.xml">
          <front>
            <title>Source Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-SAV)</title>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <author fullname="Igor Lubashev" initials="I." surname="Lubashev">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Doug Montgomery" initials="D." surname="Montgomery">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>Designing an efficient source address validation (SAV) filter requires minimizing false positives (i.e., avoiding blocking legitimate traffic) while maintaining directionality (see RFC8704). This document advances the technology for SAV filter design through a method that makes use of BGP UPDATE messages, Autonomous System Provider Authorization (ASPA), and Route Origin Authorization (ROA). The proposed method's name is abbreviated as BAR-SAV. BAR-SAV can be used by network operators to derive more robust SAV filters and thus improve network resilience. This document updates RFC8704.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-bar-sav-08"/>
        </reference>
        <reference anchor="RFC5082" target="https://www.rfc-editor.org/info/rfc5082" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5082.xml">
          <front>
            <title>The Generalized TTL Security Mechanism (GTSM)</title>
            <author fullname="V. Gill" initials="V." surname="Gill"/>
            <author fullname="J. Heasley" initials="J." surname="Heasley"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <author fullname="P. Savola" initials="P." role="editor" surname="Savola"/>
            <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
            <date month="October" year="2007"/>
            <abstract>
              <t>The use of a packet's Time to Live (TTL) (IPv4) or Hop Limit (IPv6) to verify whether the packet was originated by an adjacent node on a connected link has been used in many recent protocols. This document generalizes this technique. This document obsoletes Experimental RFC 3682. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5082"/>
          <seriesInfo name="DOI" value="10.17487/RFC5082"/>
        </reference>
        <reference anchor="RFC5925" target="https://www.rfc-editor.org/info/rfc5925" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5925.xml">
          <front>
            <title>The TCP Authentication Option</title>
            <author fullname="J. Touch" initials="J." surname="Touch"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document specifies the TCP Authentication Option (TCP-AO), which obsoletes the TCP MD5 Signature option of RFC 2385 (TCP MD5). TCP-AO specifies the use of stronger Message Authentication Codes (MACs), protects against replays even for long-lived TCP connections, and provides more details on the association of security with TCP connections than TCP MD5. TCP-AO is compatible with either a static Master Key Tuple (MKT) configuration or an external, out-of-band MKT management mechanism; in either case, TCP-AO also protects connections when using the same MKT across repeated instances of a connection, using traffic keys derived from the MKT, and coordinates MKT changes between endpoints. The result is intended to support current infrastructure uses of TCP MD5, such as to protect long-lived connections (as used, e.g., in BGP and LDP), and to support a larger set of MACs with minimal other system and operational changes. TCP-AO uses a different option identifier than TCP MD5, even though TCP-AO and TCP MD5 are never permitted to be used simultaneously. TCP-AO supports IPv6, and is fully compatible with the proposed requirements for the replacement of TCP MD5. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5925"/>
          <seriesInfo name="DOI" value="10.17487/RFC5925"/>
        </reference>
        <reference anchor="RFC7454" target="https://www.rfc-editor.org/info/rfc7454" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7454.xml">
          <front>
            <title>BGP Operations and Security</title>
            <author fullname="J. Durand" initials="J." surname="Durand"/>
            <author fullname="I. Pepelnjak" initials="I." surname="Pepelnjak"/>
            <author fullname="G. Doering" initials="G." surname="Doering"/>
            <date month="February" year="2015"/>
            <abstract>
              <t>The Border Gateway Protocol (BGP) is the protocol almost exclusively used in the Internet to exchange routing information between network domains. Due to this central nature, it is important to understand the security measures that can and should be deployed to prevent accidental or intentional routing disturbances.</t>
              <t>This document describes measures to protect the BGP sessions itself such as Time to Live (TTL), the TCP Authentication Option (TCP-AO), and control-plane filtering. It also describes measures to better control the flow of routing information, using prefix filtering and automation of prefix filters, max-prefix filtering, Autonomous System (AS) path filtering, route flap dampening, and BGP community scrubbing.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="194"/>
          <seriesInfo name="RFC" value="7454"/>
          <seriesInfo name="DOI" value="10.17487/RFC7454"/>
        </reference>
        <reference anchor="I-D.ietf-grow-bgpopsecupd" target="https://datatracker.ietf.org/doc/html/draft-ietf-grow-bgpopsecupd-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-grow-bgpopsecupd.xml">
          <front>
            <title>BGP Operations and Security</title>
            <author fullname="Tobias Fiebig" initials="T." surname="Fiebig">
              <organization>Max-Planck-Institut fuer Informatik</organization>
            </author>
            <author fullname="Nick Hilliard" initials="N." surname="Hilliard">
              <organization>Internet Neutral Exchange Association</organization>
            </author>
            <date day="12" month="November" year="2025"/>
            <abstract>
              <t>The Border Gateway Protocol (BGP) is a critical component in the Internet to exchange routing information between network domains. Due to this central nature, it is important to understand the security and reliability requirements that can and should be ensured to prevent accidental or intentional routing disturbances. Previously, security considerations for BGP have been described in RFC7454 / BCP194. Since the publications of RFC7454, several developments and changes in operational practice took place that warrant an update of these best current practices. This document obsoletes RFC7454, focusing on the overall goals, and providing a less implementation centric set of best practices. This document describes security requirements and goals when operating BGP for exchanging routing information with other networks, and explicitly does not focus on specific technical implementations and requirements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-bgpopsecupd-12"/>
        </reference>
      </references>
    </references>
    <?line 198?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
