<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-huang-savnet-pi-sav-for-cc-01" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PI-SAV for CC Sources">Provider Interface SAV for Customer Cone Sources</title>
    <seriesInfo name="Internet-Draft" value="draft-huang-savnet-pi-sav-for-cc-01"/>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="February" day="11"/>
    <area>Routing</area>
    <workgroup>savnet</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 50?>
<t>Current source address validation (SAV) on AS's provider interfaces primarily relies on loose uRPF, which can protect against IP spoofing based on unannounced internet prefixes but lacks the ability to defend against spoofing based on valid internet prefixes. Furthermore, if a default route is present, this protection is effectively nullified.</t>
      <t>Based on the traffic flow characteristics between the ASes in a customer cone, this document describes a general solution architecture -- provider interface SAV for customer cone source spoofing (PI-SAV for CC). This mechanism can be applied on the provider interfaces of an AS to prevent spoofing traffic with the customer cone source addresses from flowing into the local AS and its customer cone. Specially, this mechanism offers protection against reflective amplification DDoS attacks that leverage local servers to target victims within the customer cone.</t>
    </abstract>
  </front>
  <middle>
    <?line 55?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>As described in <xref target="RFC3704"/><xref target="RFC8704"/><xref target="I-D.ietf-savnet-inter-domain-problem-statement"/>, current source address validation on AS provider interfaces is mainly based on the loose uRPF mechanism. This mechanism can only check whether the source address is a valid internet prefix but cannot provide protection for routable prefixes spoofing. Furthermore, if the AS has a default route (many stub ASes configure default routes to reduce BGP processing and FIB table pressure), the protective effect of loose uRPF on routable prefixes will also be nullified.</t>
      <t>Meanwhile, normally the vast majority of DDoS attack traffic flows into the local network through the provider interface side. Studies further indicate that reflective amplification attacks based on source address spoofing are among the most prevalent types of large-scale DDoS attacks.</t>
      <t>The solutions described in this document, based on the customer cone (CC) source address information and its routing characteristics, generates the provider interface based source prefix blocklist for the customer cone prefixes (IBB-mode in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, or IBA-mode combined with loose uRPF if applicable). The design goal is to prevent spoofing packets with the customer cone prefixes from flowing into the local networks, which can reduce the threat of reflective amplification DDoS attacks that leverage local servers to target local users.</t>
      <t>In contrast to loose uRPF, the key advancement of the PI-SAV for CC mechanism is its ability to create a precise blocklist for <em>routable</em> source prefixes belonging to the local customer cone, thereby preventing spoofing even when a default route is used.</t>
      <t>Section 4 introduces the basic solution: PI-SAV for Standalone CC. This solution focuses on how to construct a Standalone CC -- a subset of CC, in which all member ASes share transit providers on the top AS of the CC, no any other alternative transit provider. Under the valley-free principle of BGP routing, the traffic between the hosts in the Standalone CC must not traverse the provider interfaces of the CC-Top-AS, so a PI-SAV source prefix blocklist can be generated based on this Standalone CC.</t>
      <t>Section 5 introduces the improved solution: PI-SAV for Standalone+ CC. This solution does not simply assume alternative transit provider will cause CC traffic detour through the provider interfaces as the PI-SAV for Standalone CC solution does, but to check whether there is route policy configuration or link failure causing so. If no detour exists, a Standalone CC+ can be formed by adding the corresponding ASes (the sub-CC under the alternative transit provider) to the Standalone CC. By doing so, a more complete PI-SAV prefix blocklist can be formed based on the Standalone+ CC. The mechanism for Standalone+ CC solution can also be used to enhance Standalone CC solution, working as an in-band channel to get provider information of CC-Member-AS in stead of relying on out-band RPKI ASPA or SLRUM records.</t>
      <t>Note that this document mainly elaborates the basic principles and general procedures of the solutions, the details for additional information provisioning (e.g. Partial-Transit object management) or communication protocol between ASes for Standalone+ CC is not included.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Customer Cone (CC): a set of ASes that includes an AS and its direct/indirect customer ASes, including the customer AS's customer ASes and so on, till the stub ASes.</t>
        <t>CC-Top-AS: the top AS for the customer cone, which means all other ASes in the CC are its direct/indirect customer ASes.</t>
        <t>CC-Top-ASBR: ASBR (AS Boarder Router) with the provider interface(s) of the CC-Top-AS, which is the deployment position for the solutions in this document.</t>
        <t>CC-Member-AS: an AS in the customer cone under the CC-Top-AS.</t>
        <t>Partial Transit: a special transit provider service between two eBGP neighbors, which is rarely deployed in the wild. When an AS (AS-a) receives the BGP update messages from its customer AS (AS-b), it disseminates the messages only to its peer AS(es) and other customer AS(es), not to its upper transit providers as usual. In this case, AS-a is partial transit provider for AS-b. Partial transit can make the customer AS (and its sub-CC) invisible for the upper transit AS.</t>
        <t>CC-sub-Transit-AS: a CC-Member-AS that has alternative transit provider(s) outside the CC.</t>
        <t>Sub-Transit-CC: the customer cone of a CC-sub-Transit-AS (including the CC-sub-Transit-AS and its direct/indirect customer ASes). According valley-free policy of BGP routing, the traffic from the Sub-Transit-CC to other CC-Member-AS may go through the alternative transit link and provider interfaces of CC-Top-ASBR.</t>
        <t>Standalone CC: a subset of CC, all ASes within a Standalone CC share same transit provider(s) on the CC-Top-AS, i.e. the member AS of a Standalone CC has no alternative transit provider outside the CC, all Sub-Transit-CCes in the CC must be excluded. Based on the valley-free principle of BGP routing, the traffic flow between the Standalone CC hosts will not go through the CC-Top-AS's provider interfaces.</t>
        <t>Standalone+ CC: a superset of a Standalone CC that includes the Sub-Transit-CC(s) which has no detour happened for the CC traffic, i.e., traffic between Standalone+ CC hosts will not go through the provider interfaces of the CC-Top-AS. Note that the range of Standalone+ CC may change dynamically due to traffic engineering configuration or transit link failure.</t>
        <t>Independence Degree: a metric that evaluates the degree of independence of a Standalone CC or Standalone+ CC within its customer cone. It is defined as the percentage of ASes or prefixes inside the CC that qualify as Standalone/Standalone+ CC. Two variations are considered:</t>
        <ul spacing="normal">
          <li>
            <t>AS Independence Degree: The ratio of Standalone/Standalone+ ASes within the CC to the total ASes in the CC.</t>
          </li>
          <li>
            <t>Prefix Independence Degree: The ratio of Standalone/Standalone+ prefixes within the CC to the total prefixes in the CC.</t>
          </li>
        </ul>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="basic-solution-pi-sav-for-standalone-cc">
      <name>Basic Solution: PI-SAV for Standalone CC</name>
      <t>The PI-SAV for Standalone CC solution mainly focuses on solving two key problems: 1) constructing the Standalone CC by deducting the Sub-Transit-CC(es) from the whole CC without any omission, and 2) generating source prefix blocklist for the Standalone CC by subtracting the prefix(es) with multi-origin AS.</t>
      <t>Standalone CC construction requires the complete knowledge of the CC-Member-AS and whether each of them has alternative transit provider outside the CC. Basically, CC-Top-ASBR can get the complete list of CC member AS based on BGP local-RIBs if there is no Partial Transit implemented in the CC, that is, ASBR needs to know whether there is any Partial Transit applied in the CC to guarantee the completeness of CC member AS list. Note that, although RPKI ASPA <xref target="I-D.ietf-sidrops-aspa-profile"/> can cover the knowledge of partial transit, and itself can also be used to find the list of CC member AS, it is not recommended to primarily rely on RPKI ASPA for generating CC member list. 1) It will be a long run for RPKI ASPA registration getting ubiquitous, and more importantly, ASPA record themselves cannot indicate whether all ASes have registered. 2) Timeliness due to RPKI record update latency. It is normal situation that the RPKI record updates lay behind the real network changes. 3) It needs to search for all the ASPA records per customer layer, and carefully deal with the race condition between RPKI ASPA records.</t>
      <t>While Standalone CC gets constructed, the initial prefix blocklist for PI-SAV can be generated based on local-RIBs. However, prefix in this list may get involved with multiple origin, that is, the same prefix may also be announced by CC outside network. Furthermore, different ASes in the CC may choose different origin AS path for a specific MOAS prefix, in this case, legitimate traffic with this source prefix may flow in the CC through provider interfaces of the CC, so the CC source prefixes with outside origin AS should be deducted from the initial blocklist. The knowledge of MOAS prefix may be covered by RPKI ROA <xref target="RFC9582"/> and/or RPKI ROA SLURM.</t>
      <t>Based on the above discussion, the solution proposed in this document constructs the PI-SAV blocklist primarily based on local-RIBs information and additional supports from local SLURM and RPKI records. The general procedure for CC-Top-ASBR generating PI-SAV blocklist for Standalone CC listed as below:</t>
      <ol spacing="normal" type="1"><li>
          <t>Initial CC-Member-AS collection. Includes 2 parts: a) ASNs for all direct customer ASes of the CC-Top-AS. The CC-Top-ASBR should have this information in its system. b) Get partial transit deployment information (ASN of CC-Member-AS which only partial transit with upper ASes in the CC) for the target CC. SLURM based local management for partial transit information is suggested.</t>
        </li>
        <li>
          <t>CC construction. Based on the initial ASNs collected above, find all CC-Member-ASes by searching the local-RIBs for which is under the initial ASN in the AS-paths. The transit relationship between member ASes must be saved for further Sub-Transit-CC construction.</t>
        </li>
        <li>
          <t>Sub-Transit-CC construction. Firstly, check whether there is any alternative transit provider outside the CC for each CC-Member-AS, mark the CC-Member-AS as a CC-sub-Transit-AS if there is. This can be done by RPKI ASPA records, and SLURM based local support for additional information is encouraged. Note, if the transit provider information is not available for any CC-Member-AS, the AS must be marked as CC-sub-Transit-AS. Then construct Sub-Transit-CC for each CC-sub-Transit-AS.</t>
        </li>
        <li>
          <t>Standalone CC construction. Deduct all the Sub-Transit-CCes from the CC to form Standalone CC.</t>
        </li>
        <li>
          <t>Generating the initial prefix list for the Standalone CC. Based on BGP local-RIBs, collect all prefixes initiated from the member ASes of the Standalone CC.</t>
        </li>
        <li>
          <t>Final prefix blocklist generation. Check whether any prefix in the initial list get involved with multiple origin AS (MOAS), that is, the prefix is originated not only by the AS(es) inside the CC but also by the AS(es) outside the CC, deduct the prefix with MOAS from the initial list. MOAS prefix indentification can be based on RPKI ROA and/or local ROA SLURM records. Local-RIBs-in can also be used to indentify whether there is any external origin AS for a CC source prefix. Note, router implementation in current practice may not save all local-RIBs-in records, so it needs further consideration if we want find all CC prefixes with external origin AS.</t>
        </li>
      </ol>
      <t>Note: the prefix blocklist must avoid improper block while generating the prefix list, which means while a prefix is not sure and hard to determine whether it should be included in the blocklist, just do not include it. The hidden prefix described in <xref target="I-D.ietf-savnet-inter-domain-problem-statement"/> (No-Export and DSR etc.) might be the cases.</t>
    </section>
    <section anchor="improved-solution-pi-sav-for-standalone-cc">
      <name>Improved Solution: PI-SAV for Standalone+ CC</name>
      <t>Although alternative transit link may cause the traffic between CC member ASes detouring through provider interfaces of the CC, however, the detour path, which normally is longer path compared to inner CC path, only happens while specific routing policy configuration or internal transit path failure making so. That is, traffic detour through provider interface for CC communication is not the normal case.</t>
      <t>On the basis of the previous PI-SAV for Standalone CC solution, the initial goal of the PI-SAV for Standalone+ CC solution is to identify as many prefixes as possible for the PI-SAV blocklist where the Sub-Transit-CC they belongs actually has no detour happen. This solution will be more meaningful if Standalone CC can only count a small portion of whole CC.</t>
      <t>Another benefit of the improved solution is that it can enhance PI-SAV for Standalone CC solution by providing additional information support via in-band channel (communication between CC member ASes), rather than heavily relying on out-band source (RPKI and/or local SLURM), where the former can provide more accurate, complete, and timely information support.</t>
      <t>There are two modes described in this document:</t>
      <t>1) Conservative Mode: This mode starts from the Standalone CC, forming the Standalone+ CC by adding a Sub-Transit-CC back when it is confirmed that no detour happened for this Sub-Transit-CC.</t>
      <t>2) Aggressive Mode: This mode starts from the whole CC, forming the Standalone+ CC by pruning a Sub-Transit-CC out when it is confirmed that detour happened for this Sub-Transit-CC. The aggressive mode requires all CC-sub-Transit-ASes support cooperation with the CC-Top-AS based on the PI-SAV for Standalone+ CC solution.</t>
      <section anchor="conservative-mode">
        <name>Conservative Mode</name>
        <t>The general procedures for PI-SAV for Standalone+ CC conservative mode:</t>
        <t>1) CC-Top-ASBR enables PI-SAV for Standalone+ CC conservative mode. The system sets the Standalone CC as the initial Standalone+ CC. And then it sends a notification message to all CC-Member-ASes. The information in the message includes:</t>
        <artwork><![CDATA[
    -- The mode of PI-SAV for Standalone+ CC.

    -- CC-Top-ASBR information, including the router identification and information about how it can be connected for member AS to response.

    -- The CC-Member-AS and CC-sub-Transit-AS information.
]]></artwork>
        <t>After the notification message, update message must be sent if relevant information changes.</t>
        <t>2) CC-Member-AS receives the notification/update message. Based on the BGP local-RIBs, CC-Member-AS verifies whether it has preferred an external transit provider for the BGP updates originated from CC member ASes. Then send response message back to CC-Top-ASBR.</t>
        <t>Since then, response update message must be sent while related route preferences change (due to routing policy or transit link status change etc.).</t>
        <t>3) CC-Top-ASBR receives the response message. It will add the corresponding CC-sub-Transit-AS and its Sub-Transit-CCs into the Standalone+ CC while the message shows no detour through alternative provider.</t>
        <t>4) CC-Top-ASBR generates blocklist for Standalone+ CC like Standalone CC does, including deduction of MOAS prefixes.</t>
        <t>Note that, in conservative mode, in case no response message is received from a sub-transit-AS, it will be assuming that there is external detour paths exist for it.</t>
        <t>Based on the communication mechanism between CC-Top-AS and CC-Member-AS, the procedure can also be used for enhancing PI-SAV for Standalone CC solution. It can provide more accurate, complete and real-time feedback for additional information required, for example, whether a member AS has partial transit implemented, has external provider existence, or a CC prefix with external origin AS, rather than just relying on out-band pre-registration (RPKI or local SLURM).</t>
      </section>
      <section anchor="aggressive-mode">
        <name>Aggressive Mode</name>
        <t>The general procedures for PI-SAV for Standalone+ CC aggressive mode:</t>
        <t>1) When the CC-Top-ASBR enables PI-SAV for Standalone+ CC aggressive mode, the system sets the whole CC as the initial Standalone+ CC. Then it sends a notification message to all CC-Member-ASes, the information in the message is similar with conservative mode but with aggressive mode identifier.</t>
        <t>After that, update message need to be sent if relevant information changes.</t>
        <t>2) The CC-Member-AS receives the notification/update message, based on the BGP Local-RIBs, verifying whether it has preferred an external transit provider for the BGP updates originated from CC member ASes. Then send response message back to CC-Top-ASBR.</t>
        <t>Since then, response update message must be sent while related route preference change (due to routing policy or transit link status change etc.).</t>
        <t>3) After CC-Top-ASBR receives the response message, it will prune the corresponding CC-sub-Transit-AS and its sub-standalone-CCs from the initial Standalone+ CC while the message shows detour through alternative provider.</t>
        <t>4) Only after CC-Top-AS gets response from all CC-sub-Transit-ASes, generates blocklist for Standalone+ CC like Standalone CC does, including deduction of MOAS prefixes.</t>
        <t>Same as the previous conservative mode, this mechanism can also be used for PI-SAV for Standalone CC solution enhancement.</t>
      </section>
    </section>
    <section anchor="considerations">
      <name>Considerations</name>
      <t>This document focuses on the general solution architecture for PI-SAV for CC, including the communication mechanism between CC-Top-AS and CC-sub-Transit-AS for PI-SAV for Standalone+ CC solution, the details of protocol design is not included. Some considerations:</t>
      <section anchor="deployment-considerations">
        <name>Deployment Considerations.</name>
        <t>The deployment position for the solutions is suggested for a region center AS, rather than a top/high tier AS with complex connection across regions. This means the ASes in the CC are normally/mainly connected to outside internet through the region top AS, and it would be easier and more efficient for them to implement comprehensive PI-SAV for CC solution.</t>
        <t>Meanwhile, the solution should allow the incremental deployment in this region/the CC, which means some member ASes may not support the solution or some information (e.g. ASPA records for some ASes) may not be available. However, 1) The partial transit information must be fully covered to avoid the hidden AS in the CC. 2) MOAS prefixes must be fully identified to avoid related prefix improper block.</t>
      </section>
      <section anchor="security-considerations">
        <name>Security Considerations.</name>
        <t>This is mainly related to the communication mechanism between ASes in the Standalone+ scheme. Generally (not base on the detailed protocol design), the communication mechanism must be equipped with the reliability and security features inherent in conventional transport protocols. Additionally, to avoid MITM (Man-in-the-middle) attacks, the protocol message can be encrypted and authenticated based on router-keys.</t>
        <t>Note: the source prefix of response message should not be in the blocklist in case the message needs to detour back through provider interfaces, this can be done at early normal situation.</t>
      </section>
      <section anchor="operation-and-management-considerations">
        <name>Operation and Management Considerations</name>
        <t>The deployment of PI-SAV for CC solutions involves operational decisions that can be guided by the Independence Degree metric defined in this document. Operators may evaluate the feasibility and benefit of deploying PI-SAV for CC based on the following aspects:</t>
        <t>1) Using Independence Degree for Deployment Decision</t>
        <t>Before enabling PI-SAV for CC, the operator of the CC-Top-AS may compute the AS Independence Degree or Prefix Independence Degree for the Standalone CC and Standalone+ CC. These metrics indicate the coverage and effectiveness that can be achieved by the Standalone/Standalone+ CC solution.</t>
        <ul spacing="normal">
          <li>
            <t>If both degrees are high (e.g., above 80%), deploying the Standalone CC solution can provide substantial protection with relatively simple operations.</t>
          </li>
          <li>
            <t>If the degree for Standalone CC is moderate (e.g., 40%~80%) while the degree for Standalone+ CC is higher (e.g., above 80%), operators may consider deploying the Standalone+ CC solution to extend coverage, especially if there is evidence that many Sub-Transit-CCs do not actually detour through external providers.</t>
          </li>
          <li>
            <t>If the degrees are low (e.g., below 40%), the benefit of deploying PI-SAV for CC may be limited unless the Standalone+ CC solution with aggressive mode is supported by most member ASes.</t>
          </li>
        </ul>
        <t>2) Monitoring and Reporting</t>
        <t>It is recommended that implementations provide monitoring capabilities for Independence Degree over time. Operators should track:</t>
        <ul spacing="normal">
          <li>
            <t>Changes in AS and prefix counts within the CC, Standalone CC, and Standalone+ CC.</t>
          </li>
          <li>
            <t>Reasons for exclusion of ASes or prefixes (e.g., due to alternative transit, MOAS, partial transit).</t>
          </li>
          <li>
            <t>Alerting when Independence Degree falls below/increases over a configured threshold.</t>
          </li>
        </ul>
        <t>Such monitoring helps operators understand the dynamics of their customer cone and adjust PI-SAV policies accordingly.</t>
        <t>3) Incremental Deployment and Cooperation</t>
        <t>Even if the Independence Degree is initially low, incremental deployment remains possible. Operators may start with a pilot deployment among a subset of cooperative member ASes (e.g., those without alternative transit). The Standalone+ CC solution's communication mechanism can be used to gradually expand coverage as more member ASes participate.</t>
        <t>Operators should also consider establishing agreements or incentives for CC-Member-ASes to share accurate provider and MOAS information, thereby improving the accuracy and completeness of Independence Degree calculation and PI-SAV blocklist generation.</t>
      </section>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC9582" target="https://www.rfc-editor.org/info/rfc9582" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9582.xml">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9582"/>
          <seriesInfo name="DOI" value="10.17487/RFC9582"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Gap Analysis, Problem Statement, and Requirements for Inter-Domain SAV</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-12"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-general-sav-capabilities" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-general-sav-capabilities-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-general-sav-capabilities.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-02"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-profile-22" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-profile.xml">
          <front>
            <title>A Profile for Autonomous System Provider Authorization</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Uskov" initials="E." surname="Uskov">
              <organization>JetLend</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>BSD Software Development</organization>
            </author>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <date day="6" month="February" year="2026"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for Autonomous System Provider Authorization (ASPA) objects for use with the Resource Public Key Infrastructure (RPKI). An ASPA is a digitally signed object through which the issuer (the holder of an Autonomous System identifier), can authorize one or more other Autonomous Systems (ASes) as its upstream providers. When validated, an ASPA's eContent can be used for detection and mitigation of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-profile-22"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
