SAVNET D. Li Internet-Draft J. Wu Intended status: Informational Tsinghua University Expires: 5 October 2025 L. Qin M. Huang Zhongguancun Laboratory N. Geng Huawei 3 April 2025 Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements draft-ietf-savnet-intra-domain-problem-statement-14 Abstract This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the basic requirements for technical improvements. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 5 October 2025. Copyright Notice Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components Li, et al. Expires 5 October 2025 [Page 1] Internet-Draft Intra-domain SAVNET Problem Statement April 2025 extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 4 1.2. Requirements Language . . . . . . . . . . . . . . . . . . 5 2. Existing Intra-domain SAV Mechanisms . . . . . . . . . . . . 5 3. Gap Analysis . . . . . . . . . . . . . . . . . . . . . . . . 6 3.1. Intra-domain SAV on Customer-facing or Host-facing Routers . . . . . . . . . . . . . . . . . . . . . . . . . 6 3.1.1. Asymmetric Routing . . . . . . . . . . . . . . . . . 6 3.1.2. Hidden Prefix . . . . . . . . . . . . . . . . . . . . 8 3.2. Intra-domain SAV on AS Border Routers . . . . . . . . . . 10 4. Problem Statement . . . . . . . . . . . . . . . . . . . . . . 11 5. Requirements for New SAV Mechanisms . . . . . . . . . . . . . 12 5.1. Accurate Validation . . . . . . . . . . . . . . . . . . . 12 5.2. Automatic Update . . . . . . . . . . . . . . . . . . . . 12 5.3. Working in Incremental Deployment . . . . . . . . . . . . 12 5.4. Fast Convergence . . . . . . . . . . . . . . . . . . . . 13 5.5. Security . . . . . . . . . . . . . . . . . . . . . . . . 13 6. Security Considerations . . . . . . . . . . . . . . . . . . . 13 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 13 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 13 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 13 9.1. Normative References . . . . . . . . . . . . . . . . . . 14 9.2. Informative References . . . . . . . . . . . . . . . . . 14 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 15 1. Introduction Source Address Validation (SAV) is important for defending against source address spoofing attacks. Network operators can implement SAV mechanisms at multiple levels: access-network SAV, intra-domain SAV, and inter-domain SAV (see [RFC5210]). Access-network SAV (e.g., SAVI [RFC7039], IP Source Guard (IPSG) based on DHCP snooping [IPSG], and Cable Source-Verify [cable-verify]) is typically deployed on switches inside the access network to prevent a host from using the source address of another host. When access-network SAV is not universally deployed, intra-domain SAV on routers can help block spoofing traffic as close to the source as possible. The "domain" used in this document means the Autonomous System (AS). For example, an AS that consists of multiple IGP instances is a single domain. If an Internet Service Provider (ISP) consists of multiple ASes, each AS is a single domain. Li, et al. Expires 5 October 2025 [Page 2] Internet-Draft Intra-domain SAVNET Problem Statement April 2025 This document focuses only on the analysis of intra-domain SAV. Unlike inter-domain SAV which requires information (e.g., Border Gateway Protocol (BGP) data) provided by other ASes to determine SAV rules, intra-domain SAV for an AS determines SAV rules solely by the AS itself without communication with other ASes. Intra-domain SAV for an AS aims at achieving two goals: i) blocking spoofed data packets originated from customer networks or host networks of the AS that use a source address of other networks; and ii) blocking spoofed data packets coming from external ASes that use a source address of the local AS. Figure 1 illustrates the goals of intra-domain SAV with two cases. Case i shows that the customer network or host network of AS X originates spoofed data packets using a source address of other networks. If AS X deploys intra-domain SAV, the spoofed data packets can be blocked (i.e., Goal i). Case ii shows that AS X receives spoofed data packets using a source address of AS X from an external AS. If AS X deploys intra-domain SAV, the spoofed data packets can be blocked (i.e., Goal ii). Case i: The customer network or host network of AS X originates spoofed data packets using a source address of other networks Goal i: If AS X deploys intra-domain SAV, the spoofed data packets can be blocked Spoofed data packets using a source address +-------------------------------+ of other networks +------+ | Customer/Host Network of AS X |---------------------->| AS X | +-------------------------------+ +------+ Case ii: AS X receives spoofed data packets using a source address of AS X from an external AS Goal ii: If AS X deploys intra-domain SAV, the spoofed data packets can be blocked Spoofed data packets using a source address +------+ of AS X +------+ | AS X |<----------------------| AS Y | +------+ +------+ Figure 1: Two Goals of intra-domain SAV This document clarifies that the scope of SAV is to check the validity of the source address of data packets in IP-encapsulated scenarios including: Li, et al. Expires 5 October 2025 [Page 3] Internet-Draft Intra-domain SAVNET Problem Statement April 2025 * Native IP forwarding: including global routing table forwarding and VPN forwarding scenarios. * IP-encapsulated Tunnel (IPsec [RFC4301], GRE [RFC2784], SRv6 [RFC9256], etc.): focusing on the validation of the outer layer IP address. * Both IPv4 and IPv6 addresses. SAV does not check non-IP packets in MPLS label-based forwarding and other non-IP-based forwarding scenarios. In the following, this document provides a gap analysis of existing intra-domain SAV mechanisms, concludes key problems to solve, and proposes basic requirements for future ones. 1.1. Terminology SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions. Host-facing Router: An intra-domain router that is connected to hosts or switches through a layer-2 connection. Host Network: An intra-domain user network that only originates traffic and consists of hosts or/and switches. It sends traffic to other networks through the host-facing router. Customer-facing Router: An intra-domain router that is connected to customer networks through a layer-3 connection (e.g., the static route). Customer Network: An intra-domain user network that only originates traffic and consists of hosts and routers. It sends traffic to other networks through the customer-facing router. Different from host network, routers within the customer network run routing protocols. Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules. Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules. SAV-specific Information: The information specialized for SAV rule generation, which is exchanged among intra-domain routers. Li, et al. Expires 5 October 2025 [Page 4] Internet-Draft Intra-domain SAVNET Problem Statement April 2025 1.2. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 2. Existing Intra-domain SAV Mechanisms This section introduces existing intra-domain SAV mechanisms, including BCP38 [RFC2827] and BCP84 [RFC3704]. * ACL-based ingress filtering or BCP38 [RFC2827] requires that network operators manually configure ACL rules on routers to block or permit data packets with specific source addresses. This mechanism can be used on interfaces of customer-facing or host- facing routers facing a customer network or host network to prevent the corresponding network from spoofing source prefixes of other networks. In addition, it is also usually used on interfaces of AS border routers facing an external AS to block data packets using disallowed source addresses, such as internal source addresses owned by the local AS [nist-rec]. In any application scenario, ACL rules must be updated in time to be consistent with the latest filtering criteria when the network changes. * Strict uRPF [RFC3704] is also typically used on interfaces of customer-facing or host-facing routers facing a customer network or host network. Routers deploying strict uRPF accept a data packet only when i) the local Forwarding Information Base (FIB) contains a prefix covering the packet's source address and ii) the corresponding outgoing interface for the prefix in the FIB matches the packet's incoming interface. Otherwise, the packet will be blocked. * Loose uRPF [RFC3704] uses a looser validation method. A packet will be accepted if the router's local FIB contains a prefix covering the packet's source address regardless of the interface from which the packet is received. In fact, interfaces of AS border routers facing an external AS may use loose uRPF to block incoming data packets using non-global addresses [nist-rec]. EFP- uRPF [RFC8704] is another SAV mechanism which can be used on AS border routers as well. This document does not analyze EFP-uRPF because it is an inter-domain SAV mechanism with a different goal from those described in Section 1. Li, et al. Expires 5 October 2025 [Page 5] Internet-Draft Intra-domain SAVNET Problem Statement April 2025 In summary, ACL-based ingress filtering and uRPF are the two most commonly used intra-domain SAV mechanisms. This document provides a gap analysis of these two mechanisms in Section 3. 3. Gap Analysis This section elaborates the key problems of current intra-domain SAV on customer-facing or host-facing routers and intra-domain SAV on AS border routers, respectively. 3.1. Intra-domain SAV on Customer-facing or Host-facing Routers Towards Goal i in Figure 1, intra-domain SAV is typically deployed on interfaces of customer-facing routers or host-facing routers facing a customer network or host network to validate data packets originated from that network, since SAV is more effective when deployed closer to the source. ACL-based ingress filtering and strict uRPF are commonly used for this purpose. ACL rules must be manually updated according to prefix changes or topology changes in a timely manner. Otherwise, if ACL rules are not updated in time, improper block or improper permit problems may occur. To ensure the accuracy of ACL rules in dynamic networks, high operational overhead will be induced to achieve timely updates for ACL configurations. Strict uRPF can generate and update SAV rules in an automatic way but it will cause improper blocks in the scenario of asymmetric routing or hidden prefix. 3.1.1. Asymmetric Routing Asymmetric routing means a packet traverses from a source to a destination in one path and takes a different path when it returns to the source. For example, Figure 2 shows asymmetric routing in a multi-homing scenario. In the figure, the customer network (e.g., a campus network or an enterprise network) owns prefix 2001:db8::/32 [RFC6890] and is connected to two routers of the AS, i.e., Router 1 and Router 2. For quality of service and backup reasons, although the customer network is connected to two routers, it expects the incoming traffic destined for prefix 2001:db8:0:1::/64 to come preferentially from Router 2. To this end, only Router 2 advertises the routing information of prefix 2001:db8:0:1::/64 in the AS. Figure 2 shows the FIB entries associated with prefix 2001:db8:0:1::/64 for Router 1 and Router 2 (other prefixes in the FIB are omitted for brevity). Li, et al. Expires 5 October 2025 [Page 6] Internet-Draft Intra-domain SAVNET Problem Statement April 2025 While the customer network does not expect traffic destined for prefix 2001:db8:0:1::/64 to come from Router 1, it can send traffic with source addresses of prefix 2001:db8:0:1::/64 to Router 1. As a result, there is asymmetric routing of data packets between the customer network and Router 1. Arrows in the figure indicate the flowing direction of traffic. In addition to the example, other factors (e.g., load balancing) can lead to similar asymmetric routing. +---------------------------------------------------------+ | AS | | +----------+ | | | Router 3 | | | +----------+ | | / \ | | / \ | | / \ | | +----------+ +----------+ | | | Router 1 | | Router 2 | | | +----------+ +----------+ | | /\ / | |Traffic with \ / Traffic with | |source IP addresses \ / destination IP addresses| |of 2001:db8:0:1::/64 \ \/ of 2001:db8:0:1::/64 | | +----------------+ | | | Customer | | | | Network | | | |(2001:db8::/32) | | | +----------------+ | | | +---------------------------------------------------------+ FIB of Router 1 FIB of Router 2 Dest Next_hop Dest Next_hop 2001:db8:0:1::/64 Router 3 2001:db8:0:1::/64 Customer Network The legitimate traffic originated from customer network with source IP addresses in 2001:db8:0:1::/64 will be improperly blocked by strict uRPF on Router 1. Figure 2: Asymmetric routing in a multi-homing scenario Li, et al. Expires 5 October 2025 [Page 7] Internet-Draft Intra-domain SAVNET Problem Statement April 2025 If Router 1 uses strict uRPF, by checking the FIB entry that matches prefix 2001:db8:0:1::/64, the SAV rule is that Router 1 only accepts data packets with source addresses of 2001:db8:0:1::/64 from Router 3. Therefore, when customer network sends data packets with source addresses of 2001:db8:0:1::/64 to Router 1, strict uRPF on Router 1 will improperly block these legitimate data packets. 3.1.2. Hidden Prefix In the hidden prefix scenario, the host originates data packets using a source address that is not advertised through the intra-domain routing protocol. The Content Delivery Networks (CDN) and Direct Server Return (DSR) technology is a representative example of hidden prefix scenario. The edge server in an AS will send DSR response packets using a source address of the anycast server which is located in another remote AS. However, the source address of anycast server is hidden from the intra-domain routing protocol and intra-domain routers in the AS. While this is an inter-domain scenario, DSR response packets will be improperly blocked by strict uRPF when edge server is located in a customer network or a host network. Li, et al. Expires 5 October 2025 [Page 8] Internet-Draft Intra-domain SAVNET Problem Statement April 2025 +-------------------------+ | AS Y | AS Y announces the route | (where the anycast | for anycast prefix P3 | server is located) | in BGP +-----------+-------------+ | | +-----------+-------------+ | Other ASes | +-------------------------+ / \ / \ / \ +------------------+ +---------------------------------------+ | AS Z | | +----------+ AS X | | (where the user | | | Router 4 | | | is located) | | +----------+ | +------------------+ | | | | | | | +----+-----+ | | | Router 5 | | | +----------+ | | /\ DSR responses with | | | source IP addresses| | | of P3 | | +---------------+ | | | Host | | | | Network | | | | (P2) | | | +---------------+ | | (where the edge server is located) | +---------------------------------------+ DSR response packets from edge server in the host network with source IP addresses of P3 (i.e., the anycast prefix) will be improperly blocked by Router 5 if Router 5 uses strict uRPF. Figure 3: Hidden prefix in CDN and DSR scenario Li, et al. Expires 5 October 2025 [Page 9] Internet-Draft Intra-domain SAVNET Problem Statement April 2025 For example, in Figure 3, assume the edge server is located in the host network and Router 5 only learns prefix P2 from the interface connected to the host network. When edge server receives the request from the remote anycast server, it will directly return DSR response packets using the source address of anycast server (i.e., P3). If Router 5 adopts strict uRPF, the SAV rule is that Router 5 only accepts packets with source addresses of P2 from the host network. As a result, DSR response packets will be blocked by strict uRPF on Router 5. In addition, loose uRPF at this interface will also improperly block DSR response packets if prefix P3 only matches the default route in the FIB of Router 5. 3.2. Intra-domain SAV on AS Border Routers Towards Goal ii in Figure 1, intra-domain SAV is typically deployed on interfaces of AS border routers facing an external AS to validate packets arriving from other ASes. Figure 4 shows an example of SAV on AS border routers. In the figure, Router 3 and Router 4 deploy intra-domain SAV on interface '#' for validating data packets coming from external ASes. ACL-based ingress filtering and loose uRPF are commonly used for this purpose. Packets with + Packets with + spoofed P1/P2| spoofed P1/P2| +-------------|---------------------------|---------+ | AS \/ \/ | | +--+#+-----+ +---+#+----+ | | | Router 3 +---------------+ Router 4 | | | +----------+ +----+-----+ | | / \ | | | / \ | | | / \ | | | +----------+ +----------+ +----+-----+ | | | Router 1 | | Router 2 +------+ Router 5 | | | +----------+ +----------+ +----+-----+ | | \ / | | | \ / | | | \ / | | | +---------------+ +-------+-------+ | | | Customer | | Host | | | | Network | | Network | | | | (P1) | | (P2) | | | +---------------+ +---------------+ | | | +---------------------------------------------------+ Figure 4: An example of SAV on AS border routers Li, et al. Expires 5 October 2025 [Page 10] Internet-Draft Intra-domain SAVNET Problem Statement April 2025 By configuring ACL rules, data packets that use disallowed source addresses (e.g., non-global addresses or internal source addresses) can be blocked at AS border routers. However, the operational overhead of maintaining updated ACL rules will be extremely high when there are multiple AS border routers adopting SAV as shown in Figure 4. As for loose uRPF, it sacrifices the directionality of SAV and has limited blocking capability, because it allows packets with source addresses that exist in the FIB table on all router interfaces. 4. Problem Statement As analyzed above, existing intra-domain SAV mechanisms have significant limitations on automatic update or accurate validation. ACL-based ingress filtering relies on manual configurations and thus requires high operational overhead in dynamic networks. To guarantee accuracy of ACL-based SAV, network operators have to manually update the ACL-based filtering rules in time when the prefix or topology changes. Otherwise, improper block or improper permit problems may appear. Strict uRPF can automatically update SAV rules, but may improperly block legitimate traffic under asymmetric routing scenario or hidden prefix scenario. As analyzed in Section 3.1, it may mistakenly consider a valid incoming interface as invalid, resulting in legitimate data packets being blocked (i.e., improper block problem). In summary, strict uRPF cannot guarantee the accuracy of SAV because it solely uses the router’s local FIB information to determine SAV rules, which may not match the incoming interfaces of legitimate data packets from the source in the case of asymmetric routing. As a result, strict uRPF will improperly block legitimate data packets. The network operator has a comprehensive perspective so it can configure the correct SAV rules. However, manual configuration has limitations on automatic update. Loose uRPF is also an automated SAV mechanism but its SAV rules are overly loose. As analyzed in Section 3.2, any spoofed data packet using a source address covered by the FIB will be accepted by loose uRPF (i.e., improper permit problem). Li, et al. Expires 5 October 2025 [Page 11] Internet-Draft Intra-domain SAVNET Problem Statement April 2025 5. Requirements for New SAV Mechanisms To address the problems of current intra-domain SAV mechanisms, this section lists five basic requirements for technical improvements and related discussions that should be considered when designing the new intra-domain SAV mechanism. 5.1. Accurate Validation The new intra-domain SAV mechanism MUST improve the accuracy upon existing intra-domain SAV mechanisms. It MUST achieve the two goals described in Section 1 to block those spoofing traffic from customer networks, host networks, and external ASes. Meanwhile, it MUST avoid blocking legitimate data packets, especially when there are asymmetric routes or network changes. Intra-domain SAV on a customer-facing router or host-facing router can generate an allowlist SAV rule at the interface facing the customer network or host network. The allowlist contains the source IP address space of traffic originated from the corresponding customer network or host network. Intra-domain SAV on an AS border router can generate a blocklist SAV rule at the interface facing an external AS. The blocklist contains the source IP address space of traffic originated from the local AS. To overcome the improper block problems, routers may need to use more information (e.g., SAV-specific information provided by other routers inside the same AS) other than the local FIB information to determine SAV decisions. By integrating more information, routers can learn asymmetric forwarding or routing behaviors, resulting in more accurate SAV rules. 5.2. Automatic Update The new intra-domain SAV mechanism MUST be able to automatically generate and update SAV rules on routers, rather than relying entirely on manual updates like ACL-based ingress filtering. Although some necessary configurations may be needed to improve the accuracy of SAV, automation helps reduces operational overhead in SAV rule generation. 5.3. Working in Incremental Deployment The new intra-domain SAV mechanism MUST specify the deployment scope (i.e., which routers the mechanism is used on) and MUST provide incremental benefits when incrementally deployed within the specified deployment scope. That is, it MUST NOT be effective only when fully deployed. In the incremental deployment scenario, it MUST be able to fulfill or partially fulfill the goals described in Section 1 and MUST avoid improper blocks. Li, et al. Expires 5 October 2025 [Page 12] Internet-Draft Intra-domain SAVNET Problem Statement April 2025 5.4. Fast Convergence The new intra-domain SAV mechanism MUST update SAV rules in time when prefix changes, route changes, or topology changes occur in an AS. Two considerations must be taken into account if SAV-specific information is designed and used by the new intra-domain SAV mechanism. First, the mechanism MUST allow routers to exchange the updated SAV-specific information in a timely manner. Second, the mechanism MUST NOT require routers to signal too much SAV-specific information for the SAV function, because this may greatly increase the burden on the control plane of routers and even compromise the performance of the current protocols. 5.5. Security The new intra-domain SAV mechanisms MUST NOT introduce additional security vulnerabilities or confusion to the existing intra-domain architectures or protocols. Section 6 details the security scope and security considerations for the new intra-domain SAV mechanism. 6. Security Considerations Similar to the security scope of intra-domain routing protocols, intra-domain SAV mechanisms can ensure integrity and authentication of protocol messages that deliver the required SAV-specific information, and consider avoiding unintentional misconfiguration. It is not necessary to provide protection against compromised or malicious intra-domain routers which poison existing control or management plane protocols. Compromised or malicious intra-domain routers may not only affect SAV, but also disrupt the whole intra- domain routing domain. Security mechanisms to prevent these attacks are beyond the capability of intra-domain SAV. 7. IANA Considerations This document does not request any IANA allocations. 8. Acknowledgements Many thanks to the valuable comments from: Jared Mauch, Barry Greene, Fang Gao, Kotikalapudi Sriram, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, Libin Liu, John O'Brien, Roland Dobbins, Xiangqing Chang, Tony Przygienda, Yingzhen Qu, Changwang Lin, James Guichard, Linda Dunbar, Robert Sparks, Yu Fu, Stephen Farrel etc. 9. References Li, et al. Expires 5 October 2025 [Page 13] Internet-Draft Intra-domain SAVNET Problem Statement April 2025 9.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, . 9.2. Informative References [RFC2827] Ferguson, P. and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing", BCP 38, RFC 2827, DOI 10.17487/RFC2827, May 2000, . [RFC3704] Baker, F. and P. Savola, "Ingress Filtering for Multihomed Networks", BCP 84, RFC 3704, DOI 10.17487/RFC3704, March 2004, . [RFC5210] Wu, J., Bi, J., Li, X., Ren, G., Xu, K., and M. Williams, "A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience", RFC 5210, DOI 10.17487/RFC5210, June 2008, . [RFC4301] Kent, S. and K. Seo, "Security Architecture for the Internet Protocol", RFC 4301, DOI 10.17487/RFC4301, December 2005, . [RFC9256] Filsfils, C., Talaulikar, K., Ed., Voyer, D., Bogdanov, A., and P. Mattes, "Segment Routing Policy Architecture", RFC 9256, DOI 10.17487/RFC9256, July 2022, . [RFC2784] Farinacci, D., Li, T., Hanks, S., Meyer, D., and P. Traina, "Generic Routing Encapsulation (GRE)", RFC 2784, DOI 10.17487/RFC2784, March 2000, . [RFC8704] Sriram, K., Montgomery, D., and J. Haas, "Enhanced Feasible-Path Unicast Reverse Path Forwarding", BCP 84, RFC 8704, DOI 10.17487/RFC8704, February 2020, . Li, et al. Expires 5 October 2025 [Page 14] Internet-Draft Intra-domain SAVNET Problem Statement April 2025 [cable-verify] "Cable Source-Verify and IP Address Security", January 2021, . [IPSG] "Configuring DHCP Features and IP Source Guard", January 2016, . [RFC7039] Wu, J., Bi, J., Bagnulo, M., Baker, F., and C. Vogt, Ed., "Source Address Validation Improvement (SAVI) Framework", RFC 7039, DOI 10.17487/RFC7039, October 2013, . [RFC6890] Cotton, M., Vegoda, L., Bonica, R., Ed., and B. Haberman, "Special-Purpose IP Address Registries", BCP 153, RFC 6890, DOI 10.17487/RFC6890, April 2013, . [nist-rec] "Resilient Interdomain Traffic Exchange - BGP Security and DDoS Mitigation", January 2019, . Authors' Addresses Dan Li Tsinghua University Beijing China Email: tolidan@tsinghua.edu.cn Jianping Wu Tsinghua University Beijing China Email: jianping@cernet.edu.cn Lancheng Qin Zhongguancun Laboratory Beijing China Email: qinlc@mail.zgclab.edu.cn Li, et al. Expires 5 October 2025 [Page 15] Internet-Draft Intra-domain SAVNET Problem Statement April 2025 Mingqing Huang Zhongguancun Laboratory Beijing China Email: huangmq@mail.zgclab.edu.cn Nan Geng Huawei Beijing China Email: gengnan@huawei.com Li, et al. Expires 5 October 2025 [Page 16]