<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-gq-savnet-sav-terms-01" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="SAV Terminology">Currently Used Terminology Related to Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-gq-savnet-sav-terms-01"/>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="February" day="25"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 79?>

<t>This document provides an overview of terms and abbreviations related to Source Address Validation (SAV). Its purpose is to establish a common and consistent set of terminology for use across SAV-related discussions and documents. This document explicitly does not serve as an authoritative source of correct terminology.</t>
    </abstract>
  </front>
  <middle>
    <?line 83?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>This document provides an overview of terms and abbreviations related to Source Address Validation (SAV). Its purpose is to establish a common and consistent set of terminology for use across SAV-related discussions and documents. This document explicitly does not serve as an authoritative source of correct terminology.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="general-terms">
      <name>General Terms</name>
      <section anchor="network-and-topology-terms">
        <name>Network and Topology Terms</name>
        <ul spacing="normal">
          <li>
            <t><strong>Autonomous System (AS):</strong> A set of routers under a single technical administration <xref target="RFC4271"/>.</t>
          </li>
          <li>
            <t><strong>AS Number (ASN):</strong> A 16-bit <xref target="RFC4271"/> or 32-bit <xref target="RFC6793"/> number uniquely identifying an Autonomous System.</t>
          </li>
          <li>
            <t><strong>Sub Network:</strong> A sub network may operate its own internal routing protocols, but it is considered part of the AS in the global routing system. It is connected to one or more routers of the AS for Internet connectivity. It originates traffic but does not transit traffic for other networks <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>.</t>
          </li>
          <li>
            <t><strong>Provider (aka Provider AS):</strong> The provider in a customer-to-provider relationship (if looked at from the opposite direction, provider-to-customer <xref target="caida-asrank"/>). A Provider may propagate any available route to a Customer <xref target="RFC9234"/>.</t>
          </li>
          <li>
            <t><strong>Customer (aka Customer AS):</strong> The customer in a customer-to-provider relationship. A Customer may propagate any route learned from a Customer, or that is locally originated, to a Provider. All other routes must not be propagated <xref target="RFC9234"/>.</t>
          </li>
          <li>
            <t><strong>Peer (aka Peer AS or Lateral Peer or Lateral Peer AS):</strong> The peers in a lateral peering relationship. A Peer may propagate any route learned from a Customer, or that is locally originated, to a Peer. All other routes must not be propagated <xref target="RFC9234"/>.</t>
          </li>
          <li>
            <t><strong>Customer Cone:</strong> The set of ASes that an AS can reach by using only provider-to-customer links <xref target="caida-asrank"/>.</t>
          </li>
          <li>
            <t><strong>Provider Cone:</strong> The set of ASes that an AS can reach by using only customer-to-provider links <xref target="I-D.li-sidrops-bicone-sav"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="router-and-interface-terms">
        <name>Router and Interface Terms</name>
        <ul spacing="normal">
          <li>
            <t><strong>Edge Router:</strong> The router that is directly connected to a Sub Network or a host <xref target="I-D.geng-idr-bgp-savnet"/>.</t>
          </li>
          <li>
            <t><strong>AS Border Router (ASBR):</strong> The router that connects an AS to other ASes.</t>
          </li>
          <li>
            <t><strong>Internal Router:</strong> The router that is neither an edge router nor a border router in an AS.</t>
          </li>
          <li>
            <t><strong>Customer Interface (aka Customer-facing Interface):</strong> The interface of an ASBR facing a Customer <xref target="RFC8704"/>.</t>
          </li>
          <li>
            <t><strong>Lateral Peer Interface (aka Lateral Peer-facing Interface):</strong> The interface of an ASBR facing a Lateral Peer <xref target="RFC8704"/>.</t>
          </li>
          <li>
            <t><strong>Provider Interface (aka Provider-facing Interface):</strong> The interface of an ASBR facing a Provider <xref target="RFC8704"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="routing-terms">
        <name>Routing Terms</name>
        <ul spacing="normal">
          <li>
            <t><strong>Interior Gateway Protocol (IGP):</strong> A type of routing protocol used within a single AS to exchange routing information between routers.</t>
          </li>
          <li>
            <t><strong>Intermediate System to Intermediate System (IS-IS):</strong> A link-state routing protocol belonging to IGP and designed to dynamically exchange routing information within a single AS <xref target="RFC1195"/>.</t>
          </li>
          <li>
            <t><strong>Open Shortest Path First (OSPF):</strong> Another link-state routing protocol belonging to IGP and designed to dynamically exchange routing information within a single AS <xref target="RFC2328"/><xref target="RFC5340"/>.</t>
          </li>
          <li>
            <t><strong>Border Gateway Protocol (BGP):</strong> A path-vector routing protocol used in the global Internet to exchange routing information between different ASes <xref target="RFC4271"/>.</t>
          </li>
          <li>
            <t><strong>Routing Information Base (RIB):</strong> A database within a router or network host that stores routing information. RIB is also known as routing table.</t>
          </li>
          <li>
            <t><strong>Forwarding Information Base (FIB):</strong> The table containing the information necessary to forward IP Datagrams <xref target="RFC3222"/>. FIB is also known as forwarding table. FIB stores the best active routes, which are a subset of those found in the RIB.</t>
          </li>
          <li>
            <t><strong>Virtual Routing and Forwarding (VRF):</strong> The routing (or forwarding) tables separate from the global routing (or forwarding) table in a router <xref target="RFC4364"/><xref target="RFC8704"/>.</t>
          </li>
          <li>
            <t><strong>Asymmetric Routing:</strong> Asymmetric routing means a packet traverses from a source to a destination in one path and takes a different path when it returns to the source. Asymmetric routing can occur within an AS due to routing policy, traffic engineering, etc <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="routing-security-terms">
        <name>Routing Security Terms</name>
        <ul spacing="normal">
          <li>
            <t><strong>Resource Public Key infrastructure (RPKI):</strong> A specialized public key infrastructure (PKI) framework to support improved security for the Internet's BGP routing infrastructure <xref target="RFC6480"/>.</t>
          </li>
          <li>
            <t><strong>Route Origin Authorization (ROA):</strong> A digitally signed object in the RPKI that provides a means of verifying that an IP address block holder has authorized an AS to originate routes to one or more prefixes within the address block <xref target="RFC9582"/>.</t>
          </li>
          <li>
            <t><strong>Autonomous System Provider Authorization (ASPA):</strong> A digitally signed object in the RPKI, that authorizes one or more other ASes as its upstream providers <xref target="I-D.ietf-sidrops-aspa-profile"/>.</t>
          </li>
          <li>
            <t><strong>Internet Routing Registry (IRR):</strong> A public database which allows Internet service providers to publish and look up Internet number bindings and policy objectives.</t>
          </li>
          <li>
            <t><strong>Resource holder:</strong>  A legitimate holder of either IP address or AS number resources <xref target="RFC6480"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="others">
        <name>Others</name>
        <ul spacing="normal">
          <li>
            <t><strong>Direct Server Return (DSR):</strong> A Content Delivery Network (CDN) technique. The anycast server receives requests from users and creates tunnels to the edge server, and the edge server directly sends the requested content to users. The source address of the response packets is the anycast IP address of the anycast server, but the network hosting the edge server does not announce the anycast address in BGP <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sav-terms">
      <name>SAV Terms</name>
      <section anchor="general-sav-terms">
        <name>General SAV Terms</name>
        <ul spacing="normal">
          <li>
            <t><strong>Source Address Spoofing (aka Source Address Forgery):</strong> The act of using spoofed source IP addresses assigned to other machines. Malicious actors use IP spoofing to invoke a variety of attacks, including Distributed Denial of Service (DDoS) attacks, policy evasion, and a range of application-level attacks <xref target="manrs-blog"/>. A spoofed source address can be either IPv4 or IPv6.</t>
          </li>
          <li>
            <t><strong>Source Address Validation (SAV):</strong> A kind of techniques for the detection and mitigation of Source Address Spoofing <xref target="RFC8704"/>. Routers conduct SAV on data packet in the data plane. SAV focuses on the scenarios of native IP forwarding or IP-encapsulated tunnel (IPsec, GRE, SRv6, etc.). Note that, the SAV mechanisms that the SAVNET working group is interested in should not modify data plane packets <xref target="savnet-charter"/>.</t>
          </li>
          <li>
            <t><strong>SAV Rule:</strong> The rule that describes the binding relationship between a source address (prefix) and a valid/invalid incoming interface(s) <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>. SAV Rules can be used for validating whether a data packet with a source address arrive at the router (enforing SAV based on SAV Rules) from an expected interface, and thus determining whether the source address is spoofed (i.e., valid) or not (i.e., invalid).</t>
          </li>
          <li>
            <t><strong>SAV Table:</strong> The table or data structure that implements the SAV rules and is used for performing source address validation in the data plane <xref target="I-D.ietf-savnet-inter-domain-architecture"/>.</t>
          </li>
          <li>
            <t><strong>Access Network SAV:</strong> It prevents a host in a network from spoofing the address of another host in the same network segment. Access Network SAV enables source address-granularity of protection <xref target="RFC5210"/>.</t>
          </li>
          <li>
            <t><strong>Intra-domain SAV (aka Intra-AS SAV):</strong> It prevents a Sub Network from using a source address out of the Sub Network or prevents a host from using a source address out of the network segment. Intra-domain SAV mostly enables source prefix-granularity of protection.</t>
          </li>
          <li>
            <t><strong>Inter-domain SAV (aka Inter-AS SAV):</strong> It prevents Source Address Spoofing packets across ASes. Inter-domain SAV mostly enables source prefix-granularity of protection.</t>
          </li>
          <li>
            <t><strong>Source Address Validation Architecture (SAVA):</strong> A multiple-fence architecture that takes Access Network SAV, Intra-AS SAV, and inter-AS SAV <xref target="RFC5210"/>. The assumption here is that when access-network SAV is not universally deployed, Intra-AS SAV and Inter-AS SAV can increase the defense in depth by blocking spoofing packets that have entered the network.</t>
          </li>
          <li>
            <t><strong>Source Address Validation in Intra-domain and Inter-domain Networks (SAVNET):</strong> It refers to both Intra-domain SAV and Inter-domain SAV. The SAVNET working group was created for the evolvement of SAVNET mechanisms <xref target="savnet-charter"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="sav-enforcement-terms">
        <name>SAV Enforcement Terms</name>
        <ul spacing="normal">
          <li>
            <t><strong>Validation Mode:</strong> The mode indicates how SAV Rules are logically organized and used to conduct validation <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
          </li>
          <li>
            <t><strong>Interface-based Source Prefix Allowlist (aka Source Prefix Allowlist):</strong> A Validation Mode that takes effect on a specific interface. The interface enabling this mode maintains a source prefix list. Only the source addresses encompassed by the source prefixes recorded in the list will be considered valid, otherwise invalid <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
          </li>
          <li>
            <t><strong>Interface-based Source Prefix Blocklist (aka Source Prefix Blocklist):</strong> A Validation Mode that takes effect on a specific interface. The interface enabling this mode maintains a source prefix list. Any source addresses encompassed by the source prefixes recorded in the list will be considered invalid, otherwise valid <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
          </li>
          <li>
            <t><strong>Source Prefix-based Interface Allowlist:</strong> A Validation Mode that takes effect at the router scale. The router enabling this mode will record the source prefixes attached with an interface allowlist. For the packet whose source address is encompassed by a recorded source prefix, the packet is considered valid only when its incoming interface is included in the corresponding interface allowlist. Otherwise, the packet is considered invalid. For the packet whose source address is encompassed by no recorded source prefix, the validity of the packet is unknown <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
          </li>
          <li>
            <t><strong>Source Prefix-based Interface Blocklist:</strong> A Validation Mode that takes effect at the router scale. The router enabling this mode will record the source prefixes attached with an interface blocklist. For the packet whose source address is encompassed by a recorded source prefix, the packet is considered valid only when its incoming interface is not included in the corresponding interface allowlist. Otherwise, the packet is considered invalid. For the packet whose source address is encompassed by no recorded source prefix, the validity of the packet is unknown <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
          </li>
          <li>
            <t><strong>Improper Block (aka False Positive):</strong> The problem that the packets with legitimate source addresses are improperly considered invalid due to inaccurate SAV Rules <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/><xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>.</t>
          </li>
          <li>
            <t><strong>Improper Permit (aka False Negative):</strong> The problem that the packets with spoofed source addresses are improperly considered valid due to inaccurate SAV Rules <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/><xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>.</t>
          </li>
          <li>
            <t><strong>Traffic Handling Policy:</strong> The data plane action taken on the incoming packet after the SAV process on the packet. Besides "Discard", many other actions such as "Permit", "Rate Limit", and "Traffic Redirect" can be chosen and taken for the packet with the invalid state <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="sav-mechanism-terms">
        <name>SAV Mechanism Terms</name>
        <ul spacing="normal">
          <li>
            <t><strong>Access Control List (ACL) for SAV:</strong> A filter that checks the source address of a data packet against a list of acceptable or unacceptable prefixes <xref target="RFC2827"/>.</t>
          </li>
          <li>
            <t><strong>Strict unicast Reverse Path Forwarding (uRPF):</strong> A mechanism that uses FIB for SAV. An ingress packet is accepted only if the FIB contains a prefix that encompasses the source address and forwarding information for that prefix points back to the interface over which the packet was received <xref target="RFC3704"/>.</t>
          </li>
          <li>
            <t><strong>Feasible-Path uRPF (FP-uRPF):</strong> An extension of Strict uRPF. Instead of just inserting one best route there, the alternative paths (if any) have been added as well, and are valid for consideration <xref target="RFC3704"/>.</t>
          </li>
          <li>
            <t><strong>Loose uRPF:</strong> A mechanism checks only for the existence of a route (even a default route, if applicable), not where the route points to (At least some implementations of Loose uRPF check where the default route points to) <xref target="RFC3704"/>.</t>
          </li>
          <li>
            <t><strong>Loose uRPF Ignoring Default Route:</strong> Loose uRPF checks only for the existence of a explicit route (default routes are excluded) <xref target="RFC3704"/>.</t>
          </li>
          <li>
            <t><strong>VRF uRPF:</strong> A mechanism that takes SAV based on VRF table instead of FIB. The specific routes received from external BGP peers will be stored in a dedicated VRF table. VRF uRPF can be implemented to support the strict mode like Strict uRPF or the loose mode like Loose uRPF <xref target="RFC8704"/>.</t>
          </li>
          <li>
            <t><strong>Enhanced Feasible-Path uRPF (EFP-uRPF):</strong> A mechanism that is more flexible about directionality than the FP-uRPF and is for enhancing FP-uRPF in some cases. It is based on the principle that if BGP updates for multiple prefixes with the same origin AS were received on different interfaces (at border routers), then incoming data packets with source addresses in any of those prefixes should be accepted on any of those interfaces <xref target="RFC8704"/>.</t>
          </li>
          <li>
            <t><strong>BAR-SAV:</strong> A mechanism that generates source prefix allowlists by using BGP UPDATE messages, ASPA, and ROA <xref target="I-D.ietf-sidrops-bar-sav"/>.</t>
          </li>
          <li>
            <t><strong>General SAV Information:</strong> The information that is not specialized for SAV but can be utilized to generate SAV rules, and is initially utilized for other purposes. Currently, the General SAV Information consists of the information from RPKI ROA objects and ASPA objects, local routing information, and the information from IRR data <xref target="I-D.ietf-savnet-inter-domain-architecture"/>.</t>
          </li>
          <li>
            <t><strong>SAV-specific Information:</strong> The information that is specialized for SAV rule generation, includes the source prefixes and their legitimate incoming directions to enter a router or an AS, and is exchanged among routers or ASes.</t>
          </li>
          <li>
            <t><strong>SAV-related Information:</strong> The information that can be used to generate SAV rules and includes SAV-specific Information and General SAV Information.</t>
          </li>
          <li>
            <t><strong>Source Entity (aka Source Router or Source AS):</strong> The Entity (Router/AS) that propagates its SAV-specific information to Validation Entity (Router/AS) <xref target="I-D.ietf-savnet-intra-domain-architecture"/><xref target="I-D.ietf-savnet-inter-domain-architecture"/>. Source Entity is the producer of SAV-specific information.</t>
          </li>
          <li>
            <t><strong>Validation Entity (aka Validation Router or Validation AS):</strong> The Entity (Router/AS) that receives SAV-specific information from Source Entity (Router/AS) <xref target="I-D.ietf-savnet-intra-domain-architecture"/><xref target="I-D.ietf-savnet-inter-domain-architecture"/>. Validation Entity is the consumer of SAV-specific information.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document provides an overview of terms and abbreviations related to SAV and does not have security considerations.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>There is no IANA requirement.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1195" target="https://www.rfc-editor.org/info/rfc1195" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1195.xml">
          <front>
            <title>Use of OSI IS-IS for routing in TCP/IP and dual environments</title>
            <author fullname="R. Callon" initials="R." surname="Callon"/>
            <date month="December" year="1990"/>
            <abstract>
              <t>This memo specifies an integrated routing protocol, based on the OSI Intra-Domain IS-IS Routing Protocol, which may be used as an interior gateway protocol (IGP) to support TCP/IP as well as OSI. This allows a single routing protocol to be used to support pure IP environments, pure OSI environments, and dual environments. This specification was developed by the IS-IS working group of the Internet Engineering Task Force. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1195"/>
          <seriesInfo name="DOI" value="10.17487/RFC1195"/>
        </reference>
        <reference anchor="RFC2328" target="https://www.rfc-editor.org/info/rfc2328" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2328.xml">
          <front>
            <title>OSPF Version 2</title>
            <author fullname="J. Moy" initials="J." surname="Moy"/>
            <date month="April" year="1998"/>
            <abstract>
              <t>This memo documents version 2 of the OSPF protocol. OSPF is a link- state routing protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="54"/>
          <seriesInfo name="RFC" value="2328"/>
          <seriesInfo name="DOI" value="10.17487/RFC2328"/>
        </reference>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3222" target="https://www.rfc-editor.org/info/rfc3222" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3222.xml">
          <front>
            <title>Terminology for Forwarding Information Base (FIB) based Router Performance</title>
            <author fullname="G. Trotter" initials="G." surname="Trotter"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document describes the terms to be used in a methodology that determines the IP packet forwarding performance of IP routers as a function of the forwarding information base installed within a router. The forwarding performance of an IP router may be dependent upon or may be linked to the composition and size of the forwarding information base installed within a router. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3222"/>
          <seriesInfo name="DOI" value="10.17487/RFC3222"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC4271" target="https://www.rfc-editor.org/info/rfc4271" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4271.xml">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC4364" target="https://www.rfc-editor.org/info/rfc4364" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4364.xml">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC5340" target="https://www.rfc-editor.org/info/rfc5340" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5340.xml">
          <front>
            <title>OSPF for IPv6</title>
            <author fullname="R. Coltun" initials="R." surname="Coltun"/>
            <author fullname="D. Ferguson" initials="D." surname="Ferguson"/>
            <author fullname="J. Moy" initials="J." surname="Moy"/>
            <author fullname="A. Lindem" initials="A." surname="Lindem"/>
            <date month="July" year="2008"/>
            <abstract>
              <t>This document describes the modifications to OSPF to support version 6 of the Internet Protocol (IPv6). The fundamental mechanisms of OSPF (flooding, Designated Router (DR) election, area support, Short Path First (SPF) calculations, etc.) remain unchanged. However, some changes have been necessary, either due to changes in protocol semantics between IPv4 and IPv6, or simply to handle the increased address size of IPv6. These modifications will necessitate incrementing the protocol version from version 2 to version 3. OSPF for IPv6 is also referred to as OSPF version 3 (OSPFv3).</t>
              <t>Changes between OSPF for IPv4, OSPF Version 2, and OSPF for IPv6 as described herein include the following. Addressing semantics have been removed from OSPF packets and the basic Link State Advertisements (LSAs). New LSAs have been created to carry IPv6 addresses and prefixes. OSPF now runs on a per-link basis rather than on a per-IP-subnet basis. Flooding scope for LSAs has been generalized. Authentication has been removed from the OSPF protocol and instead relies on IPv6's Authentication Header and Encapsulating Security Payload (ESP).</t>
              <t>Even with larger IPv6 addresses, most packets in OSPF for IPv6 are almost as compact as those in OSPF for IPv4. Most fields and packet- size limitations present in OSPF for IPv4 have been relaxed. In addition, option handling has been made more flexible.</t>
              <t>All of OSPF for IPv4's optional capabilities, including demand circuit support and Not-So-Stubby Areas (NSSAs), are also supported in OSPF for IPv6. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5340"/>
          <seriesInfo name="DOI" value="10.17487/RFC5340"/>
        </reference>
        <reference anchor="RFC6480" target="https://www.rfc-editor.org/info/rfc6480" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6480.xml">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC6793" target="https://www.rfc-editor.org/info/rfc6793" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6793.xml">
          <front>
            <title>BGP Support for Four-Octet Autonomous System (AS) Number Space</title>
            <author fullname="Q. Vohra" initials="Q." surname="Vohra"/>
            <author fullname="E. Chen" initials="E." surname="Chen"/>
            <date month="December" year="2012"/>
            <abstract>
              <t>The Autonomous System number is encoded as a two-octet entity in the base BGP specification. This document describes extensions to BGP to carry the Autonomous System numbers as four-octet entities. This document obsoletes RFC 4893 and updates RFC 4271. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6793"/>
          <seriesInfo name="DOI" value="10.17487/RFC6793"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC9234" target="https://www.rfc-editor.org/info/rfc9234" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9234.xml">
          <front>
            <title>Route Leak Prevention and Detection Using Roles in UPDATE and OPEN Messages</title>
            <author fullname="A. Azimov" initials="A." surname="Azimov"/>
            <author fullname="E. Bogomazov" initials="E." surname="Bogomazov"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>Route leaks are the propagation of BGP prefixes that violate assumptions of BGP topology relationships, e.g., announcing a route learned from one transit provider to another transit provider or a lateral (i.e., non-transit) peer or announcing a route learned from one lateral peer to another lateral peer or a transit provider. These are usually the result of misconfigured or absent BGP route filtering or lack of coordination between autonomous systems (ASes). Existing approaches to leak prevention rely on marking routes by operator configuration, with no check that the configuration corresponds to that of the External BGP (eBGP) neighbor, or enforcement of the two eBGP speakers agreeing on the peering relationship. This document enhances the BGP OPEN message to establish an agreement of the peering relationship on each eBGP session between autonomous systems in order to enforce appropriate configuration on both sides. Propagated routes are then marked according to the agreed relationship, allowing both prevention and detection of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9234"/>
          <seriesInfo name="DOI" value="10.17487/RFC9234"/>
        </reference>
        <reference anchor="RFC9582" target="https://www.rfc-editor.org/info/rfc9582" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9582.xml">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9582"/>
          <seriesInfo name="DOI" value="10.17487/RFC9582"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-problem-statement-21" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="18" month="January" year="2026"/>
            <abstract>
              <t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the basic requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-21"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-14" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Gap Analysis, Problem Statement, and Requirements for Inter-Domain SAV</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="14" month="February" year="2026"/>
            <abstract>
              <t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-14"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-architecture-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="13" month="October" year="2025"/>
            <abstract>
              <t>This document specifies the architecture of intra-domain SAVNET, which aims to achieve accurate source address validation (SAV) at external interfaces of an intra-domain network in an automated manner. It describes the conceptual design of intra-domain SAVNET, along with its use cases and design requirements, to help ensure that the intended objectives are met.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-architecture-03"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-architecture-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="31" month="August" year="2025"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-architecture-02"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-general-sav-capabilities" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-general-sav-capabilities-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-general-sav-capabilities.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-02"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-profile-22" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-profile.xml">
          <front>
            <title>A Profile for Autonomous System Provider Authorization</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Uskov" initials="E." surname="Uskov">
              <organization>JetLend</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>BSD Software Development</organization>
            </author>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <date day="6" month="February" year="2026"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for Autonomous System Provider Authorization (ASPA) objects for use with the Resource Public Key Infrastructure (RPKI). An ASPA is a digitally signed object through which the issuer (the holder of an Autonomous System identifier), can authorize one or more other Autonomous Systems (ASes) as its upstream providers. When validated, an ASPA's eContent can be used for detection and mitigation of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-profile-22"/>
        </reference>
        <reference anchor="I-D.geng-idr-bgp-savnet" target="https://datatracker.ietf.org/doc/html/draft-geng-idr-bgp-savnet-05" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.geng-idr-bgp-savnet.xml">
          <front>
            <title>BGP Extensions for Source Address Validation Networks (BGP SAVNET)</title>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Zhenbin Li" initials="Z." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Zhen Tan" initials="Z." surname="Tan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mingxing Liu" initials="" surname="Liu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <date day="18" month="September" year="2025"/>
            <abstract>
              <t>Many source address validation (SAV) mechanisms have been proposed for preventing source address spoofing. However, existing SAV mechanisms are faced with the problems of inaccurate validation or high operational overhead in some scenarios. This document proposes BGP SAVNET by extending BGP protocol for SAV. This protocol can propagate SAV-related information through BGP messages. The propagated information will help edge/border routers automatically generate accurate SAV rules. These rules construct a validation boundary for the network and help check the validity of source addresses of arrival data packets.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-geng-idr-bgp-savnet-05"/>
        </reference>
        <reference anchor="I-D.li-sidrops-bicone-sav" target="https://datatracker.ietf.org/doc/html/draft-li-sidrops-bicone-sav-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-sidrops-bicone-sav.xml">
          <front>
            <title>Bicone Source Address Validation</title>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>The primary design goal of source address validation (SAV) is avoiding improper blocks (i.e., blocking legitimate traffic) while maintaining directionality (see [I-D.ietf-savnet-inter-domain-problem-statement] and [RFC8704]). Existing advanced SAV solutions (e.g., EFP-uRPF [RFC8704]) for an Autonomous System (AS) typically generate ingress SAV allowlist filters on interfaces facing a customer or lateral peer AS. This document analyzes the potential improper block problems when using an allowlist. To avoid improper blocks, this document proposes a new SAV solution by generating an ingress SAV blocklist filter which contains prefixes exclusively belonging to the provider cone. In practice, network operators can flexibly decide to use a blocklist or an allowlist according to their requirements and actual conditions.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-sidrops-bicone-sav-07"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-bar-sav" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-bar-sav-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-bar-sav.xml">
          <front>
            <title>Source Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-SAV)</title>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <author fullname="Igor Lubashev" initials="I." surname="Lubashev">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Doug Montgomery" initials="D." surname="Montgomery">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>Designing an efficient source address validation (SAV) filter requires minimizing false positives (i.e., avoiding blocking legitimate traffic) while maintaining directionality (see RFC8704). This document advances the technology for SAV filter design through a method that makes use of BGP UPDATE messages, Autonomous System Provider Authorization (ASPA), and Route Origin Authorization (ROA). The proposed method's name is abbreviated as BAR-SAV. BAR-SAV can be used by network operators to derive more robust SAV filters and thus improve network resilience. This document updates RFC8704.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-bar-sav-08"/>
        </reference>
        <reference anchor="caida-asrank" target="https://asrank.caida.org/about">
          <front>
            <title>CAIDA AS Rank</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="August"/>
          </front>
        </reference>
        <reference anchor="manrs-blog" target="https://manrs.org/2023/04/why-is-source-address-validation-still-a-problem">
          <front>
            <title>Why is Source Address Validation Still a Problem?</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="April"/>
          </front>
        </reference>
        <reference anchor="savnet-charter" target="https://datatracker.ietf.org/wg/savnet/about">
          <front>
            <title>Charter for SAVNET Working Group</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="March"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 254?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
