<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tong-savnet-sav-enhanced-by-controller-04" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="SAV Enhanced by Controller">Source Address Validation Enhanced by Network Controller</title>
    <seriesInfo name="Internet-Draft" value="draft-tong-savnet-sav-enhanced-by-controller-04"/>
    <author initials="T." surname="Tong" fullname="Tian Tong">
      <organization>China Unicom</organization>
      <address>
        <email>tongt5@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>
    <author initials="N." surname="Wang" fullname="Nan Wang">
      <organization>China Unicom</organization>
      <address>
        <email>wangn161@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>Routing</area>
    <workgroup>Source Address Validation in Intra-domain and Inter-domain Networks</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 55?>

<t>Many newly proposed Source Address Validation (SAV) mechanisms such as IGP-based and BGP-based SAVNET solutions take a distributed manner to generate SAV rules, but they are faced with accuracy and managability challenges in incremental/partial deployment scenarios. RFC 8704 stipulates the use of Adj-RIBs-In to construct AS sets and prefix sets.A centralized approach is essential: collecting Pre-Policy Adj-RIBs-In from ASBRs, performing necessary filtering, and distributing SAV rules via a central controller. 
This document proposes a network controller-based solution for enhancing SAVNET capability in intra-domain and inter-domain networks, which supports accurate verification, automated configuration, threat analysis, traceability and visualization.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-tong-savnet-sav-enhanced-by-controller/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Source Address Validation in Intra-domain and Inter-domain Networks Working Group mailing list (<eref target="mailto:savnet@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/savnet/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/savnet/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 60?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Distributed SAVNET solutions utilize protocol message exchanges among SAVNET routers to acquire source prefix information related to other subnets within intra-domain networks or inter-domain networks, such as Source Prefix Announcement (SPA) technology for intra-domain SAVNET, which can be transmitted by a new protocol or an extension to an existing protocol <xref target="I-D.li-savnet-source-prefix-advertisement"/>. Nonetheless, under circumstances characterized by device heterogeneity, partial upgrades, asymmetric routing, and peculiar address, these solutions face diminished accuracy in Source Address Validation (SAV). Furthermore，there are necessities for enhancement in areas such as automated configuration, threat analysis, traceability, and visualization.</t>
      <t>In this document, on the basis of distributed intra-domain and inter-domain SAVNET architecture, we propose a controller-based and centralized SAVNET enhancement solution. The distributed SAVNET solutions rely on local routing information and SAV-specific information. In this solution, the controller can generate and deliver SAV rules based on the global information, and can also obtain ROA and other external information to generate inter-domain SAV rules, so as to achieve accurate source address verification (SAV) in both intra-domain and inter-domain in a combination of centralized and distributed ways.</t>
      <t>In this solution, SAVNET routers and non-SAVNET routers can cooperate via the network controller. More accurate source address verification rules can be generated based on more comprehensive information in the scenario of partial/incremental deployment of SAVNET. Concurrently, the SAVNET can support accurate verification, automated configuration, threat analysis, traceability and visualization.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t>SAV: Source Address Validation</t>
          </li>
          <li>
            <t>AS: Autonomous System</t>
          </li>
          <li>
            <t>SAV-Specific Information: Information specialized for SAV rule generation, exchanged between routers or from the network controller.</t>
          </li>
          <li>
            <t>SAV-related Information: The information used by a router to make SAV decisions. For intra-domain SAV, SAV-related information includes both local routing information and SAV-specific information.</t>
          </li>
          <li>
            <t>SAV-specific Information Communication Mechanism: The mechanism for exchanging SAV-specific information between routers. It can be either a new protocol or an extension to an existing protocol.</t>
          </li>
          <li>
            <t/>
          </li>
          <li>
            <t>SAV Information Base: A table or data structure in a router that stores specific SAV information and local routing information.</t>
          </li>
          <li>
            <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions and is inferred from the SAV Information Base or from network controller.</t>
          </li>
          <li>
            <t>SAVNET Router:  An intra-domain router which runs intra-domain SAVNET.</t>
          </li>
          <li>
            <t>SAVNET Agent: The agent in a SAVNET router that is responsible for communicating SAV-specific information, processing SAV-related information, and generating SAV rules.</t>
          </li>
          <li>
            <t>AS Edge Router: An intra-domain router of an AS which is connected to client subnets.</t>
          </li>
          <li>
            <t>AS Border Router: An intra-domain router of an AS which is connected to other ASes.</t>
          </li>
          <li>
            <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
          </li>
          <li>
            <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
          </li>
          <li>
            <t>ISP: Internet Service Provider.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="scenarios-and-requirements-for-centralized-savnet">
      <name>Scenarios and Requirements for Centralized SAVNET</name>
      <t>This section introduces the scenarios and requirements of centralized SAVNET, including incremental/partial deployment scenario, obtain information from external systems, automated configuration, analysis and traceability requirements,etc.</t>
      <section anchor="challenges-and-limitations-of-distributed-savnet-in-incrementalpartial-deployment">
        <name>Challenges and Limitations of Distributed SAVNET in Incremental/partial deployment</name>
        <t>The current distributed solution which exchanges SAV-specific information between SAVNET routers depends on devices upgrade. Devices utilize the source prefix advertisement (SPA) information to notify other routers about their subnet and prefix information. Unique subnet ID for each subnet should be planned by network manager, and additional identification information such as subnet ID and access mode on the corresponding port of the device should be configured manually, so as to generate more accurate SAV rules.</t>
        <t>However, devices are upgraded gradually due to various limitations such as device performance、version and vendor. As a result, in an AS, there are some routers support SAVNET and others do not.</t>
        <t>Routers with distributed solution could not generate accurate SAV rules in incremental/partial deployment scenario. Refer to [I-D.li-savnet-intra-domain-architecture] and [I-D.li-savnet-inter-domain-architecture].Though the SAVNET router can obtain routing information from the local RIB/FIB and generate SAV rules for certain prefixes, in the absence of SAV-specific information, the SAV generated based on the local RIB/FIB has the risk of the improper block and improper permit in special scenarios such as asymmetric routing scenario.</t>
        <t>Figure 1 illustrates the asymmetric routing in a multi-homing subnet scenario which has been raised in <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>. Subnet 1 has a prefix of 10.0.0.0/15 and is connected to two edge routers, Router 1 and Router 2. Due to the load balancing policy in the inbound direction of subnet 1, R1 can only learn subnet prefix 10.1.0.0/16 from subnet 1, while R2 can only learn subfix 10.0.0.0/16 from subnet 1. After that, R1 learns another subnet prefix through the intra-domain routing protocol, and so does R2. The FIB of R1 and R2 are shown in Figure 1. R1 is a SAVNET router and R2 is a non-SAVNET router, and R1 and R2 communicate with each other through R3, regardless of whether R3 is a SAVNET router or not, the SPA message cannot be delivered and R2 cannot generate its own SAV-specific information or recognize the SAV-specific information transmitted from R1. Therefore, R1 can only collect part of the prefix information of the subnet to generate SAV rules, and R2 uses the FIB for SAV, then improper block will occur in both R1 and R2 due to incomplete information.</t>
        <figure>
          <name>Asymmetric multi-homing scenario in incremental deployment of intra-domain</name>
          <artwork><![CDATA[
 +--------------------------------------------------------------------+
 |     AS                                                             |
 |                            +----------+                            |
 |                            | Router 3 |                            |
 | FIB on Router 1            +----------+     FIB on Router 2        |
 | Dest         Next_hop       / \     \       Dest         Next_hop  |
 | 10.1.0.0/16  Subnet 1       /        \      10.0.0.0/16  Subnet 1  |
 | 10.0.0.0/16  Router 3      /  SPA     \     10.1.0.0/16  Router 3  |
 |                        +----------+   +----------+                 |
 |                SAVNET  | Router 1 |   | Router 2 | Non-SAVNET      |
 |                        +---+#+----+   +---+#+----+                 |
 |                             \            /                         |
 |                              \          /                          |
 |                             +------------+                         |
 |                             |  Customer  |                         |
 |                             |  Network   |                         |
 |                             +------------+                         |
 |                             (10.0.0.0/15)                          |
 |                                                                    |
 +--------------------------------------------------------------------+
]]></artwork>
        </figure>
        <t>Incremental/partial deployment for inter-domain include: (1) devices partially support SAVNET in an AS; (2) some ASs support SAVNET, while others do not. Figure 2 shows that ASBR1/2/3 are SAVNET routers while ASBR4 is a non-SAVNET router, ASBR4 cannot generate accurate source address verification rules without obtaining SAV-specific information from other AS and other routers in its AS.</t>
        <figure>
          <name>Partial deployment of Savnet for inter-domain</name>
          <artwork><![CDATA[
     +-----------------------+          +------------------------+
     | AS1     +----------+  |          |  +--------- +      AS2 |
     | SAVNET  |  ASBR 1  |  | -------- |  |  ASBR 3  |  SAVNET  |
     |         +----------+  |          |  +----------+          |
     |         +----------+  |          |  +----------+          |
     | SAVNET  |  ASBR 2  |  | -------- |  |  ASBR 4  |  Non-    |
     |         +----------+  |          |  +----------+  SAVNET  |
     +-----------------------+          +------------------------+
]]></artwork>
        </figure>
        <t>As a result, there is a problem of low accuracy in partial/incremental deployment scenarios. In addition, how to improve the protection effect and enhance the incentive is also one of the enhanced capabilities.</t>
      </section>
      <section anchor="obtain-information-from-external-systems">
        <name>Obtain information from external systems</name>
        <t>ASBR in each AS collects the SAV-specific information in its AS domain and synchronizes the SAV-specific information with the ASBR of the adjacent AS domain, and also obtains the RPKI ROA and ASPA information, as well as general information such as RIB, FIB, IRR, etc.Based on the above information sources, each AS generates a relatively complete source address verification table. So each AS needs to establish an information exchange channel and mechanism with the RPKI ROA to ensure network security, but routers shouldn’t directly interact with the RPKI ROA and other external systems, and a controller is appropriate to obtain information such as RPKI ROA and ASPA.</t>
      </section>
      <section anchor="automated-configuration">
        <name>Automated configuration</name>
        <t>Due to the existence of special addresses in the network, such as anycast addresses, the existing distributed SAVNET solutions need to manually identify special addresses and adopt corresponding policies, which brings high management overhead.</t>
        <t>For example, in Figure 3, P1~P4 are common prefixes, P5 is an anycast prefix with multiple legitimate origins including customer network 1, customer network 3 and external Internet. SAVNET with whitelist to be generated on interfaces a, b, and c, and SAVNET blacklist can be generated on interfaces d and e. If subnet 1 could not recognize P5 as an anycast prefix, the blacklist of interfaces d and e includes prefix P5, causing legitimate packets with P5 as the source to be filtered by mistake when they enter from interfaces d and e. Therefore, in order not to include an anycast prefix in a blacklist, it needs to use a special flag to indicate the anycast prefix when subnet 1 advertises the prefix P5 through the SPA.  Prefix type can be obtained and configured on the edge router through the controller if centralized management is possible,.</t>
        <figure>
          <name>Impact of anycast prefix</name>
          <artwork><![CDATA[
 +----------------------------------+     +--------------+
 |  AS  1                           |     |   Other AS   |
 |            +-----------+         |     |              |
 |            |  Router 3 |        e|---- |   Internet   |
 |            +-----------+         |     |              |
 |               /     \            |     |              |
 |              /       \           |     |              |
 |    +----------+   +----------+   |     | +----------+ |
 |    | Router 1 |   | Router 2 |   |     | | Router 4 | |
 |    +---+#+----+   +- -+#+---+    |     | +---+#+----+ |
 |       a |    \b       c|    d\   |     |      |       |
 +---------|-----\--------|------\--+     +------|-------+
           |       \      |        \             |
           |         \    |          \           |
           |           \  |            \         |
      +------------+   +------------+  +------------+
      |  Customer  |   |  Customer  |  |  Customer  |
      |  Network 1 |   |  Network 2 |  |  Network 3 |
      +------------+   +------------+  +------------+
  （prefix-1 and 5）（prefix-2 and 3）（ prefix-4 and 5）
]]></artwork>
        </figure>
        <t>In addition, network providers assign access devices, access ports, and public IP addresses to users who connect to their networks, so that the address allocation system in the carrier's network contains information about the customer's network. Source address verification technology can be combined with address allocation systems to automate configuration and achieve traceability based on source prefix. Centralized network controller can switch the authentication mode of all SAVNET routers flexibly through the delivery configuration.</t>
      </section>
      <section anchor="analysis-and-traceability-requirements">
        <name>Analysis and traceability requirements</name>
        <t>Current scheme provides flexible verification modes such as dropping, rate limiting, or allow for the forged packets in the latest draft sav_table <xref target="I-D.ietf-savnet-general-sav-capabilities"/>. It will play a great role if the controller can collect more source address forgery information from the router, analyze and trace the source in a centralized manner, visualize the source and target of the attack and threat tracing.
Besides, with the continuous expansion of the network scale and the increasing allocation of IP addresses, IP address conflicts include IP address conflicts and IP prefix conflicts will appear, which affects the normal network operation. The controller can find whether the prefixes are reused by checking the prefixes and their binding subnet ID.</t>
      </section>
      <section anchor="aggregate-adj-ribs-in-from-all-relevant-routers">
        <name>Aggregate Adj-RIBs-In from all relevant routers</name>
        <t>RFC8704 specifies using Adj-RIBs-In to construct the AS set and prefix set. The collection of Adj-RIBs-In data across multiple routers within a single AS can be deployed via a central controller. Controller can aggregate Adj-RIBs-In from all relevant routers.</t>
      </section>
    </section>
    <section anchor="centralized-savnet-capability-enhancement-solution">
      <name>Centralized SAVNET capability enhancement solution</name>
      <t>A high-level view of the Centralized SAVNET framework, without expanding the functional entities in network controller and Savnet devices, is illustrated in Figure 4.</t>
      <figure>
        <name>SAVNET capability enhancement architecture based on network controller</name>
        <artwork><![CDATA[
     +---------------------------------------------------------+
     | Controller                                              |
     |     +----------------------------------------+          |
     |     |      SAVNET Management Plane           |          |
     |     +----------------------------------------+          |
     |     +----------------------------------------+          |
     |     |      SAVNET Control Plane              |          |
     |     +----------------------------------------+          |
     |                                                         |
     +---------------------------------------------------------+
                                /|\
                                 |
                                 |
                                \|/
     +---------------------------------------------------------+
     | Savnet Devices                                          |         
     |                  SAVNET Device Plane                    |
     +---------------------------------------------------------+
]]></artwork>
      </figure>
      <t>The following planes are defined:
SAVNET Management Plane：Responsible for monitoring, configuring and maintaining SAVNET devices and Non-SAVNET devices,including delivering configuration to the devices, displaying and managing source address prefixes and SAV rules on devices.</t>
      <t>SAVNET Control Plane: Responsible for generating SAV rules. The incoming interfaces of source address prefixes are calculated based on topology informations，the source address prefixes，roles of devices. Finally, SAVNET entries/rules are generated and sent to the corresponding network devices.</t>
      <t>SAVNET device data plane: Responsible for maintaining and updating SAVNET entries from different sources, source address verification on the data forwarding plane and forwarding packets. The SAVNET entries can have multiple sources. SAV rules may be derived from intra-domain or inter-domain control plane protocols, see [I-D. draft-ietf-savnet-intra-domain-architecture-01] and [I-D.Raft -wu-savnet-inter-domain-architecture-11] for detail. SAV rules may be from the controller as well.</t>
      <t>The following interfaces are defined:
Report the network topology:  The basic BGP-LS as specified in <xref target="RFC9552"/> applies to this document to advertise the network information to the controller.
Report source address prefixes and SAVNET capabilities of network devices: Extend BGP-LS or YANG model to report source address prefixes and SAVNET capabilities of devices. For BGP-LS extensions, see [I-D.draft-cheng-lsr-adv-savnet-capbility].</t>
      <t>Report SAV rules-related information: To facilitate SAV rule monitoring, attack traceback, and service anomaly analysis through a centralized controller, it is critical to dynamically and in real time obtain SAV rule‑related information for source prefixes associated with the subnets or AS connected to routers. BGP-LS extensions is proposed in [I-D.draft-tong-idr-bgp-ls-sav-rule] to support the collection of SAV rule‑related information from routers.</t>
      <t>Deliver SAV rules: SAV rules can be delivered through YANG [I-D.draft-Li-savnet-sav-yang], BGP-LS[I-D.draft-haas-savnet-bgp-sav-distribution], and BGP-FS [I-D.draft-geng-idr-flowspec-sav]. Detailed definition of SAV rules can see [I-D.draft-ietf-savnet-general-sav-capabilities]. When some network devices do not support SAVNET, the controller can deliver other protection policies, such as ACL rules, to the corresponding network devices.</t>
      <section anchor="key-technologies-in-intra-domain-savnet-enhancement">
        <name>Key technologies in Intra-domain SAVNET enhancement</name>
        <t>This section describes the intra-Domain SAV Enhancement based on Controller. Figure 5 illustrates Centralized SAVNET capability enhancement architecture in an intra-domain network. Centralized Controller can support accurate verification, automated configuration, threat analysis, traceability and visualization.</t>
        <figure>
          <name>intra-domain SAVNET capability enhancement architecture based on network controller</name>
          <artwork><![CDATA[
     +---------------------------------------------------------+
     |                                                         |
     |                    SAVNET Controller                    |
     +---------------------------------------------------------+          
                                /|\
                                 |
                                \|/
     +---------------------------------------------------------+
     |           +--------+            +--------+              |         
     |           | ASBR1  |            | ASBR2  |              |
     |           +--------+            +--------+              |
     |               |                      |                  |
     |           +------------------------------+              |
     |           |         other Routers        |              |
     |           +------------------------------+              | 
     |             |             |            |                |
     |        +--------+    +--------+    +--------+           |
     |        |  R1    |    |  R2    |    |  R3    |           |
     |        +--------+    +--------+    +--------+           |
     +---------------------------------------------------------+    
]]></artwork>
        </figure>
        <t>As shown in the figure above, when SAVNET is deployed in the intra-domain, controller can implement different control policies based on roles of devices. For the boundary devices in the domain, the blacklist policy is adopted. For the multi-homing access devices in the domain, the controller delivers multi-homing SAV rules in a centralized manner.</t>
        <t>Deliver SAV rules in intra-domain:
(1) AS Boundary Router (ASBR): The controller collects source address prefixes of all subnets in the AS domain, first removes special IP addresses or prefixes, such as anycast IP addresses, then generates the SAV rules/policies（in blacklist mode） containing all source address prefixes of the AS, and sends the SAV rules/policies to the ASBR. The SAV rules are generated and delivered to the routers that support SAVNET, and other defense policies, such as ACL (filtering specific source addresses on specific incoming interfaces), are generated and delivered to the routers that do not support SAVNET.</t>
        <figure>
          <name>Deliver SAV rules to AS Border Routers</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                                                 |
     |                SAVNET Controller                |
     +-------------------------------------------------+          
                 /|\                   /|\
                  |                     |
                 \|/                   \|/
              +--------+            +--------+                      
              | ASBR1  |            | ASBR2  |              
              +--------+            +--------+              
            SAVNET Router         Non-SAVNET Router
]]></artwork>
        </figure>
        <t>(2) Access Router: If a subnet is connected to two access routers and only one router supports SAVNET and the other does not, the controller can generate the SAV entry of P2 and send it to access router R1. The prefix-interface whitelist of access router R1 includes P1 and P2 to avoid false blocking. The controller can also generate ACL entries with prefixes P1 and P2 and send them to the access interface of access router R2 which does not support SAVNET.</t>
        <figure>
          <name>Deliver SAV rules to access routers</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                                                 |
     |                SAVNET Controller                |
     +-------------------------------------------------+          
                 /|\                   /|\
                  |                     |
                 \|/                   \|/
         +---------------+      +---------------+                      
         | Access Router |      | Access Router |             
         +---------------+      +---------------+           
  SAVNET Router      \             /       Non-SAVNET Router
                  P1  \           / P2
                    +---------------+
                    |   Customer    |
                    |   Network     |
                    +---------------+

]]></artwork>
        </figure>
      </section>
      <section anchor="key-technologies-in-inter-domain-savnet-enhancement">
        <name>Key technologies in Inter-domain SAVNET enhancement</name>
        <t>In inter-domain source address verification, the controller can also play an important role.</t>
        <ul spacing="normal">
          <li>
            <t>Generation and Receipt of Inter-domain SAV-specific Messages：</t>
          </li>
        </ul>
        <t>Inter-domain Source Address Validation (SAV) consists of a Source Autonomous System (AS) and a Validation Autonomous System (AS). And the controller of the Source AS can assist in generating and sending inter-domain SAV-specific messages, while the controller of the Validation AS can assist in receiving and propagating such inter-domain SAV-specific messages. The following takes inter-domain Source Prefix Assertion (SPA) messages as an example for illustration.</t>
        <t>A SPA message contains the AS number of the Source AS and the source prefixes included in this AS. Since the controller of the Source AS can centrally generate intra-domain SAV rules, it can conveniently obtain the source prefixes of the Source AS and further generate inter-domain SPA messages.</t>
        <t>Inter-domain SPA messages are sent from the Source AS to the Validation AS. If the designated ASBR in the Source AS or the Validation AS does not support SAVNET , the SPA messages can be sent from the controller of the Source AS to the controller of the Validation AS.</t>
        <ul spacing="normal">
          <li>
            <t>Centralized Generation of Inter-domain SAV Rules</t>
          </li>
        </ul>
        <t>Inter-domain SAV rules are generated by the Validation AS. The controller of the Validation AS can integrate information such as RIB, FIB, ROA and ASPA objects of the RPKI, IRR data, and SAV-specific information. Then it generates inter-domain SAV rules based on a priority policy, where SAV-specific information has the highest priority.</t>
        <figure>
          <name>Inter-domain SAV rules generation based on Centralized controller</name>
          <artwork><![CDATA[
       +-------------------------------+  +--------------+
       |  RPKI ROA Obj. and ASPA Obj.  |  | IRR Database |
       +-------------------------------+  +--------------+
                  /|\                       /|\
    +--------------|-------------------------|------+
    |             \|/                       \|/     |
    |  +----------------------------------------+   |   +-------------------+
    |  |         AS2 network controller         |<----->|  AS1 controller   |
    |  +----------------------------------------+   |   +-------------------+
    |          /|\                /|\        SAV-Specific information
    |           |                  |                |
    |           |  SAV rules       |  ACL           |                
    |          \|/                \|/               |              
    |  +-------------------+   +-----------------+  |      
    |  |     AS2 ASBR      |   |     AS2 ASBR    |  |
    |  +-------------------+   +-----------------+  | 
    |     SAVNET Router         Non-SAVNET Router   |
    +-----------------------------------------------+              
]]></artwork>
        </figure>
        <t>The controller of the Validation AS can distribute the centrally generated inter-domain SAV rules to ASBRs, in order to perform inter-domain source address validation. Specifically, it generates and distributes SAV rules to ASBRs that support SAVNET, and generates and distributes ACL rules to ASBRs that do not support SAVNET, which enhances the incentives in partial deployment scenarios.</t>
      </section>
    </section>
    <section anchor="use-case">
      <name>Use Case</name>
      <t>Several use cases will illustrate that centralized SAVNET can achieve more accurate and comprehensive SAV when SAVNET is partially deployed in network.</t>
      <section anchor="case-1-more-effective-intra-domain-edge-and-boundary-protection-in-incrementalpartial-deployment-scenario">
        <name>Case 1: More effective intra-domain edge and boundary protection in incremental/partial deployment scenario</name>
        <t>Figure 11 illustrates the asymmetric routing in a multi-homing subnet scenario. R1 and R2 serves as the edge router. R3 serves as the border egress. Partial SAVNET deployment: R1 lacks SAVNET support, while R2 and R3 are SAVNET-enabled.</t>
        <figure>
          <name>asymmetric routing in a multi-homing subnet scenario</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                   Controller                    |
     +-------------------------------------------------+          
            /|\          /|\            /|\
             |            |              |
             |           \|/ IF3         |
             |         +-----+           |
             |         | R3  |           |
             |         +-----+           |
            \|/       SAVNET Router     \|/
          +-----+                     +-----+                      
          | R1  | Non-SAVNET Router   | R2  | SAVNET Router             
          +-----+                     +-----+              
            IF1 \    Edge router      / IF2
                 \                   /
    Prefix 1 (P1) \                 /  Prefix 2 (P2)
    AS             \               /
                    +-------------+   
                    |   subnet    |
                    +-------------+ 
]]></artwork>
        </figure>
        <t>(1)Distributed SAVNET limitations:</t>
        <t>R1 (SAVNET-disabled): Fails to advertise P1 via SAVNET protocol. Thus:R2's interface IF2 cannot generate a whitelist covering both P1 and P2.R3's interface IF3 cannot create a blacklist for P1, leaving it unprotected.
R2 (SAVNET-enabled): Advertises P2 via SAVNET protocol successfully.
R3 (SAVNET-enabled): blocks P2 traffic on IF3 but allows P1 spoofing.</t>
        <t>Test Results:
Tester A sending P1/P2/P3 traffic to R1 and R2:
--R1 (IF1): No blocking (No protection).
--R2 (IF2): P1 blocked (improper block).</t>
        <t>Tester B spoofing P1/P2/P3 to R3:
--R3 (IF3): P2 blocked, P1/P3 allowed (insufficient protection).</t>
        <t>(2)SAVNET enhancement with centralized controller:</t>
        <t>Controller Actions:
--Collects subnet prefix P1 from R1 and P2 from R2.
--Delivers ACL whitelist (P1+P2) to R1's IF1 and SAV rules to R2's IF2.
--Delivers blacklist (P1+P2) to R3's IF3.</t>
        <t>Test Results:
Tester A: P1/P2 allowed on R1's IF1 and R2's IF2. P3 blocked. No improper blocking (full protection).
Tester B: P1/P2 blocked on IF3, P3 allowed (precise control).</t>
      </section>
      <section anchor="case-2-more-effective-inter-domain-boundary-protection-with-non-savnet-border-devices">
        <name>Case 2: More effective inter-domain boundary protection with Non-SAVNET Border Devices</name>
        <t>Edge routers R1/R2 support SAVNET, but border router R3 does not (Figure 12).</t>
        <figure>
          <name>More effective intra-domain boundary protection</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                   Controller                    |
     +-------------------------------------------------+          
            /|\          /|\            /|\
             |            |              |
             |           \|/ IF3         |
             |         +-----+           |
             |         | R3  |           |
             |         +-----+           |
            \|/   Non-SAVNET Router     \|/
          +-----+                     +-----+                      
          | R1  | SAVNET Router       | R2  | SAVNET Router             
          +-----+                     +-----+              
            IF1 \   Edge router       / IF2
                 \                   /
    Prefix 1 (P1) \                 /  Prefix 2 (P2)
    AS             \               /
                    +-------------+   
                    |   subnet    |
                    +-------------+ 
]]></artwork>
        </figure>
        <t>(1)Distributed SAVNET limitations:
R3 cannot process SAVNET messages from R1/R2, leaving P1/P2 unprotected.</t>
        <t>Test Results:
Tester B(spoofing P1/P2/P3 to R3): All traffic permitted (zero protection).</t>
        <t>(2)SAVNET enhancement with centralized controller:</t>
        <t>Controller Actions:
- Aggregates P1 (from R1) and P2 (from R2).
- Delivers unified blacklist (P1+P2) to R3's IF3.</t>
        <t>Test Results:
Tester B: P1/P2 blocked; P3 allowed (boundary secured).</t>
      </section>
      <section anchor="case-3-more-accurate-anycast-ip-protection">
        <name>Case 3: More accurate anycast IP protection</name>
        <t>Edge routers R1/R2 and border router R3 all support SAVNET. Subnet advertises sub prefixe P1 (anycast IP) via R1 and P2 via R2.</t>
        <figure>
          <name>More accurate anycast IP protection</name>
          <artwork><![CDATA[
     +-------------------------------------------------+
     |                   Controller                    |
     +-------------------------------------------------+          
            /|\          /|\            /|\
             |            |              |
             |           \|/ IF3         |
             |         +-----+           |
             |         | R3  |           |
             |         +-----+           |
            \|/   Non-SAVNET Router     \|/
          +-----+                     +-----+                      
          | R1  | SAVNET Router       | R2  | SAVNET Router             
          +-----+                     +-----+              
            IF1 \   Edge router       / IF2
   (anycast IP)  \                   /
    Prefix 1 (P1) \                 /  Prefix 2 (P2)
    AS             \               /
                    +-------------+   
                    |   subnet    |
                    +-------------+ 
]]></artwork>
        </figure>
        <t>(1)Distributed SAVNET Challenge:
Anycast conflict: P1 is also advertised by other AS, leading to ambiguous SAV rules.
Risk: Legitimate P1 traffic may be incorrectly blocked by boundary router.</t>
        <t>Test Results:
Tester B sending P1/P2 traffic to R3: P2 blocked; anycast P1 blocked (improper block).</t>
        <t>(2)SAVNET enhancement with centralized controller:
Controller Actions:
Correlates P1 with AS-specific topology data.
Generates context-aware SAV rules to distinguish legitimate anycast traffic.</t>
        <t>Test Results:
Tester B: P2 blocked; P1 permitted (Prevent improper block).</t>
      </section>
      <section anchor="case-4-enhanced-inter-domain-sav-via-sdn-controller">
        <name>Case 4: Enhanced inter-domain SAV via SDN controller</name>
        <t>Operators obtain IP blocks and AS numbers from registries, assigning them to network segments or business units.
Controller-Driven Optimization: SDN controller aggregates AS-number-to-IP mappings from carrier registries.Delivers complete SAV tables to ASBRs.
Impact: Eliminates spoofed inter-domain traffic (e.g., forged source IPs outside assigned ranges).Achieves more accuracy in inter-domain SAVNET.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBD.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9552">
          <front>
            <title>Distribution of Link-State and Traffic Engineering Information Using BGP</title>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <date month="December" year="2023"/>
            <abstract>
              <t>In many environments, a component external to a network is called upon to perform computations based on the network topology and the current state of the connections within the network, including Traffic Engineering (TE) information. This is information typically distributed by IGP routing protocols within the network.</t>
              <t>This document describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol. This is achieved using a BGP Network Layer Reachability Information (NLRI) encoding format. The mechanism applies to physical and virtual (e.g., tunnel) IGP links. The mechanism described is subject to policy control.</t>
              <t>Applications of this technique include Application-Layer Traffic Optimization (ALTO) servers and Path Computation Elements (PCEs).</t>
              <t>This document obsoletes RFC 7752 by completely replacing that document. It makes some small changes and clarifications to the previous specification. This document also obsoletes RFC 9029 by incorporating the updates that it made to RFC 7752.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9552"/>
          <seriesInfo name="DOI" value="10.17487/RFC9552"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="18" month="January" year="2026"/>
            <abstract>
              <t>   This document provides a gap analysis of existing intra-domain source
   address validation mechanisms, describes the fundamental problems,
   and defines the basic requirements for technical improvements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-21"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement">
          <front>
            <title>Gap Analysis, Problem Statement, and Requirements for Inter-Domain SAV</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="14" month="February" year="2026"/>
            <abstract>
              <t>   This document provides a gap analysis of existing inter-domain source
   address validation mechanisms, describes the problem space, and
   defines the requirements for technical improvements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-14"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-architecture">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="13" month="October" year="2025"/>
            <abstract>
              <t>   This document specifies the architecture of intra-domain SAVNET,
   which aims to achieve accurate source address validation (SAV) at
   external interfaces of an intra-domain network in an automated
   manner.  It describes the conceptual design of intra-domain SAVNET,
   along with its use cases and design requirements, to help ensure that
   the intended objectives are met.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-architecture-03"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-architecture">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="1" month="March" year="2026"/>
            <abstract>
              <t>   This document introduces an inter-domain SAVNET architecture for
   performing AS-level SAV and provides a comprehensive framework for
   guiding the design of inter-domain SAV mechanisms.  The proposed
   architecture empowers ASes to generate SAV rules by sharing SAV-
   specific information between themselves, which can be used to
   generate more accurate and trustworthy SAV rules in a timely manner
   compared to the general information.  During the incremental or
   partial deployment of SAV-specific information, it can utilize
   general information to generate SAV rules, if an AS's SAV-specific
   information is unavailable.  Rather than delving into protocol
   extensions or implementations, this document primarily concentrates
   on proposing SAV-specific and general information and guiding how to
   utilize them to generate SAV rules.  To this end, it also defines
   some architectural components and their relations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-architecture-03"/>
        </reference>
        <reference anchor="I-D.li-savnet-source-prefix-advertisement">
          <front>
            <title>Source Prefix Advertisement for Intra-domain SAVNET</title>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <date day="29" month="January" year="2026"/>
            <abstract>
              <t>   This document describes a mechanism for intra-domain source address
   validation (SAV), called Source Prefix Advertisement (SPA) for Intra-
   domain SAVNET (Intra-domain SPA).  The mechanism enables intra-domain
   routers to generate accurate SAV rules by leveraging routing
   information together with SAV-specific information, including Source
   Entity Identifiers (SEIs) and Hidden Prefix (HP).  Intra-domain SPA
   improves the precision and reliability of source address validation,
   addressing challenges such as asymmetric routing and the use of
   hidden prefixes by legitimate source entities.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-source-prefix-advertisement-06"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-general-sav-capabilities">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   The SAV rules of existing source address validation (SAV) mechanisms,
   are derived from other core data structures, e.g., FIB-based uRPF,
   which are not dedicatedly designed for source filtering.  Therefore
   there are some limitations related to deployable scenarios and
   traffic handling policies.

   To overcome these limitations, this document introduces the general
   SAV capabilities from data plane perspective.  How to implement the
   capabilities and how to generate SAV rules are not in the scope of
   this document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-02"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
