<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-qin-savnet-authoritative-information-01" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Authoritative Information Considerations">Considerations on Authoritative Information for Source Address Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-qin-savnet-authoritative-information-01"/>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="February" day="10"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 46?>

<t>Source Address Validation (SAV) prevents source address spoofing. This document explains that SAVNET relies on authoritative information. It also describes how to handle missing or conflicting data. The guidance minimizes improper blocks and improper permits while supporting reliable SAV enforcement.</t>
    </abstract>
  </front>
  <middle>
    <?line 50?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) prevents source address spoofing and enforces BCP38 <xref target="RFC2827"/>, BCP84 <xref target="RFC3704"/>, and <xref target="RFC8704"/>. SAV relies on authoritative information to determine which source addresses are legitimate. However, SAV may encounter situations where this information is missing or conflicting.</t>
      <t>This document provides a conceptual framework for understanding authoritative information in the context of SAVNET, including:</t>
      <ul spacing="normal">
        <li>
          <t>What constitutes authoritative information and which sources can be trusted.</t>
        </li>
        <li>
          <t>How to handle missing authoritative information.</t>
        </li>
        <li>
          <t>How to reconcile conflicting authoritative sources.</t>
        </li>
        <li>
          <t>The role of non-authoritative information as a reference in contextual or policy-based decisions.</t>
        </li>
      </ul>
      <t>By clarifying these principles, the document aims to guide the design and operation of SAV mechanisms that are both secure and operationally reliable, while minimizing improper blocks and improper permits.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="what-constitutes-authoritative-information">
      <name>What Constitutes Authoritative Information</name>
      <t>Authoritative information determines which source addresses are legitimate. To be considered authoritative, information should meet the following criteria:</t>
      <ul spacing="normal">
        <li>
          <t>Organizational authority: The source must be maintained by an entity that has recognized authority over the relevant prefixes or networks.</t>
        </li>
        <li>
          <t>Verifiability: The source must provide a mechanism to verify its correctness and authenticity, such as cryptographic validation.</t>
        </li>
        <li>
          <t>Timeliness: The information must reflect the current operational state and be updated promptly to avoid reliance on stale or outdated data.</t>
        </li>
        <li>
          <t>Integrity and security: The source must be resistant to unauthorized modifications or tampering.</t>
        </li>
      </ul>
      <t>Based on these criteria, authoritative information in SAVNET typically includes:</t>
      <ul spacing="normal">
        <li>
          <t>RPKI objects: Cryptographically verifiable objects such as ROAs (Route Origin Authorizations) <xref target="RFC9582"/>, ASPAs (Autonomous System Provider Authorizations) <xref target="I-D.ietf-sidrops-aspa-profile"/>, and TOAs (Traffic Origin Authorizations) <xref target="I-D.qin-savnet-toa"/> that provide explicit assertions about origin authorization or transit authorization.</t>
        </li>
        <li>
          <t>Local or static configuration: Operator-defined rules specifying source address permissions for hosts, non-BGP customer networks, or external ASes.</t>
        </li>
      </ul>
      <t>Note on routing information:
Routing information from intra-domain or inter-domain protocols (e.g., IGP, BGP) may indicate reachable prefixes and their origins, but it cannot be considered authoritative by itself because it may include unauthorized or forged routes. If routing information is used to derive SAV rules, it should be validated—such as via RPKI-based Route Origin Validation (ROV)—before being treated as a trusted source.</t>
      <t>By defining authoritative information in this way, SAV mechanisms can rely on sources that provide sufficient guarantees of correctness, integrity, and timeliness, reducing the risk of improper blocks or improper permits in filtering.</t>
    </section>
    <section anchor="when-authoritative-information-is-missing">
      <name>When Authoritative Information Is Missing</name>
      <t>SAV may encounter situations where authoritative information about a particular prefix or source entity is unavailable. Such situations can arise for various reasons, including:</t>
      <ul spacing="normal">
        <li>
          <t>The relevant RPKI objects (e.g., ROAs, ASPAs, TOAs) do not exist or have not yet been published.</t>
        </li>
        <li>
          <t>Local configuration has not been defined for a newly connected host, non-BGP customer network, or external AS.</t>
        </li>
      </ul>
      <t>When authoritative information is missing, SAV solutions must decide how to handle traffic from the corresponding source addresses. Several approaches have been considered:</t>
      <ul spacing="normal">
        <li>
          <t>Conservative approach: Treat the source addresses as unauthorized and block traffic. This minimizes the risk of accepting spoofed packets but may result in legitimate traffic being dropped.</t>
        </li>
        <li>
          <t>Permissive approach: Allow traffic from the source addresses by default. This avoids accidental disruption of legitimate communications but increases the risk of accepting spoofed packets.</t>
        </li>
        <li>
          <t>Contextual approach: Use non-authoritative or contextual information when authoritative information is missing. Non-authoritative or contextual information may include trusted routing information, historical traffic patterns, or operational context. Given the current limited deployment of authoritative information, this approach is often the only practical means to achieve incremental progress in SAV enforcement.</t>
        </li>
      </ul>
      <t>Even when non-authoritative or contextual information (e.g., trusted routing information) is used, such information may also be missing for specific prefixes or ASes. Operators must determine how enforcement should behave under uncertainty. Possible behaviors include strict blocking, permissive acceptance, or intermediate strategies, such as permitting traffic while logging and investigating. <xref target="I-D.ietf-savnet-general-sav-capabilities"/> defines a broader set of traffic-handling actions, including rate limiting, traffic redirection, counting, sampling, and monitoring, which can help operators manage uncertainty while maintaining operational continuity.</t>
    </section>
    <section anchor="when-authoritative-sources-conflict">
      <name>When Authoritative Sources Conflict</name>
      <t>SAV may encounter situations where multiple sources of authoritative information provide overlapping or apparently conflicting statements about the legitimacy of a source address or prefix. Such conflicts can arise, for example, when:</t>
      <ul spacing="normal">
        <li>
          <t>Different RPKI objects (ROAs, ASPAs, TOAs) provide overlapping assertions for the same prefix.</t>
        </li>
        <li>
          <t>Local or static configurations overlap with information from other authoritative sources.</t>
        </li>
      </ul>
      <t>SAV solutions should treat all authoritative sources as equally credible and merge information from all sources. Any address or prefix authorized by at least one source should be considered legitimate. This approach ensures that no legitimate source address is incorrectly blocked, reducing improper blocks while maintaining reliable SAV enforcement.</t>
      <t>Non-authoritative or contextual information may be consulted as a reference to support operational understanding (see Section 3), but it must not override or negate any authorization provided by an authoritative source.</t>
    </section>
    <section anchor="discussion-and-next-steps">
      <name>Discussion and Next Steps</name>
      <t>This document provides a conceptual framework for understanding authoritative information in SAVNET, addressing scenarios where information is missing or conflicting. The following points highlight key considerations for SAV design and operations:</t>
      <ul spacing="normal">
        <li>
          <t>Definition of authoritative information: SAV must rely on sources that are verifiable, secure, timely, and maintained by recognized authorities, such as RPKI signed objects (ROAs, ASPAs, TOAs), SAV-specific signaling with security guarantees, or operator-defined local/static configuration.</t>
        </li>
        <li>
          <t>Handling missing information: When authoritative information is unavailable, fallback strategies—conservative, permissive, or contextual/policy-based using non-authoritative information as reference—should be defined.</t>
        </li>
        <li>
          <t>Conflict resolution: Conflicting authoritative sources should be merged to ensure all authorized prefixes and source addresses are preserved.</t>
        </li>
        <li>
          <t>Open questions: Additional work may include defining authoritative attributes in greater detail, coordinating with other working groups (e.g., GROW, OSPAWG) for operational guidance, and specifying mechanisms to securely exchange SAV-specific signaling information.</t>
        </li>
      </ul>
      <t>This framework provides a foundation for discussion and standardization of SAV mechanisms that rely on authoritative information, ensuring both security and operational reliability.</t>
    </section>
    <section anchor="security-and-operational-considerations">
      <name>Security and Operational Considerations</name>
      <t>Reliable SAV enforcement depends on correct identification of legitimate source addresses. Inaccurate, missing, or conflicting authoritative information can lead to operational and security risks, including:</t>
      <ul spacing="normal">
        <li>
          <t>Improper blocks: Legitimate traffic is blocked, potentially disrupting services.</t>
        </li>
        <li>
          <t>Improper permits: Spoofed or unauthorized traffic is accepted, increasing vulnerability to attacks.</t>
        </li>
      </ul>
      <t>Mitigation strategies include:</t>
      <ul spacing="normal">
        <li>
          <t>Validation and cross-checking: Ensure authoritative sources are consistent and verifiable.</t>
        </li>
        <li>
          <t>Timely updates and monitoring: Maintain freshness of authoritative information to avoid reliance on stale data.</t>
        </li>
        <li>
          <t>Documentation and operational procedures: Clearly define policies for missing, inaccurate, or conflicting authoritative information, including fallback handling.</t>
        </li>
        <li>
          <t>Fallback and reference mechanisms: Non-authoritative information (e.g., routing data) may be used as a reference in contextual or policy-based approaches but must never be treated as definitive.</t>
        </li>
        <li>
          <t>Merge strategy for conflicts: All authoritative sources should be combined, ensuring that any prefix or source address authorized by at least one source is accepted, minimizing improper blocks.</t>
        </li>
      </ul>
      <t>By implementing these practices, networks can maintain reliable SAV enforcement while reducing both security and operational risks. This approach emphasizes using authoritative information wherever possible and leveraging non-authoritative data only as a reference when necessary.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC9582" target="https://www.rfc-editor.org/info/rfc9582" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9582.xml">
          <front>
            <title>A Profile for Route Origin Authorizations (ROAs)</title>
            <author fullname="J. Snijders" initials="J." surname="Snijders"/>
            <author fullname="B. Maddison" initials="B." surname="Maddison"/>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="D. Kong" initials="D." surname="Kong"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This document defines a standard profile for Route Origin Authorizations (ROAs). A ROA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate routes to one or more prefixes within the address block. This document obsoletes RFC 6482.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9582"/>
          <seriesInfo name="DOI" value="10.17487/RFC9582"/>
        </reference>
        <reference anchor="I-D.qin-savnet-toa" target="https://datatracker.ietf.org/doc/html/draft-qin-savnet-toa-01" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.qin-savnet-toa.xml">
          <front>
            <title>A Profile for Traffic Origin Authorizations (TOAs)</title>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Igor Lubashev" initials="I." surname="Lubashev">
              <organization>Akamai</organization>
            </author>
            <date day="29" month="January" year="2026"/>
            <abstract>
              <t>This document defines a standard profile for Traffic Origin Authorizations (TOAs), a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI). A TOA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate traffic using source IP addresses within the address block.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-qin-savnet-toa-01"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-profile" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-profile-22" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-profile.xml">
          <front>
            <title>A Profile for Autonomous System Provider Authorization</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Uskov" initials="E." surname="Uskov">
              <organization>JetLend</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>BSD Software Development</organization>
            </author>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <date day="6" month="February" year="2026"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for Autonomous System Provider Authorization (ASPA) objects for use with the Resource Public Key Infrastructure (RPKI). An ASPA is a digitally signed object through which the issuer (the holder of an Autonomous System identifier), can authorize one or more other Autonomous Systems (ASes) as its upstream providers. When validated, an ASPA's eContent can be used for detection and mitigation of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-profile-22"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-general-sav-capabilities" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-general-sav-capabilities-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-general-sav-capabilities.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-02"/>
        </reference>
      </references>
    </references>
    <?line 185?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
