<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wang-sav-deployment-status-01" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="SAV Deloyment Status">Source Address Validation Deployment Status</title>
    <seriesInfo name="Internet-Draft" value="draft-wang-sav-deployment-status-01"/>
    <author initials="S." surname="Wang" fullname="Shuai Wang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>wangshuai@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="R." surname="Li" fullname="Ruifeng Li">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lirf@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="He" fullname="Lin He">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>he-lin@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="March" day="01"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 97?>

<t>This document provides a summary of methods for measuring the deployment status of source address validation, with an overview of its deployment status. It reviews various methods for measuring outbound and/or inbound source address validation, including established tools like CAIDA Spoofer, as well as recently proposed remote measurement methods. By combining results from these different methods, the document offers a comprehensive overview of the status of source address validation deployment across the Internet.</t>
    </abstract>
  </front>
  <middle>
    <?line 101?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>IP spoofing, sending packets with source addresses that do not belong to the sending host, is one of the long-standing security threats in the Internet. Source address validation (SAV) is important for protecting networks from IP spoofing attacks. Several techniques have been proposed to validate the source address of traffic, including Access Control List (ACL), unicast Reverse Path Forwarding (uRPF), and Virtual routing and forwarding (VRF) table. SAV can be categorized into two types: outbound SAV (OSAV) and inbound SAV (ISAV). OSAV discards spoofed packets originating from within a network and destined for external destinations, while ISAV focuses on filtering spoofed packets arriving from external sources to the network.</t>
      <t>The MANRS initiative considers IP spoofing as one of the most common routing threats, and defines a recommended action to mitigate spoofing traffic <xref target="manrs"/>, encouraging network operators to implement SAV for their own infrastructure and end users, and for any Single-Homed Stub Customer Networks. However, as a recommended action, not all MANRS members follow this action to implement SAV for their networks, and only 1.6% of all routed ASes participate in MANRS. As a result, there is a lack of comprehensive knowledge regarding the current status of SAV deployment across the Internet community.</t>
      <t>This document aims to provide a comprehensive view about SAV deployment in the Internet. The topics discussed in this document are organized into three main sections.</t>
      <ul spacing="normal">
        <li>
          <t>Section 3 summarizes methods for measuring the deployment of OSAV.</t>
        </li>
        <li>
          <t>Section 4 summarizes methods for measuring the deployment of ISAV.</t>
        </li>
        <li>
          <t>Section 5 describes and analyzes the SAV deployment based on the measurement results derived from these methods.</t>
        </li>
      </ul>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>Spoofed Packet:</dt>
        <dd>
          <t>A packet with forged source IP address. That is, the source IP address of the packet is not the legitimate IP address assigned to the sender.</t>
        </dd>
        <dt>Outbound Spoofing:</dt>
        <dd>
          <t>The behavior where a network does not discard spoofed packets sent from the network to the outside.</t>
        </dd>
        <dt>Inbound Spoofing:</dt>
        <dd>
          <t>The behavior where a network does not discard spoofed packets sent from the outside to the network.</t>
        </dd>
        <dt>Outbound Source Address Validation (OSAV):</dt>
        <dd>
          <t>The mechanism that discards spoofed packets sent from a network to the outside of it.</t>
        </dd>
        <dt>Inbound Source Address Validation (ISAV):</dt>
        <dd>
          <t>The mechanism that discards spoofed packets sent from the outside of a network to it.</t>
        </dd>
        <dt>Filtering Granularity:</dt>
        <dd>
          <t>The granularity of source address validation. If filtering granularity is /8, the network allows packets to be sent with any address that belong to the same /8 prefix as its own address. However, if filtering granularity is /8, the network allows to receive packets with any address as the source address that belongs to a different /8 prefix than its own address.</t>
        </dd>
        <dt>Filtering Depth:</dt>
        <dd>
          <t>The deployment depth of souce address validation. If filtering depth is 3, the source address validation is deployed 3 hops away from the sender for OSAV.</t>
        </dd>
        <dt>Authoritative DNS Nameserver (ADNS):</dt>
        <dd>
          <t>A DNS server that holds the definitive records for a domain and responds to DNS queries for that domain.</t>
        </dd>
      </dl>
    </section>
    <section anchor="outbound-source-address-validation-measurement-methods">
      <name>Outbound Source Address Validation Measurement Methods</name>
      <t>To measure whether a network deploys OSAV, a common idea of different methods is to send spoofed packets from the network inside, and observe whether the spoofed packets reach the outside of the network. The SAV research community has proposed 3 methods for measuring OSAV deployment, i.e., client-based method, proxy-based method and DNAT-based method.</t>
      <section anchor="client-based-method">
        <name>Client-based Method</name>
        <t>As shown in <xref target="osav-client-figure"/>, by deploying a measurement client on a host in the audited network, the client can actively generate and send spoofed packets to the outside of the audited network. Hence, it is easy to learn whether spoofed packets have reached the outside of the network. Also, the client can set the time-to-live (TTL) of spoofed packets incrementally, and thus the forwarding path of the spoofed packets can be learned in a way like traceroute.</t>
        <figure anchor="osav-client-figure">
          <name>An example of client-based OSAV measurement.</name>
          <artwork><![CDATA[
    audited network
+---------------------+                          +--------------------+
|   +-------------+   |           (1)            |   +------------+   |
|   | client IP1  #---|--------------------------|--># controlled |   |
|   +-------------+   |   From: forged address   |   | server IP2 |   |
|                     |   To:   IP2              |   +------------+   |
| AS1                 |                          | AS2                |
+---------------------+                          +--------------------+

The client actively sends a set of spoofed packets to the controlled
servers outside of the audited network.
]]></artwork>
        </figure>
        <t>Benefiting from the controlbitly, a client can generate spoofed packets with arbitrary IP addresses as its source addresses. Hence, filtering granularity can be measured by observing which spoofed packets can reach outside of the audited network. Similarly, filtering depth can be measured by observing how far the spoofed packets reach.</t>
        <t>The most famous client tool is the CAIDA Spoofer project <xref target="spoofer"/>, which re-launched in 2015. A CAIDA Spoofer client sends various spoofed packets to a set of servers maintained by the project, and based on the spoofed packets received by the servers, the project is able to infer the filtering granularity of SAV on paths traversed by these packets. The CAIDA Spoofer project employs tracefilter to measure where a SAV mechanism is deployed. Speicifically, a client sends spoofed packets with specially crafted TTLs, and when the packet's TTL expires, an ICMP TTL exceeded message will be sent to a controlled server. Based on the largest TTL among received ICMP messages, the project can infer the number of hops away from the client before spoofed packets are discarded.</t>
        <t>The CAIDA Spoofer project relies on volunteers to spoof from many points in the network. If a volunteer installs the client within a Network Address Translation (NAT) network, CAIDA Spoofer will report the presence of a NAT device, and thus spoofed packets may be blocked by the NAT devices, rather than a SAV mechanism. Due to the wide deployment of NAT, though more than two thousands ASes were tested by the CAIDA Spoofer project in 2024, only about half of them were tested based on public IP addresses.</t>
        <t>The KI3 SAV-T project <xref target="savt"/> also started supporting OSAV measurements in 2024 and has promoted these measurements via crowdsourced testing platforms.</t>
      </section>
      <section anchor="proxy-based-method">
        <name>Proxy-based Method</name>
        <t><xref target="dns-proxy"/> relies on misbehaving DNS proxies to perform remote measurement of IP spoofing. As illustrated in <xref target="proxy-figure"/>, the measurement conducter controls a scanner, a DNS authoritative nameserver, and a domain name, but does not have control over the audited network. The scanner first sends a DNS query for the domain name to a DNS proxy in the audited network, i.e., the destination IP address of the DNS query is the DNS proxy. However, due to the misbehaviors of the DNS proxy, it will forward the query to a DNS resolver without changing the source IP address of the query. In this way, the DNS proxy creates a spoofed packet whose source IP address does not belong to the audited network. If the spoofed packet is not discared along the path, the DNS resolver will communicate with the controlled authoritative nameserver to resolve the domain name. Finally, the DNS resolver will directly respond to the scanner, since the source IP address of the DNS query received by the DNS resolver is the scanner. Hence, if the scanner receives a DNS response whose source address is different from the destination address of the DNS query, the network is considered to have no OSAV deployment.</t>
        <figure anchor="proxy-figure">
          <name>An example of proxy-based OSAV measurement.</name>
          <artwork><![CDATA[
                                            audited network
+---------------------+                  +--------------------+
|   +-------------+   |       (1)        |   +------------+   |
|   | scanner IP1 #---|------------------|--># proxy  IP2 |   |
|   +-------------+   |   From: IP1      |   +------#-----+   |
|         ^           |   To:   IP2      |          |         |
| AS1     |           |                  | AS2      | (2)     |
+---------------------+                  +--------------------+
          | From: IP3                               | From: IP1
          | To:   IP1    +----------------------+   | To:   IP3
      (4) |              |   +--------------+   |   | 
          +--------------|---| resolver IP3 #<--|---+ 
                         |   +--------------+   |
                         |          ^           |
                         | AS3      |           | 
                         +----------------------+ 
                                    |
        +----------+            (3) |
        |   ADNS   #<---------------+
        +----------+

The scanner sends a DNS query with IP1 as the source to the DNS proxy
(IP2). The proxy forwards the query to the DNS resolver, with the source 
IP address remaining as IP1. The resolver resolves the domain name using 
the authoritative name servers and responds directly to the scanner.
]]></artwork>
        </figure>
        <t>Note that the IP address of the DNS proxy is also encoded into the domain name before sending to the DNS proxy, so that a DNS response can be matched with the corresponding DNS query. In addition, there is no need to find misbehaving DNS proxies before sending DNS queries to them. Instead, we can send DNS queries directly to all the routable address space one by one. If the destination address of a DNS query is used by a misbehaving DNS proxy, the scanner will receive a DNS response with an unexpected source address.</t>
        <t>Proxy-based method can efficiently identify networks that do not deploy OSAV in a remote manner, but fails to identify networks that deploy OSAV. This is because, if OSAV is deployed in the audited network, the scanner will receive no DNS response, which is indistinguishable from the absence of a DNS proxy in the audited network.</t>
      </section>
      <section anchor="dnat-based-method">
        <name>DNAT-based Method</name>
        <t><xref target="DNAT"/> improves the proxy-based method by extending more than DNS protocol, identifying the deployment location of OSAV, and identifying the filtering granularity. Specifically, <xref target="DNAT"/> first figures out that the root cause of misbehaving DNS proxies is misconfigured destination NAT (DNAT) devices. As shown in <xref target="DNAT-method-figure"/>, when a packet matches DNAT rules, the DNAT device changes the packet's destination to a preset address, while leaving the source address unchanged. Hence, to improve measurement coverage, DNAT-based method can also utilize other protocols, such as Network Time Protocol (NTP) and TCP protocol, to trigger the audited network into sending spoofed packets.</t>
        <t>DNAT-based method identifies the filtering depth in a similar way to tracefilter. As DNAT devices do not reset the TTL field when forwarding packets, the fowarding path taken by spoofed packets can be learned by gradually incrementing the initial TTL values in original packets. The last responsive hop is considered as the position where filtering happens.</t>
        <t>To identify the filtering granularity, the scanner sends multiple original packets with various source IP addresses. By using addresses adjacent to IP2 as the source addresses, the DNAT device will send spoofed packets with these addresses. Hence, packets that use forged addresses within the filtering granularity as source address will reach the receiver IP3.</t>
        <figure anchor="DNAT-method-figure">
          <name>An example of DNAT-based OSAV measurement.</name>
          <artwork><![CDATA[
                                            audited network
+---------------------+                  +--------------------+
|   +-------------+   |       (1)        |   +------------+   |
|   | scanner IP1 #---|------------------|--># DNAT   IP2 |   |
|   +-------------+   |   From: IP1      |   +------#-----+   |
|                     |   To:   IP2      |          |         |
| AS1                 |                  | AS2      | (2)     |
+---------------------+                  +--------------------+
                                                    | From: IP1
                    +----------------------+        | To:   IP3
                    |   +--------------+   |        |     /\
                    |   | receiver IP3 #<--|--------+     ||
                    |   +--------------+   |              || (3)
                    |                      |              ||
                    | AS3                  |        Detect elicited
                    +----------------------+        spoofed packets

The scanner sends a packet sourced with IP1 to the DNAT device (IP2).
The packet will elicit a spoofed packet sourced with IP1 and destined 
to IP3.
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="inbound-source-address-validation-measurement-methods">
      <name>Inbound Source Address Validation Measurement Methods</name>
      <t>The core idea of measuring whether a network deploys ISAV is to first send some spoofed packets to the target network and then observe whether the spoofed packets arrive inside of the target network. Since ISAV measurement does not require hosts in the audited network to generate spoofed packets, it is easier to measure ISAV deployment than OSAV. The SAV research community has proposed 5 methods for measuring OSAV deployment, i.e., client-based method, resolver-based method, ICMPv6-based method, IPID-based method and PMTUD-based method.</t>
      <section anchor="client-based-method-1">
        <name>Client-based Method</name>
        <t>As shown in <xref target="isav-client-figure"/>, by deploying a measurement client on a host in the audited network, client-based method can use a controlled server to send a spoofed packet to the client. The spoofed packets use an IP addresses adjacent to IP2 as its source IP addresses. If the client receives the spoofed packet, then the audited network has not deployed ISAV. Otherwise, the audited network has deployed ISAV.</t>
        <figure anchor="isav-client-figure">
          <name>An example of client-based ISAV measurement.</name>
          <artwork><![CDATA[
                                                     audited network
+---------------------+                          +--------------------+
|   +-------------+   |           (1)            |   +-------------+  |
|   | controlled  #---|--------------------------|--># client IP2  |  |
|   | server IP1  |   |   From: IP2's neighbor   |   +-------------+  |
|   +-------------+   |   To:   IP2              |                    |
| AS1                 |                          | AS2                |
+---------------------+                          +--------------------+

The controlled server sends a spoofed packet to the client, and then 
client reports whether it has received the spoofed packets.
]]></artwork>
        </figure>
        <t>Both the CAIDA Spoofer project <xref target="spoofer"/> and the KI3 SAV-T project also support ISAV measurements, which, like OSAV measurements, rely on volunteers. When volunteers install the client, both ISAV and OSAV measurements are performed on the audit network. However, if the client is installed within a NAT network, it becomes inaccessible from outside the network, even without spoofed addresses. As a result, client-based methods cannot measure ISAV deployments in this case.</t>
      </section>
      <section anchor="resolver-based-method">
        <name>Resolver-based Method</name>
        <figure anchor="exp-spoofing-scan">
          <name>An example of resolver-based ISAV measurement.</name>
          <artwork><![CDATA[
                                         audited network
+-----------------+               +--------------------------+
|  AS1            |               |  AS2                     |
| +-------------+ |               |      +-----------+       |
| |   scanner   | |      (1)      |      |  resolver |       |
| |     IP1     #-|---------------|----->#    IP2    #       |
| +-------------+ |   From:IP3    |      +--+--------+       |
|                 |   To:IP2      |         |                |
+-----------------+               +------------------------- +
                                            | (2)
                                            V
                                       +----#-----+
                                       |   ADNS   |
                                       +----------+
]]></artwork>
        </figure>
        <t><xref target="exp-spoofing-scan"/> shows an example of resolver-based ISAV measurement <xref target="dns-resolver"/>. The scanner in AS1 sends a DNS query with a forged IP address IP3, which belongs to the audited network (AS2), to a DNS resolver in AS2. If the audited network does not deploy ISAV, the DNS resolver will receive the spoofed DNS query. Next, the DNS resolver will send another DNS query to our controlled ADNS for resolution. Therefore, if the controlled ADNS receives the DNS query from the DNS resolver in the audited network, the audited network AS2 does not filter the spoofed packets.</t>
        <t>However, if the controlled ADNS does not receive the DNS query, we can not assume that the audited network filters the spoofed packets, since there may be no DNS resolver in the audited network. To futher identify networks that filter inbound spoofing traffic, we send a non-spoofed DNS query from the scanner to the same target IP address. If the controlled ADNS receives a DNS query triggered by the non-spoofed DNS query, a DNS resolver exists in the audited network. As a result, if the DNS resolver does not resolve the spoofed query, we can conclude that the audited network deploy ISAV.</t>
        <figure anchor="resolver-network-type">
          <name>Classification of results based on DNS resolvers.</name>
          <artwork><![CDATA[
                                        SPOOFED DNS QUERY 

N                        ADNS receives no query    ADNS receives a query
O  D                  +---------------------------------------------------+
N  N   ADNS receives  |                          |                        |
|  S     a query      |        with ISAV         |      without ISAV      |
S                     |                          |                        |
P  Q                  -----------------------------------------------------
O  U   ADNS receives  |                          |                        |
O  E     no query     |         unknown          |      without ISAV      |
F  R                  |                          |                        |
E  Y                  +---------------------------------------------------+
D     
]]></artwork>
        </figure>
        <t>As illustrated in <xref target="resolver-network-type"/>, there are four cases when combining spoofed DNS query and non-spoofed DNS query.</t>
        <ul spacing="normal">
          <li>
            <t>First, the ADNS receives DNS queries in both spoofing scan and non-spoofing scan, suggesting that the audited network does not deploy ISAV, and the DNS resolver is open.</t>
          </li>
          <li>
            <t>Second, the ADNS receives the DNS query only in spoofing scan, suggesting that the audited network does not deploy ISAV, and the DNS resolver is closed.</t>
          </li>
          <li>
            <t>Third, the ADNS receives the DNS query only in non-spoofing scan, suggesting that the audited network deploys ISAV.</t>
          </li>
          <li>
            <t>Fourth, the ADNS does not receive any DNS query. This suggests that no DNS resolver in the audited network can be utilized to measure ISAV deployment.</t>
          </li>
        </ul>
      </section>
      <section anchor="icmpv6-based-method">
        <name>ICMPv6-based Method</name>
        <t>As suggested by <xref target="RFC4443"/>, in order to limit the bandwidth and forwarding costs incurred by originating ICMPv6 error messages, an IPv6 node <bcp14>MUST</bcp14> limit the rate of ICMPv6 error messages it originates. This provides an opportunity to infer whether the spoofed packets arrive inside of the audited network based on the state of ICMPv6 rate limiting. Since most of IPv6 addresses are inactive, an ICMP error message will be fed back from Customer Premises Equipment (CPE) devices when we send an ICMP echo request to a random IP address in the audited network. If the CPE device limits the rate of ICMPv6 error messages it originates, it can be utilized as a vantage point (VP).</t>
        <t><xref target="ICMP-based-msr"/> illustrates the ICMPv6-based measurement method <xref target="ICMPv6"/>. We have a local scanner P1 in AS1, and AS2 is the audited network. Three rounds of testing with N and N+M ICMP echo requests packets are conducted in the measurement, and thus three values rcv1, rcv2, and rcv3 can be obtained respectively. Based on this, we can infer whether the audited network filters the spoofed packets by comparing rcv1, rcv2, and rcv3.</t>
        <figure anchor="ICMP-based-msr">
          <name>An example of ICMPv6-based ISAV measurement.</name>
          <artwork><![CDATA[
                                                     audited network
+------------------+                          +-----------------------------+
| AS1              |                          |  AS2        +------------+  |
|  +-----------+   |                          |  +------+   |unreachable |  |
|  |scanner IP1|   |                          |  |  VP  |   |IP address T|  |
|  +---+-------+   |                          |  +---#--+   +--#---------+  |
|      |           |                          |      |         |            |
+------------------+                          +-----------------------------+
       |                                             |         |
       +--------+ N ICMP echo requests  +--------------------->+
       |             src:IP1 dst:T                   |         |
round 1|                                             |         |
       +<-------+ rcv1 ICMP Error Messages +---------+         |
       |                                             |         |
       |                                             |         |
       +--------+ N ICMP echo requests +---------------------->+
       |             src:IP1 dst:T                   |         |
round 2|                                             |         |
       +--------+ M ICMP echo requests +---------------------->+
       |        src:arbitrary IP in AS1,dst:T        |         |
       |                                             |         |
       +<-------+ rcv2 ICMP Error Messages +---------+         |
       |                                             |         |
       |                                             |         |
       |XXXXXXXXXXXXXXXXX SCENARIO 1 XXXXXXXXXXXXXXXXXXXXXXXXXX|
       |                                             |         |
       +--------+ N ICMP echo requests +---------------------->+
       |             src:IP1, dst:T                  |         |
       |                                             |         |
       +--------+ M ICMP echo requests +---------------------->+
       |         src:arbitrary IP in AS2,dst:T       |         |
       |                                             |         |
       |XXXXXXXXXXXXXXXXX SCENARIO 2 XXXXXXXXXXXXXXXXXXXXXXXXXX|
round 3|                                             |         |
       +--------+ N ICMP echo requests  +--------------------->+
       |             src:IP1 dst:T                   |         |
       |                                         XX  |         |
       +--------+ M ICMP echo requests +-------->XX  |         |
       |         src:arbitrary IP in AS2,dst:T   XX  |         |
       |                                         XX  |         |
       |XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX|
       |                                             |         |
       +<-------+ rcv3 ICMP Error Messages +---------+         |
]]></artwork>
        </figure>
        <t>As illustrated in <xref target="ICMP-based-msr"/>, in the first round test, N ICMP echo requests are sent to a target with inactive IPv6 address in the audited network, and then VP will resposnd with rcv1 ICMP error messages to the scanner. In the second round test, besides the same N probe packets, extra M ICMP echo requests with forged source address that belongs to AS1 (noise packets) are sent to the target simultaneously. The number of ICMP error messages in the second round test are defined as rcv2. Similar to the second round test, in the third round test, M ICMP echo requests with forged source address that belongs to AS2 (spoofed packets) are sent to the target. The number of ICMP error messages in the third round test are defined as rcv3.</t>
        <t>Comparing rcv1 and rcv3, if rcv1 &gt; rcv3, it can be considered that the spoofed packets are not filtered in the third round test, suggesting that the audited network allows inbound spoofing. Comparing rcv2 and rcv3, if rcv2 &lt; rcv3, it can be inferred that the target network has filtered the spoofed packet in the third round test, and thus is able to filter inbound spoofing traffic. The ability of filtering inbound spoofing traffic can be inferred according to the following rules.</t>
        <ul spacing="normal">
          <li>
            <t>If rcv3 &lt; a*rcv1, then the network allow inbound spoofing;</t>
          </li>
          <li>
            <t>Else if rcv2 &lt; a*rcv3, then the network does not allow inbound spoofing;</t>
          </li>
          <li>
            <t>Else, the ability of filtering inbound spoofing traffic cannot be determined.</t>
          </li>
        </ul>
        <t>where a is a factor to avoid potential interference from fast-changing network environments, satisfying 0 &lt; a &lt; 1.</t>
      </section>
      <section anchor="ipid-based-method">
        <name>IPID-based Method</name>
        <t>The core observation of using IPID to measure ISAV is that the globally incremental IPID value leaks information about traffic reaching the server<xref target="SMap"/>. Given a server in the audited network with a globally incremental IPID, the scanner samples the IPID value using its own IP address by sending packets to the server and receiving responses. Then, the scanner sends a set of packets to the server using a spoofed IP address that belongs to the audited network, i.e., an IP address adjacent to IP2. Afterward, the scanner sends another packet using its IP address to probe the IPID value again. If the spoofed packets reached the server, they would have incremented the server's IPID counter. As a result, this increment can be inferred during the second IPID probe from the scanner's IP address.</t>
        <figure anchor="IPID-based-msr">
          <name>An example of IPID-based ISAV measurement.</name>
          <artwork><![CDATA[
                                                    audited network
         +------------------+                    +-------------------+
         | AS1              |                    |  AS2              |
         |  +-----------+   |                    |   +------------+  |
         |  |scanner IP1|   |                    |   |   VP  IP2  |  |
         |  +---+-------+   |                    |   +----+-------+  |
         |      |           |                    |        |          |
         +------------------+                    +-------------------+
                |                                         |       
                |      Is global IPID counter or not?     |       
                |<--------------------------------------->|       
                |                                         |       
                |             Request,srcIP=IP1           |       
                |---------------------------------------->|       
                |                                         |       
                |            Response, IPID=X             |probe 1
                |<----------------------------------------|       
                |                   ...                   |       
                |                N-2 probes               |       
                |                   ...                   |       
                |             Request,srcIP=IP1           |       
                |---------------------------------------->|       
                |                                         |       
                |            Response, IPID=Y             |probe N
 estimate IPID  |<----------------------------------------|       
 rate IPID=f(t) |                                         |       
                +- -- -- -- -- -- -- -- -- -- -- -- -- -- +       
                |                                         |       
                |      M spoofs,srcIP=IP2's neighbor      |       
                |---------------------------------------->|       
                |                                         |       
                +- -- -- -- -- -- -- -- -- -- -- -- -- -- +       
                |                                         |       
                |            Request,srcIP=IP1            |       
                |---------------------------------------->|       
                |                                         |       
                |            Response, IPID=Z             |       
                |<----------------------------------------|             
                |                                         |   
]]></artwork>
        </figure>
        <t><xref target="IPID-based-msr"/> illustrates the measurement process of ISAV based on global IPID. First, the scanner measures the current IPID value and the rate of IPID increments. Ordinary Least Squares (OLS) linear regression can be used to estimate the relationship between the IPID and the timestamp t: IPID = a*t + b + ε, ε ∼ N (0, σ^2). Next, N probes are sent to the VP. With these N probes, the parameters a, b, and σ can be estimated using the OLS method. Then, a group of M = 6 * σ packets with a spoofed source IP address are sent to the audited network. Finally, the IPID value Z from the VP is sampled by using IP1 as source address, while the IPID value W at that moment can be estimated using the linear regression model. If the M spoofed packets are filtered, according to the 3-sigma rule, there is a 99.73% probability that the following condition holds: W - 3 * σ ≤ Z ≤ W + 3 * σ. If the spoofed packets are not filtered, meaning the audited network has not deployed ISAV, the IPID counter will increase by M. In this case, Z &gt; W + 3 * σ, or equivalently, Z &gt; W + M/2.</t>
      </section>
      <section anchor="pmtud-based-method">
        <name>PMTUD-based Method</name>
        <t>The core idea of the Path MTU Discovery (PMTUD) method is to send ICMP Packet Too Big (PTB) messages with a spoofed source IP address that belongs to the audited network <xref target="SMap"/>. The real IP address of the scanner is embedded in the first 8 bytes of the ICMP payload. If the network does not deploy ISAV, the server will receive the PMTUD message and reduce the MTU for the IP address specified in the first 8 bytes of the ICMP payload. First, probe the MTU of the service in the audited network. Then, send an ICMP PTB message from a spoofed IP address. If the packet reaches the service, it will reduce the MTU for the scanner's IP address. This reduction will be identified in the next packet received from the service, indicating that the audited network does not deploy ISAV.</t>
        <figure anchor="PMTUD-based-msr">
          <name>An example of PMTUD-based ISAV measurement.</name>
          <artwork><![CDATA[
                                                    audited network
         +------------------+                    +-------------------+
         | AS1              |                    |  AS2              |
         |  +-----------+   |                    |   +------------+  |
         |  |scanner IP1|   |                    |   |   VP  IP2  |  |
         |  +-----+-----+   |                    |   +------+-----+  |
         |        |         |                    |          |        |
         +------------------+                    +-------------------+
                  |                                         |       
          Round 1 |              Setup Connection           |       
                  |<--------------------------------------->|       
                  |                                         |       
                  |                  Request                |       
                  |---------------------------------------->|       
                  |                                         |       
                  |           Response, DF1, size1          |       
                  |<----------------------------------------|       
         DF==1?-> |                                         |       
       Maybe PMTUD|                                         |       
                  |            ICMP PTB, srcIP=IP1          |       
                  |---------------------------------------->|       
                  |                                         |       
                  |                  Request                |       
                  |---------------------------------------->|       
                  |                                         |       
                  |           Response, DF2, size2          |       
                  |<----------------------------------------|       
  DF==0 or size2< |                                         |       
  size1 -> PMTUD  |                                         |       
                  +- -- -- -- -- -- -- -- -- -- -- -- -- -- +       
                  |                                         |       
          Round 2 |              Setup Connection           |       
                  |<--------------------------------------->|       
                  |                                         |       
                  |                  Request                |       
                  |---------------------------------------->|       
                  |                                         |       
                  |           Response, DF3, size3          |       
                  |<----------------------------------------|       
                  |                                         |       
                  |                                         |       
                  |            ICMP PTB, srcIP=IP1          |       
                  |---------------------------------------->|       
                  |                                         |       
                  |                 Request                 |       
                  |---------------------------------------->|       
                  |                                         |       
                  |           Response, DF4, size4          |       
                  |<----------------------------------------|       
                  |                                         |   
]]></artwork>
        </figure>
        <t><xref target="PMTUD-based-msr"/> illustrates the measurement process of ISAV based on PMTUD. First, establish a TCP connection with the server in the audited network. Then, send Request1 and receive Response1. If the DF (Don't Fragment) bit is not set, the server does not support PMTUD. Otherwise, send an ICMP PTB message with a smaller MTU. Next, issue another request and receive Response2. If DF1 == 1 and (DF2 == 0 or size2 ≤ size1), the server supports PMTUD. Now, proceed to test whether ISAV is deployed. Use the neighbor's IP address of the server as the source IP address to spoof an ICMP PTB with the smallest MTU. After that, issue another request. If the following condition is observed, the server is not protected by ISAV: size4 ≤ size3 or (DF3 == 1 and DF4 == 0).</t>
      </section>
    </section>
    <section anchor="deployment-status">
      <name>Deployment Status</name>
      <section anchor="global-picture">
        <name>Global Picture</name>
        <t>In January 2025, we used the above methods to measure SAV deployment in the Internet. ASes are classified into three deployment states based on measurement observations: Deployed, indicating that SAV was consistently observed across all available measurements; Not Deployed, indicating that SAV was not observed in any of our measurements; and Partially Deployed, indicating inconsistent observations across measurements, where SAV was detected in some cases but not in others. The same classification is also applied at the IP prefix level.</t>
        <t>As shown in <xref target="isav-as-deployment"/> and <xref target="isav-pfx-deployment"/>, 66.6% of IPv4 and 80.5% of IPv6 ASes lacked any ISAV deployment. Partial deployment was observed in 29.6% of IPv4 and 15.1% of IPv6 ASes, which may indicate that ISAV is selectively deployed, for example at access-facing interfaces.</t>
        <figure anchor="isav-as-deployment">
          <name>ISAV deployment status across IPv4 ASes and IPv6 ASes.</name>
          <artwork><![CDATA[
+--------------------+---------------+---------------+
|      Category      |   IPv4 ASNs   |   IPv6 ASNs   |
+--------------------+---------------+---------------+
|      Deployed      | 1,465 (  3.9%)|   352 (  4.4%)|
|    Not Deployed    |25,319 ( 66.6%)| 6,490 ( 80.5%)|
| Partially Deployed |11,255 ( 29.6%)| 1,217 ( 15.1%)|
+--------------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="isav-pfx-deployment">
          <name>ISAV deployment status across IPv4 /24 and IPv6 /48 prefixes.</name>
          <artwork><![CDATA[
+--------------------+-----------------+------------------+
|      Category      |  IPv4 Prefixes  |  IPv6 Prefixes   |
+--------------------+-----------------+------------------+
|      Deployed      |189,321 ( 24.4%) |  48,864 ( 12.6%) |
|    Not Deployed    |539,649 ( 69.7%) | 277,610 ( 71.7%) |
| Partially Deployed | 45,626 (  5.9%) |  60,944 ( 15.7%) |
+--------------------+-----------------+------------------+
]]></artwork>
        </figure>
        <t><xref target="osav-as-deployment"/> and <xref target="osav-pfx-deployment"/> illustrate notable differences in OSAV deployment between IPv4 and IPv6 networks. Only 11.0% of IPv4 ASes and 11.2% of IPv4 /24 prefixes exhibit consistent OSAV deployment. However, IPv6 networks show substantially higher observable OSAV deployment ratios. This discrepancy may be influenced by measurement coverage limitations. Specifically, OSAV deployment in IPv6 networks is currently observable only via the client-based method, while other measurement methods used for IPv4 OSAV are not applicable to IPv6.</t>
        <figure anchor="osav-as-deployment">
          <name>OSAV deployment status across IPv4 and IPv6 ASes.</name>
          <artwork><![CDATA[
+--------------------+---------------+---------------+
|      Category      |   IPv4 ASNs   |   IPv6 ASNs   |
+--------------------+---------------+---------------+
|      Deployed      |   290 ( 11.0%)|   387 ( 80.5%)|
|    Not Deployed    | 2,272 ( 85.8%)|    62 ( 12.9%)|
| Partially Deployed |    86 (  3.2%)|    32 (  6.7%)|
+--------------------+---------------+---------------+
]]></artwork>
        </figure>
        <figure anchor="osav-pfx-deployment">
          <name>OSAV deployment status across IPv4 /24 and IPv6 /48 prefixes.</name>
          <artwork><![CDATA[
+--------------------+-----------------+------------------+
|      Category      |  IPv4 Prefixes  |  IPv6 Prefixes   |
+--------------------+-----------------+------------------+
|      Deployed      |    795 ( 11.2%) |   2,904 ( 96.0%) |
|    Not deployed    |  6,211 ( 87.7%) |     112 (  3.7%) |
| Partially Deployed |     73 (  1.0%) |      10 (  0.3%) |
+--------------------+-----------------+------------------+
]]></artwork>
        </figure>
        <t><xref target="osav-granularity"/> presents the filtering granularity observed for OSAV deployment in IPv4 networks. Prefix lengths between /16 and /24 account for 67.71% of the observed deployment, corresponding to common IPv4 allocation units for ASes. This distribution is consistent with OSAV being predominantly deployed at AS border routers, where filtering is typically performed using aggregated address blocks, rather than at access-facing routers that would require finer-grained prefix filtering.</t>
        <figure anchor="osav-granularity">
          <name>OSAV filtering granularity in IPv4 networks.</name>
          <artwork><![CDATA[
+-------------+------------+
| Granularity | Percentage |
+-------------+------------+
|     /8      |    0.00 %  |
|     /9      |    0.00 %  |
|     /10     |    0.62 %  |
|     /11     |    0.00 %  |
|     /12     |    2.48 %  |
|     /13     |    0.62 %  |
|     /14     |    0.62 %  |
|     /15     |    4.35 %  |
|     /16     |   17.39 %  |
|     /17     |    5.59 %  |
|     /18     |    3.73 %  |
|     /19     |    5.59 %  |
|     /20     |    5.59 %  |
|     /21     |    3.11 %  |
|     /22     |    9.32 %  |
|     /23     |    5.59 %  |
|     /24     |   11.80 %  |
|     /25     |    4.35 %  |
|     /26     |    4.35 %  |
|     /27     |    2.48 %  |
|     /28     |    4.35 %  |
|     /29     |    4.97 %  |
|     /30     |    2.48 %  |
|     /31     |    0.62 %  |
+-------------+------------+
]]></artwork>
        </figure>
        <t><xref target="isav-granularity"/> shows the observed filtering granularity for ISAV deployment. Notably, 44.48% of networks implement spoofing filters at /29–/30 granularity, which is consistent with the recommendations in IETF BCP 38. This pattern suggests that ISAV is predominantly deployed at access-facing interfaces, where fine-grained prefix filtering is operationally feasible.</t>
        <figure anchor="isav-granularity">
          <name>ISAV filtering granularity in IPv4 networks.</name>
          <artwork><![CDATA[
+-------------+------------+
| Granularity | Percentage |
+-------------+------------+
|     /8      |    0.50 %  |
|     /9      |    2.26 %  |
|     /10     |    5.31 %  |
|     /11     |    4.86 %  |
|     /12     |    4.57 %  |
|     /13     |    3.58 %  |
|     /14     |    3.64 %  |
|     /15     |    7.41 %  |
|     /16     |    2.59 %  |
|     /17     |    2.67 %  |
|     /18     |    2.09 %  |
|     /19     |    1.57 %  |
|     /20     |    1.16 %  |
|     /21     |    2.28 %  |
|     /22     |    1.45 %  |
|     /23     |    2.73 %  |
|     /24     |    1.47 %  |
|     /25     |    1.02 %  |
|     /26     |    1.27 %  |
|     /27     |    1.31 %  |
|     /28     |    1.78 %  |
|     /29     |   24.53 %  |
|     /30     |   19.95 %  |
+-------------+------------+
]]></artwork>
        </figure>
        <t><xref target="osav-depth"/> characterizes the depth of OSAV filtering. We observe that 96.28% of OSAV deployment occurs within 2 IP hops from the traffic source, with no observable deployment beyond 10 hops. This result suggests that OSAV is typically enforced close to network edges.</t>
        <figure anchor="osav-depth">
          <name>OSAV filtering depth in IPv4 networks.</name>
          <artwork><![CDATA[
+-------+------------+
|  Hop  | Percentage |
+-------+------------+
|   1   |   87.55 %  |
|   2   |    8.73 %  |
|   3   |    1.21 %  |
|   4   |    0.61 %  |
|   5   |    0.61 %  |
|   6   |    0.52 %  |
|   7   |    0.52 %  |
|   8   |    0.17 %  |
|   9   |    0.09 %  |
|  10   |    0.00 %  |
+-------+------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="deployment-in-countriesregions">
        <name>Deployment in Countries/Regions</name>
        <t>The global distribution of SAV deployment is summarized in <xref target="isav-country"/> and <xref target="osav-country"/>. We analyze the top 20 countries/regions with the most tested prefixes and observe distinct deployment patterns. Canada, China, and the United States exhibit relatively higher OSAV deployment ratios, while India, Bangladesh, and Ecuador show limited observable OSAV deployment. Brazil also exhibits relatively low OSAV deployment ratios with 2,210 prefixes tested. ISAV deployment remains limited in most regions; however, South Korea and Egypt stand out as notable exceptions with substantially higher ISAV deployment ratios.</t>
        <t>Note that these ratios should not be interpreted as rankings, as measurement coverage vary significantly across countries.</t>
        <figure anchor="isav-country">
          <name>ISAV deployment among countries/regions.</name>
          <artwork><![CDATA[
+--------------------+----------------------+------------------------+
|      Country       | ISAV Tested Prefixes | ISAV Deployment Ratio  |
+--------------------+----------------------+------------------------+
|         KR         |                45,709|            73.9%       |
|         EG         |                 9,923|            71.4%       |
|         TW         |                11,757|            68.6%       |
|         VN         |                 9,101|            55.5%       |
|         PL         |                12,921|            53.3%       |
|         FR         |                14,123|            43.8%       |
|         DE         |                17,631|            27.3%       |
|         US         |               180,683|            24.7%       |
|         CA         |                 9,507|            23.8%       |
|         BR         |                26,366|            22.7%       |
|         GB         |                10,883|            18.7%       |
|         RU         |                45,055|            15.7%       |
|         AU         |                11,022|            14.3%       |
|         JP         |                23,134|            12.5%       |
|         IT         |                15,400|            10.5%       |
|         IN         |                16,891|             7.1%       |
|         CN         |                96,451|             5.9%       |
|         ID         |                13,797|             5.4%       |
|         MX         |                11,193|             4.7%       |
|         DZ         |                11,093|             0.9%       |
+--------------------+----------------------+------------------------+
]]></artwork>
        </figure>
        <figure anchor="osav-country">
          <name>OSAV deployment among countries/regions.</name>
          <artwork><![CDATA[
+--------------------+----------------------+------------------------+
|      Country       | OSAV Tested Prefixes | OSAV Deployment Ratio  |
+--------------------+----------------------+------------------------+
|         CA         |                   114|            50.0%       |
|         CN         |                   130|            43.1%       |
|         US         |                   339|            41.6%       |
|         CZ         |                    61|            26.2%       |
|         ES         |                    43|            23.3%       |
|         PL         |                    59|            20.3%       |
|         TR         |                   213|            19.7%       |
|         MX         |                    36|            19.4%       |
|         IT         |                   119|             9.2%       |
|         RU         |                    74|             5.4%       |
|         PK         |                    98|             5.1%       |
|         ZA         |                    65|             4.6%       |
|         BR         |                 2,210|             3.7%       |
|         ID         |                   382|             3.4%       |
|         NG         |                    36|             2.8%       |
|         AR         |                   216|             1.9%       |
|         PA         |                    77|             1.3%       |
|         IN         |                 1,276|             1.2%       |
|         BD         |                   584|             0.0%       |
|         EC         |                    71|             0.0%       |
+--------------------+----------------------+------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="comparison-between-isav-and-osav">
        <name>Comparison between ISAV and OSAV</name>
        <t><xref target="isav-asn-deployment"/> and <xref target="osav-asn-deployment"/> compare ISAV and OSAV deployment across ISP ASes, selecting the top 20 ASs with the most tested prefixes.</t>
        <t>For ISAV, several large providers, including Chunghwa Telecom (AS3462), SK Broadband (AS9318), Korea Telecom (AS4766), Telecom Egypt (AS8452), Charter Communications (AS10796, AS20115), and Comcast Cable Communications (AS7922), exhibit high deployment ratios.</t>
        <t>For OSAV, a smaller number of ASes, such as DigitalOcean (AS14061) and China Telecom (AS4134), demonstrate high OSAV deployment ratios across their tested /24 prefixes. Note that some ASes have relatively small numbers of tested prefixes, which may amplify extreme deployment ratios.</t>
        <figure anchor="isav-asn-deployment">
          <name>ISAV deployment ratio of ASes.</name>
          <artwork><![CDATA[
+----------+----------------------+------------------------+
|   ASN    | ISAV Tested Prefixes | ISAV Deployment Ratio  |
+----------+----------------------+------------------------+
|      3462|                 8,462|            93.3%       |
|      9318|                 7,537|            91.8%       |
|      4766|                26,312|            90.3%       |
|      8452|                 6,523|            84.3%       |
|     10796|                 6,809|            60.3%       |
|      7922|                 9,071|            59.7%       |
|     20115|                10,434|            56.8%       |
|       209|                 8,514|             9.9%       |
|      7018|                 6,559|             9.3%       |
|     12389|                 9,557|             8.7%       |
|      4812|                 6,052|             7.4%       |
|     16509|                 8,371|             6.1%       |
|      3269|                 7,196|             5.9%       |
|      4134|                23,992|             5.9%       |
|      4713|                 6,972|             5.4%       |
|      4837|                23,663|             4.0%       |
|      8151|                 7,988|             1.7%       |
|     36947|                11,064|             0.9%       |
|       749|                 9,636|             0.0%       |
|     45090|                 7,000|             0.0%       |
+----------+----------------------+------------------------+
]]></artwork>
        </figure>
        <figure anchor="osav-asn-deployment">
          <name>OSAV deployment ratio of ASes.</name>
          <artwork><![CDATA[
+----------+----------------------+------------------------+
|   ASN    | OSAV Tested Prefixes | OSAV Deployment Ratio  |
+----------+----------------------+------------------------+
|     14061|                    37|           100.0%       |
|      4134|                    42|            83.3%       |
|     17995|                    67|            77.6%       |
|      9121|                    31|            51.6%       |
|     15924|                    88|            20.5%       |
|     52965|                    31|             3.2%       |
|     52468|                    75|             1.3%       |
|    150008|                   101|             0.0%       |
|     23956|                    54|             0.0%       |
|    395582|                    51|             0.0%       |
|     58495|                    45|             0.0%       |
|     52419|                    43|             0.0%       |
|     34984|                    42|             0.0%       |
|     52444|                    38|             0.0%       |
|     18002|                    36|             0.0%       |
|     45804|                    35|             0.0%       |
|     18229|                    34|             0.0%       |
|     58678|                    32|             0.0%       |
|     52426|                    32|             0.0%       |
|     37403|                    29|             0.0%       |
+----------+----------------------+------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="impact-of-manrs-on-sav-deployment">
        <name>Impact of MANRS on SAV Deployment</name>
        <t>To examine the relationship between MANRS participation and the deployment of SAV, we analyze measurement results for both OSAV and ISAV deployments.</t>
        <t>For OSAV, MANRS-participating ASes exhibit a substantially higher proportion of Deployed networks compared to non-MANRS ASes (37.5% versus 10.1%). In contrast, the Not Deployed state is significantly more prevalent among non-MANRS ASes (86.3%) than among MANRS ASes (51.9%). A chi-squared test suggests that MANRS participation and OSAV deployment status are not independent.</t>
        <t>A similar trend is observed for ISAV. MANRS ASes show higher proportions of Deployed and Partially Deployed networks, while non-MANRS ASes are more likely to be classified as Not Deployed. The chi-squared test for ISAV also indicates a statistically significant association between MANRS participation and ISAV deployment status.</t>
        <t>Overall, these results indicate a strong statistical association between MANRS participation and the observed deployment of SAV mechanisms in both OSAV and ISAV scenarios. While this analysis does not establish causality, the measurements consistently show that ASes participating in MANRS are more likely to deploy SAV than those that do not.</t>
        <figure anchor="osav-manrs">
          <name>The impact of MANRS on OSAV deployment.</name>
          <artwork><![CDATA[
+-----------+---------------------+-----------------+--------------------+
|           | Consistent Presence | Partial Absence | Consistent Absence |
+-----------+---------------------+-----------------+--------------------+
| MANRS     |         117 (37.5%) |      33 (10.6%) |        162 (51.9%) |
| Non-MANRS |         314 (10.1%) |      113 (3.6%) |      2,694 (86.3%) |
+-----------+---------------------+-----------------+--------------------+
]]></artwork>
        </figure>
        <figure anchor="isav-manrs">
          <name>The impact of MANRS on ISAV deployment.</name>
          <artwork><![CDATA[
+-----------+---------------------+-----------------+--------------------+
|           | Consistent Presence | Partial Absence | Consistent Absence |
+-----------+---------------------+-----------------+--------------------+
| MANRS     |         124 (18.6%) |     339 (50.7%) |        205 (30.7%) |
| Non-MANRS |       2,902 (12.1%) |   9,561 (39.8%) |     11,565 (48.1%) |
+-----------+---------------------+-----------------+--------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta"/>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol). ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="spoofer" target="https://spoofer.caida.org/">
          <front>
            <title>Spoofer project</title>
            <author>
              <organization>CAIDA</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="savt" target="https://ki3.org.cn/#/sav-t">
          <front>
            <title>SAV-T project</title>
            <author>
              <organization>KI3</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="manrs" target="https://www.manrs.org/netops/guide/antispoofing/">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="DNAT" target="https://datatracker.ietf.org/doc/draft-wang-savnet-remote-measurement-osav/">
          <front>
            <title>Remote Measurement of Outbound Source Address Validation Deployment</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="dns-proxy" target="https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-kuhrer.pdf">
          <front>
            <title>Exit from hell? Reducing the impact of amplification DDoS attacks</title>
            <author>
              <organization>Marc Kuhrer, Thomas Hupperich, Christian Rossow, and Thorsten Holz, Ruhr-University Bochum</organization>
            </author>
            <date year="2014"/>
          </front>
        </reference>
        <reference anchor="dns-resolver" target="https://ieeexplore.ieee.org/document/10082958">
          <front>
            <title>The Closed Resolver Project: Measuring the Deployment of Inbound Source Address Validation</title>
            <author>
              <organization>Yevheniya Nosyk, Maciej Korczynski, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, Andrzej Duda</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="ICMPv6" target="https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_s49_paper.pdf">
          <front>
            <title>Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels</title>
            <author>
              <organization>Long Pan, Jiahai Yang, Lin He, Zhiliang Wang, Leyao Nie, Guanglei Song, Yaozhong Liu</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="SMap" target="https://dl.acm.org/doi/10.1145/3485832.3485917">
          <front>
            <title>Smap: Internet-wide Scanning for Spoofing</title>
            <author>
              <organization>Tianxiang Dai, Haya Shulman</organization>
            </author>
            <date year="2021"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
