<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-inter-domain-problem-statement-13" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Inter-domain SAVNET Problem Statement">Gap Analysis, Problem Statement, and Requirements for Inter-Domain SAV</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-13"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="K." surname="Sriram" fullname="Kotikalapudi Sriram">
      <organization abbrev="USA NIST">USA National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <city>Gaithersburg</city>
          <region>MD</region>
          <country>United States of America</country>
        </postal>
        <email>sriram.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="14"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 98?>

<t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 102?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is a fundamental mechanism for detecting and mitigating source address spoofing attacks <xref target="RFC2827"/> <xref target="RFC5210"/> <xref target="RFC3704"/> <xref target="RFC8704"/>. 
This document provides a gap analysis of existing inter-domain SAV mechanisms, describes the problem space, and defines the requirements for technical improvements.
The corresponding work related to intra-domain SAV is documented in <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>.</t>
      <t>In this document, inter-domain SAV refers to SAV on AS-to-AS interfaces that carry external BGP (eBGP) sessions. The eBGP sessions include Customer-to-Provider (C2P), Provider-to-Customer (P2C), lateral peering (p2p), and Route Server to RS-client connections. The terms customer, provider (transit provider), and lateral peer (non-transit peer; peer (for simplicity)) used in this document are consistent with those defined in <xref target="RFC7908"/> <xref target="RFC9234"/>. Further, <xref target="RFC9234"/> mentions Route Server (RS) and RS-client. An RS-to-RS-client interface is akin to the customer interface. For the purposes of SAV, an RS-client-to-RS interface may be treated (1) like a provider interface for simplicity, or (2) like a union of lateral peers considering all the ASes the RS-client chose to peer with at the IXP RS.</t>
      <t>Access Control List (ACL) and unicast Reverse Path Forwarding (uRPF) based techniques are currently utilized to some extent for inter-domain SAV. In this document, the inter-domain SAV methods from only the existing IETF RFCs (BCP 38 <xref target="RFC2827"/> and BCP 84 <xref target="RFC3704"/> <xref target="RFC8704"/>) are considered for the gap analysis; IETF work-in-progress documents are not considered. This document analyzes the available methods and attempts to answer: (1) what are the technical gaps (<xref target="gap"/>), (2) what are the outstanding problems (problem statement) (<xref target="problem"/>), and (3) what are the practical requirements for the solutions to these problems (<xref target="req"/>).</t>
      <t>The following summarizes the fundamental problems with existing SAV mechanisms, as analyzed in <xref target="gap"/> and <xref target="problem"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Improper block: Existing uRPF-based mechanisms suffer from improper block (false positives) in two inter-domain scenarios: limited propagation of a prefix and hidden prefix.</t>
        </li>
        <li>
          <t>Improper permit: With some existing uRPF-based SAV mechanisms, improper permit (false negatives) can happen on any type of interface (customer, lateral peer, or provider). Specifically, if the method relaxes the directionality constraint <xref target="RFC3704"/> <xref target="RFC8704"/>} to try to achieve zero improper blocking, the possibility of improper permit increases. (Note: It is recognized that unless there is full adoption of SAV in the customer cone (CC) of the interface in consideration, improper permit is not fully preventable in scenarios where source address spoofing occurs from within the CC, i.e., a prefix at one Autonomous System (AS) in the CC is spoofed from another AS in the same CC.)</t>
        </li>
        <li>
          <t>High operational overhead (HOO): ACL-based ingress SAV filtering introduces significant operational overhead, as it needs to update ACL rules manually to adapt to prefix or routing changes in a timely manner. The HOO issue does not pertain to existing uRPF-based mechanisms.</t>
        </li>
      </ul>
      <t>To address these problems, this document specifies (<xref target="req"/>) the following key technical requirements for a new solution:</t>
      <ul spacing="normal">
        <li>
          <t>Improved SAV accuracy over existing mechanisms: The new inter-domain SAV mechanism <bcp14>MUST</bcp14> avoid improper blocking and have superior directionality property (reject more spoofed traffic) than existing inter-domain SAV mechanisms.</t>
        </li>
        <li>
          <t>Reduced operational overhead: The new inter-domain SAV mechanism <bcp14>MUST</bcp14> be able to automatically adapt to network dynamics and asymmetric routing scenarios. A new solution <bcp14>MUST</bcp14> have less operational overhead than ACL-based ingress SAV filtering.</t>
        </li>
        <li>
          <t>Benefit in incremental/partial deployment: A new solution <bcp14>SHOULD NOT</bcp14> assume pervasive adoption of the SAV method or the SAV-related information (e.g., Resource Public Key Infrastructure (RPKI) object registrations). It <bcp14>SHOULD</bcp14> benefit early adopters by providing effective protection from spoofing of source addresses even in partial deployment.</t>
        </li>
        <li>
          <t>Automatic updates to the SAV list and efficient convergence: The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> be responsive to changes in the BGP (FIB/RIB) data, the SAV-related information (<xref target="terminology"/>), or the SAV-specific information (<xref target="terminology"/>). It <bcp14>SHOULD</bcp14> automatically update the SAV list while achieving efficient re-convergence of the same.</t>
        </li>
        <li>
          <t>Providing necessary security guarantee: If a proposed SAV method requires exchanging SAV-related or SAV-specific information between ASes, security mechanisms <bcp14>SHOULD</bcp14> exist to assure trustworthiness of the information.</t>
        </li>
      </ul>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV List:</dt>
        <dd>
          <t>The table of prefixes that indicates the validity of a specific source IP address or source IP prefix per interface. Sometimes the terms 'RPF (Reverse Path Forwarding) list' or 'SAV rules' are used interchangeably with 'SAV list'.</t>
        </dd>
        <dt>Improper Block:</dt>
        <dd>
          <t>The validation results in packets with legitimate source addresses being blocked improperly due to an inaccurate SAV list.</t>
        </dd>
        <dt>Improper Permit:</dt>
        <dd>
          <t>The validation results in packets with spoofed source addresses being permitted improperly due to an inaccurate SAV list.</t>
        </dd>
        <dt>Customer Cone:</dt>
        <dd>
          <t>The Customer Cone (CC) of a given AS, denoted as AS-A, includes: (1) AS-A itself, (2) AS-A's direct customers (ASes), (3) The customers of AS-A's direct customers (indirect customers), (4) And so on, recursively, following all chains of provider-to-customer (P2C) links down the hierarchy.</t>
        </dd>
        <dt>Customer Cone Prefixes (CC Prefixes):</dt>
        <dd>
          <t>IP prefixes permitted by their owners to be originated by, or used as source addresses for data traffic originated from, one or more Autonomous Systems (ASes) within the CC.</t>
        </dd>
        <dt>SAV-related Information:</dt>
        <dd>
          <t>Objects registered using Resource Public Key Infrastructure (RPKI). This can include existing RPKI object types (e.g., ROAs and ASPAs) or new type(s) that may be proposed.</t>
        </dd>
        <dt>SAV-specific Information:</dt>
        <dd>
          <t>Information dedicated to SAV, which may be defined and exchanged between ASes using a potentially new inter-AS communication protocol. The information may also be in the form of new RPKI object type(s) meant to assist SAV.</t>
        </dd>
      </dl>
    </section>
    <section anchor="SAV_methods">
      <name>Existing Inter-domain SAV Mechanisms</name>
      <t>Inter-domain SAV is typically performed at the AS level (on a per neighbor-AS-interface basis) and can be deployed at AS border routers (ASBRs) to prevent source address spoofing. There are various mechanisms available to implement inter-domain SAV for anti-spoofing ingress filtering <xref target="nist"/> <xref target="manrs"/> <xref target="isoc"/>, which are reviewed in this section.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering <xref target="RFC3704"/>: ACL-based ingress SAV filtering is a technique that relies on ACL rules to filter packets based on their source addresses. However, ACL-based ingress SAV filtering introduces significant operational overhead, as ACL rules need to be updated in a timely manner to reflect prefix or routing changes in the inter-domain routing system. One may think of using ACL as a disallow list on a provider interface to block source prefixes that are clearly invalid in the inter-domain routing context, such as IANA special purpose or unallocated IPv4/IPv6 prefixes, etc. But it is impractical to store and maintain a very large and dynamically varying set of unallocated IPv6 prefixes. Also, for the customer interfaces, the ACL method is impractical while other techniques (as described below) are more effective. ACL-based ingress SAV filtering has applicability for broadband cable or digital subscriber access loop (DSL) access networks where the service provider has clear knowledge of IP address prefixes it has allocated to manage those services. Here ACL can be used in an allow-list form.</t>
        </li>
        <li>
          <t>uRPF-based mechanisms: A class of SAV mechanisms are based on Unicast Reverse Path Forwarding (uRPF) <xref target="RFC3704"/> <xref target="RFC8704"/>. The core idea of uRPF for SAV is to exploit the symmetry of inter-domain routing: in many cases, the best next hop for a destination is also the best previous hop for the source. In other words, if a packet arrives from a certain interface, the source address of that packet should be reachable via the same interface, according to the FIB. However, symmetry in routing does not always hold in practice, and to address cases where it does not hold, many enhancements and modes of uRPF are proposed. Different modes of uRPF have different levels of strictness and flexibility, and network operators can choose from them to suit particular network scenarios. We briefly describe these modes as follows:  </t>
          <ul spacing="normal">
            <li>
              <t>Strict uRPF <xref target="RFC3704"/>: Strict uRPF is the most stringent mode. It permits a packet only if it has a source address that is covered by a prefix in the FIB, and the next hop for that prefix is the same interface that the packet arrived on. This mode can be deployed at customer interfaces in some scenarios, e.g., a directly connected single-homed stub customer AS <xref target="nist"/>.</t>
            </li>
            <li>
              <t>Loose uRPF <xref target="RFC3704"/>: Loose uRPF verifies that the source address of a packet is routable on the internet by matching it with one or more prefixes in the FIB, regardless of the interface on which the packet arrives. If the source address is not routable, Loose uRPF discards the packet. Loose uRPF is typically deployed at the provider interfaces of an AS to block packets with source addresses from prefixes that are not routed on the global internet (e.g., IANA-allocated private-use addresses, unallocated IPv4/IPv6 addresses, multicast addresses, etc.).</t>
            </li>
            <li>
              <t>Feasible Path uRPF (FP-uRPF) <xref target="RFC3704"/>: Unlike Strict uRPF, which requires the packet to arrive on the exact best return path, FP-uRPF allows a packet to pass as long as the router could reach that source address through the interface it arrived on (based on the feasible routes in the Adj-RIBs-In <xref target="RFC4271"/>), even if the route isn't the primary route (per best path selection). This makes it more effective in multi-homed environments where asymmetric routing is common, as it prevents legitimate traffic from being dropped simply because it didn't take the "best" path back to the sender.</t>
            </li>
            <li>
              <t>Enhanced Feasible Path uRPF with Algorithm A (EFP-uRPF Alg-A) <xref target="RFC8704"/>: EFP-uRPF Alg-A expands the list of valid source addresses for a specific interface by including all prefixes associated with any Origin AS that is reachable through that interface. Instead of only accepting prefixes directly advertised on a link, the router identifies all the origin ASes present in the BGP updates received on that interface and then permits any prefix from those same ASes that it sees elsewhere in its Adj-RIBs-In (associated with all neighbors — customers, providers, peers). This "Origin AS-based" approach provides significantly more flexibility than strict or traditional FP-uRPF, as it accounts for cases where an AS in the CC may send traffic for one of its prefixes over a link where it only advertised a different prefix (multi-homing and asymmetric routing scenarios).</t>
            </li>
            <li>
              <t>Enhanced Feasible Path uRPF with Algorithm B (EFP-uRPF Alg-B) <xref target="RFC8704"/>: EFP-uRPF Alg-B provides even greater flexibility (compared to EFP-uRPF Alg-A) by aggregating all customer interfaces into a single "customer group" for validation purposes. The router first identifies all unique prefixes and origin ASes associated with all directly connected customer interfaces using only the Adj-RIBs-In associated with them. It then constructs a comprehensive RPF list that includes every prefix originated by those ASes, regardless of whether those prefixes were learned via customer, peer, or transit provider links. This list is applied uniformly across all customer-facing interfaces, attempting to ensure that legitimate traffic from a multihomed AS in the CC is never dropped, even if the traffic arrives on a different customer-facing port than the one where the specific prefix was advertised. In comparison to EFP-uRPF Alg-A, this method (Alg-B) reduces the possibility of improper block but at the expense of increased possibility of improper permit, i.e., reduced directionality.</t>
            </li>
            <li>
              <t>Virtual Routing and Forwarding (VRF) uRPF <xref target="RFC4364"/> <xref target="urpf"/> <xref target="manrs"/>: VRF uRPF uses a separate VRF table for each external BGP peer and is only a way of implementation for a SAV list.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="gap">
      <name>Gap Analysis</name>
      <t>Inter-domain SAV is essential for preventing source address spoofing traffic at all AS interfaces — customers, providers, and lateral peers. An ideal inter-domain SAV mechanism must block all spoofing traffic while permitting legitimate traffic in all scenarios of interest. However, in some cases, existing SAV mechanisms may unintentionally block legitimate traffic or permit spoofing traffic. This section aims to conduct a gap analysis of existing SAV mechanisms for different types of interfaces under various scenarios to identify their technical limitations.</t>
      <section anchor="sav_at_cust">
        <name>SAV at Customer Interfaces</name>
        <t>To prevent source address spoofing on customer interfaces, operators can enable ACL-based ingress filtering, or uRPF-based mechanisms such as Strict uRPF, FP-uRPF, or EFP-uRPF. However, the ACL method typically has high operational overhead. The uRPF-based mechanisms may cause improper block in two inter-domain scenarios: Limited Propagation of a Prefix (LPP) and Hidden Prefix (HP). They may also cause improper permit in the scenarios of source address Spoofing within a Customer Cone (SCC). The LPP scenario occurs when an AS applies traffic engineering (TE) using a no-export policy. One example is when an AS attaches NO_EXPORT BGP Community to some prefixes (routes) forwarded to some upstream providers (in multi-homing scenarios) (see <xref target="noexp"/>). Sometimes this type of TE is done without attaching the NO_EXPORT, i.e., by selectively propagating different sets of prefixes to different upstream providers. The Hidden Prefix (HP) scenario is typically associated with the Direct Server Return (DSR) scenario; anycast prefix in a Content Delivery Network (CDN) application is not announced by the AS where the DSR (edge server) is located (see <xref target="dsrp"/>). Source address Spoofing within a Customer Cone (SCC) scenario arises when a prefix at one Autonomous System (AS) in the CC is spoofed from another AS in the same CC <xref target="spoofing_within_cc"/>. It is recognized that unless there is full adoption of SAV in the customer cone (CC) of the interface in consideration, improper permit is not fully preventable in the SCC scenario.</t>
        <t><xref target="customer_gap"/> provides an overview of the gaps associated with the ACL method, Strict uRPF, FP-uRPF, and EFP-uRPF for SAV at customer interfaces in the LPP, HP, and SCC scenarios mentioned above. Illustrations and analyses of these gaps are provided in <xref target="noexp"/>, <xref target="dsrp"/>, and <xref target="spoofing_within_cc"/>, respectively.</t>
        <figure anchor="customer_gap">
          <name>The gaps of ACL-based ingress filtering, Strict uRPF, FP-uRPF, and EFP-uRPF for customer interfaces for the scenarios of interest.</name>
          <artwork><![CDATA[
+--------------------+------------+-----------+-------+--------+
|Traffic & Scenarios |     ACL    |Strict uRPF|FP-uRPF|EFP-uRPF|
+----------+---------+------------+-----------+-------+--------+
|Legitimate|   LPP   |            |                            |
|Traffic   +---------+            |       Improper Block       |
|          |   HP    |    High    |         possible           |
+----------+---------+Operational-+-------------------+--------+
|          |         |  Overhead  |                   |Improper|
|Spoofed   |  no SCC |    (HOO)   |                   |Permit  |
|Traffic   |         |            |   Functions as    |only for|
|          |         |            |      Expected     |EFP-uRPF|
|          |         |            |                   |Alg-B   |
|+---------+---------+            +-------------------+--------|
|Spoofed   |   SCC   |            |                            |
|Traffic   |         |            |       Improper Permit      |
|          |         |            |    (in partial deployment) |
+----------+---------+------------+----------------------------+

LPP = Limited Propagation of a Prefix
HP = Hidden Prefix 
SCC = Spoofing within a CC
'Functions as Expected' connotes the absence of improper permit. 
It also connotes low operational overhead. 
]]></artwork>
        </figure>
        <section anchor="noexp">
          <name>Limited Propagation of a Prefix (LPP) Scenario</name>
          <t>In inter-domain networks, some prefixes may not propagate from a customer to all its providers and/or may not propagate transitively from the providers to all their providers due to various factors, such as the use of NO_EXPORT or NO_ADVERTISE Communities, or some other selective-export policies meant for traffic engineering. In these cases, it is possible that a prefix (route) announcement in the CC associated with a customer interface has limited propagation in the CC and is not received on that interface. Then the prefix is invisible in BGP at that interface but the traffic with source address in that prefix may still be received on that interface. This can give rise to improper block when performing SAV with existing mechanisms. These mechanisms include EFP-uRPF Alg-A, which is the focus on in the following analysis, while it also applies to Strict uRPF and FP-uRPF. All these mechanisms suffer from the same problem of improper block in this scenario.</t>
          <figure anchor="no-export">
            <name>Limited propagation of a prefix caused by NO_EXPORT.</name>
            <artwork><![CDATA[
                          +----------------+
                          |    AS 3(P3)    |
                          +-+/\------+/\+--+
                             /         \
                            /           \ 
                           /             \
                          / (C2P)         \
                 +------------------+      \
                 |     AS 4(P4)     |       \
                 ++/\+--+/\+----+/\++        \
                   /     |        \           \
         P2[AS 2] /      |         \           \
                 /       |          \           \
                / (C2P)  |           \ P5[AS 5]  \ P5[AS 5]
+----------------+       |            \           \    
|    AS 2(P2)    |       | P1[AS 1]    \           \
+----------+/\+--+       | P6[AS 1]     \           \
             \           |               \           \
     P1[AS 1] \          |                \           \
     NO_EXPORT \         |                 \           \
                \(C2P)   |(C2P)        (C2P)\      (C2P)\
              +----------------+          +----------------+
              |  AS 1(P1, P6)  |          |    AS 5(P5)    |
              +----------------+          +----------------+
]]></artwork>
          </figure>
          <t>In the scenario of <xref target="no-export"/>, AS 1 is a customer of AS 2; AS 1 and AS 2 are customers of AS 4; AS 4 is a customer of AS 3; and AS 5 is a customer of both AS 3 and AS 4. AS 1 advertises prefixes P1 to AS 2 with the NO_EXPORT community attribute attached, preventing AS 2 from further propagating the route for prefix P1 to AS 4. Consequently, AS 4 only learns the route for prefix P1 from AS 1 in this scenario. Suppose AS 1 and AS 4 have deployed inter-domain SAV while other ASes have not, and AS 4 has deployed EFP-uRPF at its customer interfaces.</t>
          <t>If AS 4 deploys EFP-uRPF Alg-A at customer interfaces, it will require packets with source addresses in P1 or P6 to only arrive on the interface with AS 1. When AS 1 sends legitimate packets with source addresses in P1 or P6 to AS 4 via AS 2, AS 4 improperly blocks these packets. The same improper block problem occurs with the use of Strict uRPF or FP-uRPF. EFP-uRPF with Alg-B can avoid the improper block in this specific scenario, but even this SAV method would have the improper block if the TE at AS 1 is such that none of the customer interfaces at AS 4 receives a route for P1 (or P6).</t>
        </section>
        <section anchor="dsrp">
          <name>Hidden Prefix (HP) Scenario</name>
          <t>CDNs use the concepts of anycast <xref target="RFC4786"/><xref target="RFC7094"/> and DSR to improve the quality of service by placing edge servers with content closer to users. An anycast IP address is assigned to devices in different locations, and incoming requests are routed to the closest edge server (DSR) location. Usually, only locations with rich connectivity announce the anycast IP address through BGP. The CDN server receives requests from users and creates tunnels to the edge locations, from where content is sent directly to users. DSR requires servers in the edge locations to use the anycast IP address as the source address in response packets. However, the ASes serving the edge servers do not announce the anycast prefixes through BGP, so the anycast prefix is hidden (invisible in BGP) on the customer interface side at intermediate ASes which — with existing inter-domain SAV mechanisms — would improperly block the response packets.</t>
          <t><xref target="dsr"/> illustrates a DSR scenario where the anycast IP prefix P3 is advertised by AS 3 through BGP. In this example, AS 3 is the provider of AS 4 and AS 5; AS 4 is the provider of AS 1, AS 2, and AS 5; and AS 2 is the provider of AS 1. AS 2 and AS 4 have deployed inter-domain SAV. When a user at AS 2 sends a request to the anycast destination IP, the forwarding path is AS 2-&gt;AS 4-&gt;AS 3. The anycast server in AS 3 receives the request and tunnels it to the edge servers in AS 1. Finally, the edge server sends the content packets to the user with source addresses in prefix P3. Let us say, the forwarding path for the content packets is AS 1-&gt; AS 4-&gt;AS 2. Since AS 4 does not receive routing information for prefix P3 from AS 1, EFP-uRPF Alg-A or EFP-uRPF Alg-B (or any other existing uRPF-based mechanism) at the customer interface of AS 4 facing AS 1 will improperly block the response packets from AS 1.</t>
          <figure anchor="dsr">
            <name>A Direct Server Return (DSR) scenario.</name>
            <artwork><![CDATA[
                                +----------------+
                Anycast Server+-+    AS 3(P3)    |
                                +-+/\----+/\+----+
                                   /       \
                         P3[AS 3] /         \ 
                                 /           \
                                / (C2P)       \
                       +----------------+      \
                       |    AS 4(P4)    |       \
                       ++/\+--+/\+--+/\++        \
          P6[AS 2, AS 1] /     |      \           \
         P1[AS 2, AS 1] /      |       \           \
              P2[AS 2] /       |        \           \
                      / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
      +----------------+       |          \           \    
User+-+    AS 2(P2)    |       | P1[AS 1]  \           \
      +----------+/\+--+       | P6[AS 1]   \           \
                   \           |             \           \
           P6[AS 1] \          |              \           \
            P1[AS 1] \         |               \           \
                      \(C2P)   |(C2P)      (C2P)\      (C2P)\
                    +---------------+         +----------------+
       Edge Server+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                    +----------------+        +----------------+
P3 is the anycast prefix and is only advertised by AS 3 through BGP.
]]></artwork>
          </figure>
          <t>Further, there are cases of specific prefixes that may be exclusively used as source addresses (legitimately) without being advertised via BGP by any AS. While different from DSR scenarios, these cases similarly result in existing inter-domain SAV mechanisms improperly blocking legitimate traffic originating from such prefixes.</t>
        </section>
        <section anchor="spoofing_within_cc">
          <name>Source Address Spoofing within a Customer Cone (SCC) Scenario</name>
          <t>In general, improper permit of spoofed packets in SCC scenarios is unavoidable for various uRPF-based methods in partial deployment. For example, consider a topology in which AS 1 and AS 2 are customers of AS 3; and AS 3 is a customer of AS 4. AS 1 and AS 2 originate prefixes P1 and P2, respectively. AS 4 performs SAV on its customer interface with AS 3. P1 and P2 are announced from AS 3 to AS 4 and they would be included in the SAV list (allowlist) of AS 4 with any SAV mechanism. Assume AS 3 doesn't do SAV. Now as an example of SCC, if AS 2 spoofs AS 1's prefix P1 and sends the spoofed packets to AS 4 (via AS 3), there is no way for AS 4 to detect the spoofed traffic. AS 4's SAV cannot differentiate between the spoofed and the legitimate packets that have source address in P1. In an SCC scenario of this nature, the only recourse for blocking the spoofed traffic is for AS 3 also to be upgraded to do SAV, i.e., deployment of SAV closer to the source of spoofing.</t>
          <t>Another scenario is highlighted in <xref target="customer-spoofing"/> while using EFP-uRPF Alg-B method on customer interfaces. This scenario is non-SCC from the perspective of each individual customer interfaces of AS 4, but it is SCC from the perspective of AS 4 as a whole. EFP-uRPF Alg-B relaxes directionality to reduce (or eliminate) false positives and that makes it more susceptible to SCC (per the latter perspective). This is expected because EFP-uRPF Alg-B somewhat conservatively applies the same relaxed SAV list across all customer interfaces.</t>
          <figure anchor="customer-spoofing">
            <name>A scenario of source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                       +----------------+
                                       |    AS 3(P3)    |
                                       +-+/\----+/\+----+
                                          /       \
                                         /         \ 
                                        /           \
                                       / (C2P)       \
                              +----------------+      \
                              |    AS 4(P4)    |       \
                              ++/\+--+/\+--+/\++        \
                 P6[AS 2, AS 1] /     |      \           \
                P1[AS 2, AS 1] /      |       \           \
                     P2[AS 2] /       |        \           \
                             / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
             +----------------+       |          \           \    
Spoofer(P5')-+    AS 2(P2)    |       | P1[AS 1]  \           \
             +----------+/\+--+       | P6[AS 1]   \           \
                          \           |             \           \
                  P6[AS 1] \          |              \           \
                   P1[AS 1] \         |               \           \
                             \(C2P)   |(C2P)      (C2P)\      (C2P)\
                           +----------------+        +----------------+
                           |  AS 1(P1, P6)  |        |    AS 5(P5)    |
                           +----------------+        +----------------+
P5' is the spoofed source prefix P5 by the spoofer which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t>In <xref target="customer-spoofing"/>, the source address spoofing takes place within AS 4's customer cone, where the spoofer, which is inside of AS 2 or connected to AS 2 through other ASes, sends spoofing traffic with spoofed source addresses in P5 to AS 3 along the path AS 2-&gt;AS 4-&gt; AS 3. The arrows in <xref target="customer-spoofing"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>If AS 4 deploys EFP-uRPF Alg-B at its customer interfaces, it will allow packets with source addresses in P5 to originate from AS 1, AS 2, and AS 5. Consequently, AS 4 will improperly permit the spoofed packets from AS 2, enabling them to propagate further.</t>
          <t>In the scenario of <xref target="customer-spoofing"/>, Strict uRPF, FP-uRPF, and EFP-uRPF Alg-A — applied on the customer interfaces — work effectively to block the spoofed packets from AS 2. This is because these mechanisms have stronger directionality property than EFP-uRPF Alg-B.</t>
        </section>
      </section>
      <section anchor="sav_at_peer">
        <name>SAV at Peer Interfaces</name>
        <t>SAV is used at peer interfaces for validating the traffic entering the validating AS and destined for the AS's customer cone.
The data packets received from a customer or lateral peer AS must have source addresses belonging only to the prefixes in the customer cone (CC) of that AS. 
In both cases, the focus is on discovering all prefixes in the CC of the neighbor AS.
So, in principle, the SAV techniques suitable on a customer interface may also be used on a peer interface, especially EFP-uRPF Alg-A or Alg-B, which are more accommodative of asymmetric routing.
Indeed, asymmetric routing is thought to be prevalent for peer interfaces.
If SAV techniques suitable for customer interfaces are considered for peer interfaces, then the gap analysis of <xref target="sav_at_cust"/> would also be applicable to the SAV for the peer interfaces.
However, due to increased concern about asymmetric routing, network operators may conservatively use the same relaxed SAV techniques for peer interfaces as those for provider interfaces, e.g., Loose uRPF <xref target="sav_at_prov"/>.
In that case, the gap analysis of <xref target="sav_at_prov"/> would also be applicable to the SAV for peer interfaces.</t>
      </section>
      <section anchor="sav_at_prov">
        <name>SAV at Provider Interfaces</name>
        <t>SAV is used at provider interfaces for validating the traffic entering the AS and destined for the AS's customer cone. <xref target="provider_peer_gap"/> summarizes the gaps of ACL-based ingress filtering and Loose uRPF for SAV at provider interfaces in the scenarios of interest. ACL-based ingress filtering may effectively block spoofing traffic from provider AS, while appropriately allowing legitimate traffic, but it has high operational overhead. On the other hand, Loose uRPF correctly permits legitimate traffic, but it can also mistakenly allow spoofing traffic to pass through.</t>
        <t>In <xref target="provider_peer_gap"/>, Spoofed from Provider Tree (SPT) is a scenario where the spoofed traffic comes from the provider tree, i.e., the providers in the transitive hierarchy above the validating AS. The spoofed prefix may belong to (originated by) any AS in the Internet other than the spoofing AS; it may even belong to an AS in the customer cone of the validating AS (example below).</t>
        <figure anchor="provider_peer_gap">
          <name>The gaps of ACL-based ingress filtering and Loose uRPF at provider interfaces in the scenarios of interest.</name>
          <artwork><![CDATA[
+------------------------+------------+---------------+
|   Traffic & Scenarios  |     ACL    |   Loose uRPF  |
+----------+-------------+------------+---------------+
|Legitimate|             |            |  Functions    |
|Traffic   |     --      |    High    |  as Expected  |
+----------+-------------+Operational +---------------+
|Spoofed   |   Spoofed   |  Overhead  |               |
|Traffic   |     from    |   (HOO)    |Improper Permit|
|          |   Provider  |            |               |
|          |  Tree (SPT) |            |               |
+----------+-------------+------------+---------------+

'Functions as Expected' connotes the absence of improper block.
It also connotes low operational overhead.
]]></artwork>
        </figure>
        <t><xref target="provider-spoofing"/> illustrates a scenario of SPT and is used to analyze the gaps of ACL-based ingress filtering and Loose uRPF.</t>
        <figure anchor="provider-spoofing">
          <name>A scenario of source address spoofing from provider AS.</name>
          <artwork><![CDATA[
                          +----------------+
            Spoofer(P1')+-+    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P)       \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
    P6[AS 2, AS 1] /     |      \           \
   P1[AS 2, AS 1] /      |       \           \
        P2[AS 2] /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
             \           |             \           \
     P6[AS 1] \          |              \           \
      P1[AS 1] \         |               \           \
                \ (C2P)  | (C2P)    (C2P) \     (C2P) \
               +----------------+        +----------------+
               |  AS 1(P1, P6)  |        |    AS 5(P5)    |
               +----------------+        +----------------+
P1' is the spoofed source prefix P1 by the spoofer which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
        </figure>
        <t>In <xref target="provider-spoofing"/>, the spoofer which is inside of AS 3 or connected to AS 3 through other ASes forges the source addresses in P1 and sends the spoofing traffic to the destination addresses in P2 at AS 2. AS 1 is a customer of AS 2; AS 1 and AS 2 are customers of AS 4; AS 4 is a customer of AS 3; and AS 5 is a customer of both AS 3 and AS 4. Suppose AS 4 and AS 1 have deployed inter-domain SAV, while the other ASes have not.</t>
        <t>Using the ACL method in the form of a disallow (deny) list at the provider interface of AS 4 (facing AS 3) incurs a very high operational overhead. As mentioned before (<xref target="SAV_methods"/>), it is impractical to store and maintain a very large and dynamically varying set of unallocated IPv6 prefixes in the ACL.</t>
        <t>Applying Loose uRPF at the provider interface of AS 4 (facing AS 3) can greatly reduce the operational overhead because it uses the FIB as the information source for allowed prefixes, and can adapt to changes in the network to prevent false positives (improper blocking). 
However, using Loose uRPF at AS 4 will naturally permit packets with source addresses in P1 (since P1 is present in the FIB) and hence will not prevent the improper permit of the spoofed packets from AS 3 <xref target="provider-spoofing"/>.
This is an expected limitation of Loose uRPF.</t>
      </section>
    </section>
    <section anchor="problem">
      <name>Problem Statement</name>
      <t><xref target="problem_sum"/> provides a comprehensive summary of the gap analysis in <xref target="gap"/>. It highlights the scenarios where existing inter-domain SAV mechanisms may encounter issues, including instances of improper blocking of legitimate traffic, improper permitting of spoofing traffic, or high operational overhead. The various entries in the table in <xref target="gap"/> can be traced back to the terminology and analyses presented in <xref target="gap"/>.</t>
      <figure anchor="problem_sum">
        <name>The scenarios where existing inter-domain SAV mechanisms may have improper block problem for legitimate traffic, improper permit problem for spoofing traffic, or high operational overhead.</name>
        <artwork><![CDATA[
+--------+----------+-----------+----------+-------+--------+
|Problems|    ACL   |   Strict  |  Loose   |FP-uRPF|EFP-uRPF|
|        |          |   uRPF    |  uRPF    |       |        |
|        |(CI or PI)|   (CI)    |  (PI)    | (CI)  | (CI)   |
+--------+----------+-----------+----------+-------+--------+
|Improper|  YES/NO  |    YES    |   NO**   |      YES       |
|Block   |(manual   | (LPP, HP) |          |    (LPP, HP)   |
|        |operator  |           |          |                |
|        |diligence)|           |          |                |
+--------+----------+-----------+----------+-------+--------+
|Improper|  YES/NO  |NO (no SCC)|   YES    |   NO (no SCC)  |
|Permit  |(manual   |YES (SCC)  |  (SPT)   |   YES (SCC)    |
|        |operator  |           |          |                |
|        |diligence)|           |          |                |
+--------+----------+-----------+----------+-------+--------+
|        |   YES    |                                       |
|  HOO   |  (Any    |                  NO                   |
|        |Scenarios)|                                       |
+--------+----------+---------------------------------------+
CI = Customer Interface
PI = Provider Interface
HOO = High Operational Overhead
LPP = Limited Propagation of a Prefix
HP = Hidden Prefix
SCC = Spoofing within a CC  
SPT = Spoofing from Provider Tree
** Typically, an HP (like DSR prefixes) is hidden on the CIs
   but received on a provider or peer interface; 
   hence included in the FIB and that helps avoid
   improper block for Loose uRPF.      
]]></artwork>
      </figure>
      <t>The problem statement that results from the gap analysis can be expressed as follows. New proposals for SAV should aim to fill in the following problem areas (gaps) found in the currently standardized SAV methods (found in IETF RFCs):</t>
      <ul spacing="normal">
        <li>
          <t>Improper block: Existing uRPF-based mechanisms suffer from improper block (false positives) in two inter-domain scenarios: limited propagation of a prefix (e.g., NO_EXPORT and some other traffic engineering (TE) scenarios) and hidden prefix (e.g., CDN/DSR scenario).</t>
        </li>
        <li>
          <t>Improper permit: With some existing uRPF-based SAV mechanisms, improper permit (false negatives) can happen on any type of interface (customer, lateral peer, or provider). Specifically, if the method relaxes the directionality constraint <xref target="RFC3704"/> <xref target="RFC8704"/>} to try to achieve zero improper blocking, the possibility of improper permit increases. (Note: It is recognized that unless there is full adoption of SAV in the customer cone (CC) of the interface in consideration, improper permit is not fully preventable in scenarios where source address spoofing occurs from within the CC, i.e., a prefix at one Autonomous System (AS) in the CC is spoofed from another AS in the same CC.)</t>
        </li>
        <li>
          <t>High operational overhead (HOO): ACL-based ingress SAV filtering introduces significant operational overhead, as it needs to update ACL rules manually to adapt to prefix or routing changes in a timely manner. The HOO issue does not pertain to existing uRPF-based mechanisms.</t>
        </li>
      </ul>
      <t>The limitations of existing uRPF-based mechanisms are due to their exclusive reliance on BGP data. Although the algorithms themselves have evolved (e.g., <xref target="RFC8704"/>), the underlying input has remained unchanged, inherently constraining their accuracy in scenarios such as LPP and HP. With the availability of authoritative SAV-related information, plus the potential SAV-specific information (<xref target="gap"/>), it would be possible to develop comprehensive new SAV algorithms or mechanisms to overcome the existing gaps.</t>
    </section>
    <section anchor="req">
      <name>Requirements for New Inter-domain SAV Mechanisms</name>
      <t>This section lists the requirements for new inter-domain SAV mechanisms which can help bridge the technical gaps of existing mechanisms.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new inter-domain SAV mechanism <bcp14>MUST</bcp14> avoid improper blocking and have superior directionality property (reject more spoofed traffic) than existing inter-domain SAV mechanisms. The requirement applies for all directions of AS peering (customer, provider, and peer).</t>
      </section>
      <section anchor="reducing-operational-overhead">
        <name>Reducing Operational Overhead</name>
        <t>The new inter-domain SAV mechanism <bcp14>MUST</bcp14> be able to automatically adapt to network dynamics and asymmetric routing scenarios. A new solution <bcp14>MUST</bcp14> have less operational overhead than ACL-based ingress SAV filtering.</t>
      </section>
      <section anchor="early-adopters-benefit-in-incrementalpartial-deployment">
        <name>Early Adopters Benefit in Incremental/Partial Deployment</name>
        <t>A new solution <bcp14>SHOULD NOT</bcp14> assume pervasive adoption of the SAV method or the SAV-related information (e.g., Resource Public Key Infrastructure (RPKI) objects such as ROAs and ASPAs). 
It <bcp14>SHOULD</bcp14> benefit early adopters by providing effective protection from spoofing of source addresses even in partial deployment.</t>
      </section>
      <section anchor="providing-necessary-security-guarantee">
        <name>Providing Necessary Security Guarantee</name>
        <t>SAV-related information, such as RPKI objects, may be used for designing a more accurate SAV. Such information must be protected at their repositories and during communication to the relying parties (the BGP security community is already diligent about this). If a proposed SAV method requires exchanging SAV-specific information between ASes, security mechanisms must exist to assure trustworthiness of the information. The idea is to prevent malicious injection or alteration of the SAV-specific information.</t>
      </section>
      <section anchor="automatic-updates-to-the-sav-list-and-efficient-convergence">
        <name>Automatic Updates to the SAV List and Efficient Convergence</name>
        <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> be responsive to changes in the BGP (FIB/RIB) data, the SAV-related information (<xref target="terminology"/>), or the SAV-specific information (<xref target="terminology"/>).
It <bcp14>SHOULD</bcp14> automatically update the SAV list while achieving efficient re-convergence of the same.
In this context, convergence refers to the stabilization of the SAV lists on the AS-to-AS interfaces performing SAV.
It is essential that the new inter-domain SAV mechanism converges to the correct updated SAV list in a proper manner, minimizing both improper block and improper permit during the process.</t>
      </section>
    </section>
    <section anchor="inter-domain-sav-scope">
      <name>Inter-domain SAV Scope</name>
      <t>The new inter-domain SAV mechanisms should work in the same Internet Protocol (IP) address scenarios as existing SAV methods do. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: This includes both the global routing table based forwarding and Customer Edge (CE) site forwarding of VPN traffic.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): In this scenario, the focus is on the validation of the outer layer IP source address.</t>
        </li>
        <li>
          <t>Both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>The scope does not include:</t>
      <ul spacing="normal">
        <li>
          <t>Non-IP packets: This includes MPLS label-based forwarding and other non-IP-based forwarding.</t>
        </li>
      </ul>
      <t>In addition, the new inter-domain SAV mechanisms <bcp14>MUST NOT</bcp14> modify the data plane packets. Existing architectures or protocols or mechanisms can be inherited by the new SAV mechanism to achieve better SAV effectiveness.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>The SAV list will be generated based on routing information from BGP (FIB/RIB), SAV-related information, and/or SAV-specific information. If the information is poisoned by attackers, the SAV list will be inaccurate. Legitimate packets may be dropped improperly or malicious traffic with spoofed source addresses may be permitted improperly. BGP routing security using available methods for the prevention, detection, and mitigation of route hijacks, route leaks, and AS_PATH manipulations should be deployed which leads to greater accuracy of the BGP (FIB/RIB) information used for computing SAV lists.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Nan Geng<br/>
  Huawei<br/>
  Beijing,
  China <br/>
  Email: gengnan@huawei.com</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC5210">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC7908">
          <front>
            <title>Problem Definition and Classification of BGP Route Leaks</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="B. Dickson" initials="B." surname="Dickson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>A systemic vulnerability of the Border Gateway Protocol routing system, known as "route leaks", has received significant attention in recent years. Frequent incidents that result in significant disruptions to Internet routing are labeled route leaks, but to date a common definition of the term has been lacking. This document provides a working definition of route leaks while keeping in mind the real occurrences that have received significant attention. Further, this document attempts to enumerate (though not exhaustively) different types of route leaks based on observed events on the Internet. The aim is to provide a taxonomy that covers several forms of route leaks that have been observed and are of concern to the Internet user community as well as the network operator community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7908"/>
          <seriesInfo name="DOI" value="10.17487/RFC7908"/>
        </reference>
        <reference anchor="RFC9234">
          <front>
            <title>Route Leak Prevention and Detection Using Roles in UPDATE and OPEN Messages</title>
            <author fullname="A. Azimov" initials="A." surname="Azimov"/>
            <author fullname="E. Bogomazov" initials="E." surname="Bogomazov"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>Route leaks are the propagation of BGP prefixes that violate assumptions of BGP topology relationships, e.g., announcing a route learned from one transit provider to another transit provider or a lateral (i.e., non-transit) peer or announcing a route learned from one lateral peer to another lateral peer or a transit provider. These are usually the result of misconfigured or absent BGP route filtering or lack of coordination between autonomous systems (ASes). Existing approaches to leak prevention rely on marking routes by operator configuration, with no check that the configuration corresponds to that of the External BGP (eBGP) neighbor, or enforcement of the two eBGP speakers agreeing on the peering relationship. This document enhances the BGP OPEN message to establish an agreement of the peering relationship on each eBGP session between autonomous systems in order to enforce appropriate configuration on both sides. Propagated routes are then marked according to the agreed relationship, allowing both prevention and detection of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9234"/>
          <seriesInfo name="DOI" value="10.17487/RFC9234"/>
        </reference>
        <reference anchor="RFC7094">
          <front>
            <title>Architectural Considerations of IP Anycast</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="D. Oran" initials="D." surname="Oran"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo discusses architectural implications of IP anycast and provides some historical analysis of anycast use by various IETF protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7094"/>
          <seriesInfo name="DOI" value="10.17487/RFC7094"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="18" month="January" year="2026"/>
            <abstract>
              <t>   This document provides a gap analysis of existing intra-domain source
   address validation mechanisms, describes the fundamental problems,
   and defines the basic requirements for technical improvements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-21"/>
        </reference>
        <reference anchor="manrs" target="https://manrs.org/resources/training/tutorials/anti-spoofing/">
          <front>
            <title>Anti-Spoofing - Preventing traffic with spoofed source IP addresses (Module 5)</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="isoc" target="https://www.internetsociety.org/resources/doc/2015/addressing-the-challenge-of-ip-spoofing/">
          <front>
            <title>Addressing the challenge of IP spoofing</title>
            <author>
              <organization>Internet Society</organization>
            </author>
            <date year="2015"/>
          </front>
        </reference>
        <reference anchor="nist" target="https://doi.org/10.6028/NIST.SP.800-189r1.ipd">
          <front>
            <title>Border Gateway Protocol Security and Resilience</title>
            <author initials="K." surname="Sriram">
              <organization>NIST</organization>
            </author>
            <author initials="D." surname="Montgomery">
              <organization>NIST</organization>
            </author>
            <date year="2025"/>
          </front>
          <seriesInfo name="NIST SP 800-189r1" value=""/>
        </reference>
        <reference anchor="urpf" target="https://www.cisco.com/c/dam/en_us/about/security/intelligence/urpf.pdf">
          <front>
            <title>Unicast Reverse Path Forwarding Enhancements for the Internet Service Provider-Internet Service Provider Network Edge</title>
            <author>
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 534?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Jared Mauch, Barry Greene, Fang Gao, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Ron Bonica, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, John O'Brien, and Roland Dobbins for their reviews, comments, and suggestions. 
Apologies to any others whose names the authors may have inadvertently missed mentioning.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
