<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wu-savnet-inter-domain-architecture-06" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.2 -->
  <front>
    <title abbrev="Inter-domain SAVNET Architecture">Inter-domain Source Address Validation (SAVNET) Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-06"/>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="February" day="05"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 101?>

<t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV-specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can rely on general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. It also defines the architectural components and their relations.</t>
    </abstract>
  </front>
  <middle>
    <?line 105?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Attacks based on source IP address spoofing, such as reflective DDoS and flooding attacks, continue to present significant challenges to Internet security. Mitigating these attacks in inter-domain networks requires effective source address validation (SAV). While BCP84 <xref target="RFC3704"/> <xref target="RFC8704"/> offers some SAV solutions, such as ACL-based ingress filtering and uRPF-based mechanisms, existing inter-domain SAV mechanisms have limitations in terms of validation accuracy and operational overhead in different scenarios <xref target="inter-domain-ps"/>.</t>
      <t>To address these issues, the inter-domain SAVNET architecture focuses on providing a comprehensive framework and guidelines for the design and implementation of new inter-domain SAV mechanisms. There are various existing general information which includes RPKI ROA and ASPA objects, local routing information, and Internet Routing Registry (IRR) data, which can be used for inter-domain SAV. Only using these information, however, cannot well satisfy the requirements for new inter-domain SAV mechanisms proposed in <xref target="inter-domain-ps"/>. As analyzed in <xref target="savinfo-sec"/>, RPKI ROA and ASPA objects can be used to infer the prefixes and their permissible incoming directions yet cannot be updated in a timely manner to adapt to the prefix or route changes, and the local routing information cannot deal with the asymmetric routing scenarios and may lead to improper blocks or improper permits, while the IRR data can not be updated in a timely manner either and are not always accurate.</t>
      <t>Therefore, by proposing and communicating SAV-specific information, the inter-domain SAVNET empowers ASes to generate accurate SAV rules. SAV-specific information consists of prefixes and their corresponding legitimate incoming direction to enter an AS and is specialized for generating SAV rules. Therefore, SAV-specific information can be used to generate more accurate SAV rules. In order to communicate the SAV-specific information, a SAV-specific information communication mechanism would be developed for origination, processing, propagation, and termination of the messages which carry the SAV-specific information, and it can be implemented by extending an existing protocol or a new protocol. When the prefixes or routes change, it can update the SAV-specific information automatically in a timely manner. Also, the SAV-specific information is communicated over a secure connection between authenticated ASes to guarantee that it can be trusted.</t>
      <t>Moreover, during the incremental/partial deployment period of the SAV-specific information, the inter-domain SAVNET architecture can leverage the general information, such as RPKI ROA and ASPA objects, local routing information, and IRR data, to generate the SAV rules, if the SAV-specific information of an AS is unavailable. To achieve this, the inter-domain SAVNET architecture assigns priorities to the SAV-specific information and general information and generates SAV rules based on their priorities in the SAV information base, and SAV-specific information has the highest priority.</t>
      <figure anchor="exp-inter-sav">
        <name>An example for illustrating the incentive of deploying inter-domain SAVNET architecture.</name>
        <artwork><![CDATA[
+-----------+
| AS 1 (P1) #
+-----------+ \
               \           Spoofed Packets
             +-+#+-------+ with Source Addresses in P1 +-----------+
             |    AS 2   #-----------------------------#   AS 4    |
             +-+#+-------+                             +-----------+
               / 
+-----------+ /
|   AS 3    #
+-----------+
AS 4 sends spoofed packets with source addresses in P1 to AS 3 
through AS 2.
If AS 1 and AS 2 deploy inter-domain SAV, the spoofed packets 
can be blocked at AS 2.
]]></artwork>
      </figure>
      <t>As a result, the inter-domain SAVNET architecture provides the incentive to deploy inter-domain SAV for operators. <xref target="exp-inter-sav"/> illustrates an example for illustrating the incentive of deploying inter-domain SAVNET architecture. P1 is the source prefix of AS 1, and AS 4 sends spoofing packets with P1 as source addresses to AS 3 through AS 2. Assume AS 4 does not deploy intra-domain SAV, these spoofing packets cannot be blocked by AS 4. Although AS 1 can deploy intra-domain SAV to block incoming packets which spoof the addresses of AS 1, these spoofing traffic from AS 4 to AS 3 do not go through AS 1, so they cannot be blocked by AS 1. Inter-domain SAVNET architecture can help in this scenario. If AS 1 and AS 2 deploy inter-domain SAVNET architecture, AS 2 knows that the packets with P1 as source addresses should come from AS 1, and the spoofing packets can thus be blocked by AS 2 since they come from the incorrect direction. Specifically, by communicating SAV-specific information between ASes, the inter-domain SAVNET architecture gives more incentive for deployment compared to existing inter-domain SAV mechanisms, which will be analyzed in <xref target="usecases"/>.</t>
      <t>In addition, this document primarily describes a high-level architecture for describing the communication flow of SAV-specific information and general information, guiding how to utilizing SAV-specific information and general information and deploying an inter-domain SAV mechanism between ASes. The document does not specify protocol extensions or implementations. Its purpose is to provide a conceptual framework and guidance for the development of inter-domain SAV mechanisms, allowing implementers to adapt and implement the architecture based on their specific requirements and network environments.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV Rule:</dt>
        <dd>
          <t>The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        </dd>
        <dt>SAV Table:</dt>
        <dd>
          <t>The table or data structure that implements the SAV rules and is used for source address validation on the data plane.</t>
        </dd>
        <dt>SAV-specific Information:</dt>
        <dd>
          <t>The information that is specialized for SAV rule generation, includes the source prefixes and their legitimate incoming directions to enter an AS, and is communicated between ASes.</t>
        </dd>
        <dt>Local Routing Information:</dt>
        <dd>
          <t>The information that is stored in ASBR's local RIB or FIB and can be used to generate SAV rules in addition to the routing purpose.</t>
        </dd>
        <dt>General Information:</dt>
        <dd>
          <t>The information that is not specialized for SAV but can be utilized to generate SAV rules, and is initially utilized for other purposes. Currently, the general information consists of RPKI ROA and ASPA objects, local routing information, and IRR data.</t>
        </dd>
        <dt>SAV-related Information:</dt>
        <dd>
          <t>The information that can be used to generate SAV rules and includes SAV-specific information and general information.</t>
        </dd>
        <dt>SAV-specific Information Communication Mechanism:</dt>
        <dd>
          <t>The mechanism that is used to communicate SAV-specific information between ASes and can be a new protocol or an extension to an existing protocol.</t>
        </dd>
        <dt>SAVNET Agent:</dt>
        <dd>
          <t>The agent within a SAVNET-adopting AS that is responsible for gathering SAV-related information and utilizing it to generate SAV rules.</t>
        </dd>
        <dt>SAV Information Base:</dt>
        <dd>
          <t>SAV information base is a table or data structure for storing SAV-related information collected from SAV-specific information and general information and is a component within SAVNET agent.</t>
        </dd>
        <dt>SAV Information Base Manager:</dt>
        <dd>
          <t>SAV information base manager is used to maitain SAV-related information in the SAV information base and generate SAV rule accordingly, and is a component within SAVNET agent.</t>
        </dd>
        <dt>Improper Block:</dt>
        <dd>
          <t>The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Improper Permit:</dt>
        <dd>
          <t>The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        </dd>
      </dl>
    </section>
    <section anchor="goal-sec">
      <name>Design Goals</name>
      <t>The inter-domain SAVNET architecture aims to improve SAV accuracy and facilitate partial deployment with low operational overhead, while guaranteeing convergence and providing security guarantees to the communicated information, which corresponds to the requirements for new inter-domain SAV mechanisms <xref target="inter-domain-ps"/>. The overall goal can be broken down into the following aspects:</t>
      <ul spacing="normal">
        <li>
          <t>G1: The inter-domain SAVNET architecture should learn the real paths of source prefixes to any destination prefixes or permissible paths that can cover their real paths, and generate accurate SAV rules automatically based on the learned information to avoid improper blocks and reduce improper permits as much as possible.</t>
        </li>
        <li>
          <t>G2: The inter-domain SAVNET architecture should provide sufficient protection for the source prefixes of ASes that deploy it, even if only a portion of the Internet implements the architecture.</t>
        </li>
        <li>
          <t>G3: The inter-domain SAVNET architecture should adapt to dynamic networks and asymmetric routing scenarios automatically.</t>
        </li>
        <li>
          <t>G4: The inter-domain SAVNET architecture should promptly detect the network changes and launch the convergence process quickly, while reducing improper blocks and improper permits during the convergence process.</t>
        </li>
        <li>
          <t>G5: The inter-domain SAVNET architecture should provide security guarantees for the communicated SAV-specific information.</t>
        </li>
      </ul>
      <t>Other design goals, such as low operational overhead and easy implementation, are also very important and should be considered in specific protocols or protocol extensions.</t>
    </section>
    <section anchor="inter-domain-savnet-architecture-overview">
      <name>Inter-domain SAVNET Architecture Overview</name>
      <figure anchor="expcase">
        <name>Inter-domain SAVNET architecture.</name>
        <artwork><![CDATA[
 +------------------------+       +--------------------+
 |RPKI Cache Server/IRR DB|       | AS X's Provider AS |
 +------------------------+       +------------+/\+/\+-+
   ROA & ASPA |            BGP      /            |  |
Obj./IRR Data |            Message /             |  |
              |                   /              |  | BGP
+-----------+\/+----------------+\/+-+           |  | Message
|                AS X                |  BGP  +--------------+
| +--------------------------------+ |<------|AS X's Lateral|          
| |          SAVNET Agent          | |Message|   Peer  AS   |
| +--------------------------------+ |       +--------------+
+-----+/\+/\+----------------+/\+/\+-+
        |  |                   |  |
BGP     |  | SAV-specific      |  |
Message |  | Message           |  |
+------------------+           |  |
|AS X's Customer AS|           |  |
+-------+/\+-------+           |  |
          \                    |  |
    BGP    \  SAV-specific     |  | BGP
    Message \ Message          |  | Message
    +------------------------------------+
    |          AS X's Customer AS        |
    | +--------------------------------+ |
    | |         SAVNET Agent           | |
    | +--------------------------------+ |
    +------------------------------------+
]]></artwork>
      </figure>
      <t><xref target="expcase"/> provides an overview of the inter-domain SAVNET architecture, showcasing the AS topology and the flow of SAV-related information among ASes. It also highlights the connections between ASes and RPKI cache server or IRR database. To capture the full spectrum of AS relationships in the Internet, we consider all peer ASes of AS X, including customers, lateral peers, and providers, displaying the existence of multiple physical links between ASes. Arrows in the figure indicate the direction of SAV-related information from its source to AS X. As depicted in <xref target="expcase"/>, SAV-related information is conveyed through various mediums such as SAV-specific messages, BGP messages, RPKI ROA and ASPA objects, and IRR data. Based on this information, AS X generates SAV rules.</t>
      <t>As displayed in <xref target="expcase"/>, AS X and one of its customer ASes have deployed the inter-domain SAVNET architecture. Therefore, they could generate SAV rules to perform inter-domain SAV. We use AS X as the representative to illustrate that what SAV-related information the SAVNET agent within AS X will collect and where these information are from. AS X can obtain SAV-specific information which is carried by SAV-specific messages from its customer AS which deploys inter-domain SAVNET architecture. In <xref target="expcase"/>, AS X's customer AS delivers its SAV-specific information to AS X. Moreover, AS X can also obtain the local routing information, which originates from the BGP update messages of its neighbor ASes. In addition, AS X can obtain the RPKI ROA and ASPA objects from RPKI cache server and IRR data from IRR database.</t>
      <t>SAV-specific information consists of the prefixes and their legitimate incoming directions explicitly, and when prefixes or routes change, the SAVNET agent can launch SAV-specific messages timely to update SAV-specific information. Additionally, when the SAVNET agent of AS X communicates SAV-specific messages, it will validate whether the SAV-specific connections for communicating SAV-specific messages are authentic connections from autheticated ASes. As a result, SAV-specific information is more accurate than the general information and can be updated in a timely manner and trustworthy like the local routing information. Therefore, when SAV-specific information is available, inter-domain SAVNET will use them to generate SAV rules. It is also worth noting that the inter-domain SAVNET performs AS-level inter-domain SAV.</t>
      <t>In the incremental/partial deployment stage of the inter-domain SAVNET architecture, when SAV-specific information of ASes which do not deploy inter-domain SAVNET architecture is unavailable, the inter-domain SAVNET architecture can leverage general information to generate SAV rules. If all these general information is available, it is recommended to use the RPKI ROA and ASPA objects to generate SAV rules. Since compared to the local routing information and IRR data, they can provide authoritative prefixes and topological information and have less improper blocks. The systematic recommendations for the utilizations of these SAV-related information and the corresponding rationale will be illustrated in <xref target="sib-sec"/>.</t>
      <figure anchor="arch">
        <name>SAVNET agent and SAV table within AS X in Figure 2.</name>
        <artwork><![CDATA[
+-----------------------------------------------------------+
|                         Other ASes                        |
+-----------------------------------------------------------+
                                           | SAV-specific
                                           | Messages
+-----------------------------------------------------------+
|                           AS X           |                |
| +-------------------------------------------------------+ |                                      
| |                      SAVNET Agent      |              | |
| |                                       \/              | |
| | +---------------------+  +--------------------------+ | |
| | | General Information |  | SAV-specific Information | | |
| | +---------------------+  +--------------------------+ | |
| |            |                           |              | |
| |           \/                          \/              | |
| | +---------------------------------------------------+ | |
| | | +-----------------------------------------------+ | | |
| | | |              SAV Information Base             | | | |
| | | +-----------------------------------------------+ | | |
| | |            SAV Information Base Manager           | | |
| | +---------------------------------------------------+ | |
| |                          |SAV Rules                   | |
| +-------------------------------------------------------+ |
|                            |                              |
|                           \/                              |
| +-------------------------------------------------------+ |
| |                      SAV Table                        | |
| +-------------------------------------------------------+ |
+-----------------------------------------------------------+
]]></artwork>
      </figure>
      <t><xref target="arch"/> displays the SAVNET agent and SAV table within AS X. The SAVNET agent can obtain the SAV-specific information and general information from various SAV information sources including SAV-specific messages from other ASes, RPKI cache server, and RIB or FIB as long as they are available. The SAV information base (SIB) within the SAVNET agent can store the SAV-specific information and general information and is maintained by the SAV information base manager. And SIB manager generates SAV rules based on the SIB and fills out the SAV table on the data plane. Moreover, the SIB can be managed by network operators using various methods such as YANG <xref target="RFC6020"/>, Command-Line Interface (CLI), remote triggered black hole (RTBH) <xref target="RFC5635"/>, and Flowspec <xref target="RFC8955"/>. The detailed collection methods of the SAV-related information depend on the deployment and implementation of the inter-domain SAV mechanisms and are out of scope for this document.</t>
      <t>In the data plane, the packets coming from other ASes will be validated by the SAV table and only the packets which are permitted by the SAV table will be forwarded to the next hop. To achieve this, the router looks up each packet's source address in its local SAV table and gets one of three validity states: "Valid", "Invalid" or "Unknown". "Valid" means that there is a source prefix in SAV table covering the source address of the packet and the valid incoming interfaces covering the actual incoming interface of the packet. According to the SAV principle, "Valid" packets will be forwarded. "Invalid" means there is a source prefix in SAV table covering the source address, but the incoming interface of the packet does not match any valid incoming interface so that such packets will be dropped. "Unknown" means there is no source prefix in SAV table covering the source address. The packet with "unknown" addresses can be dropped or permitted, which depends on the choice of operators. The structure and detailed usage of SAV table can refer to <xref target="sav-table"/>.</t>
      <t>In order to ease the selection of SAV-specific information and general information for generating SAV rules, within the SIB, the inter-domain SAVNET architecture provides the priority recommendations for them and recommends the highest priority for the SAV-specific information, in order to guatantee accurate SAV rule generation. The detailed priority recommendations for the SAV information sources and the corresponding rationale will be illustrated in <xref target="sib-sec"/>.</t>
      <t>Furthermore, if the SAV-specific information is needed to communicate between ASes, a new SAV-specific information communication mechanism would be developed to exchange the SAV-specific messages between ASes which carry the SAV-specific information. It should define the data structure or format for communicating the SAV-specific information and the operations and timing for originating, processing, propagating, and terminating the messages which carry the information. Also, it can be implemented by extending an existing protocol or designing a new protocol.</t>
      <t>The SAVNET agent should launch SAV-specific messages to adapt to the route changes in a timely manner. The SAV-specific information communication mechanism should handle route changes carefully to avoid improper blocks. The reasons for leading to improper blocks may include late detection of route changes, delayed message transmission, or packet losses. During the convergence process of the SAV-specific information communication mechanism, the inter-domain SAVNET architecture can use the information from RPKI ROA objects and ASPA objects to generate SAV rules until the convergence process is finished, since these information includes topological information and are more stable, and can thus avoid improper blocks. However, the detailed design of the SAV-specific information communication mechanism for dealing with route changes is outside the scope of this document.</t>
      <t>Regarding the security concerns, the inter-domain SAVNET architecture shares the similar security threats with BGP and can leverage existing BGP security mechanisms to enhance both session and content security.</t>
    </section>
    <section anchor="savinfo-sec">
      <name>SAV-related Information</name>
      <t>SAV-related information represents the information that can be used for SAV and consists of RPKI ROA and ASPA objects, local routing information, IRR data, and SAV-specific information from various SAV information sources. In the inter-domain SAVNET architecture, RPKI ROA and ASPA objects, local routing information, and IRR data are categorized into general information. In the future, if a new information source is created but is not initially and specially used for SAV, the information can be categorized into general information. In other words, general information can also be considered as dual-use information.</t>
      <section anchor="general-information">
        <name>General Information</name>
        <t>General information refers to the information that is not directly designed for SAV but can be utilized to generate SAV rules, and includes RPKI ROA and ASPA objects, local routing information, and IRR data.</t>
        <section anchor="rpki-roa-and-aspa-objects">
          <name>RPKI ROA and ASPA Objects</name>
          <t>The RPKI ROA and ASPA objects are originally designed for the routing security purpose. RPKI ROA objects consists of {prefix, maximum length, origin AS} information and are originally used to mitigate the route origin hijacking, while RPKI ASPA objects consists of {ASN, Provider AS Set} information and are originally used to mitigate the route leaks. Both the objects are verified and authoritative. They are also stable and will not be updated frequently.</t>
          <t>Based on ASPA objects, the AS-level network topology can be constructed. And according to the ROA objects and the constructed AS-level topology information, an AS can learn all the permissible paths of the prefixes from its customer cone. Therefore, the prefixes and all its permissible incoming directions can be obtained. All the permissible incoming directions, however, do not only consist of the real incoming directions of the prefixes, but also the extra non-used incoming directions by the legitimate traffic, which would lead to improper permits.</t>
          <t>Additionally, according to a recent study <xref target="rpki-time-of-flight"/>, the process of updating RPKI information typically requires several minutes to an hour. This encompasses the addition or deletion of RPKI objects and the subsequent retrieval of updated information by ASes.</t>
        </section>
        <section anchor="local-routing-information">
          <name>Local Routing Information</name>
          <t>The local routing information is originally used to guide the packet forwarding on each router and can be stored in the local RIB or FIB. It can be parsed from the BGP update messages communicated between ASes. Existing uRPF-based SAV mechanisms use the local routing information to generate SAV rules. As analyzed in <xref target="inter-domain-ps"/>, in the asymmetric routing scenarios, these mechanisms have accuracy problems and would lead to improper permits or improper blocks.</t>
        </section>
        <section anchor="irr-data">
          <name>IRR Data</name>
          <t>The IRR data consist of ASes and their corresponding prefixes. Thus, they can be used to augment the SAV table <xref target="RFC8704"/>. However, only using IRR data for SAV would limit the functioning scope of SAV, in inter-domain networks, it may only be able to prevent spoofing by a stub AS. In addition, the IRR data are not always accurate.</t>
        </section>
      </section>
      <section anchor="sav-specific-information">
        <name>SAV-specific Information</name>
        <t>SAV-specific information is the information that is specifically designed for SAV and consists of the prefixes and their legitimate incoming directions to enter ASes. SAV-specific information can be contained in the SAV-specific messages which are communicated between ASes which deploy the inter-domain SAVNET. When parsing the SAV-specific messages and obtaining the SAV-specific information, the ASes adopting inter-domain SAVNET can explicitly learn the prefixes and their legitimate incoming direction to receive the legitimate traffic which use the prefixes as the source addresses.</t>
        <t>Moreover, in the inter-domain SAVNET, a SAV-specific information communication mechanism is used to communicate SAV-specific information between ASes and distribute the updated information to the relative ASes automatically in a timely manner once the prefixes or routes change.</t>
      </section>
      <section anchor="distinctions-of-different-sav-related-information">
        <name>Distinctions of Different SAV-related Information</name>
        <figure anchor="diffsavinfo">
          <name>The comprehensive comparasions between different SAV-related information when using the corresponding information as SAV information source.</name>
          <artwork><![CDATA[
+-------------------------+-----------+----------+---------------+
| SAV-related Information |  Accurate |Real-time |Trustworthiness|
|                         |    SAV    | Update   |               |
+-----------+-------------+-----------+----------+---------------+
|           |RPKI ROA Obj.|           |    NO    |      YES      |
|           | & ASPA Obj. |           |          |               |
|           +-------------+  Improper +----------+---------------+
|General    |Local Routing|   Block   |    YES   |       NO      |
|Information| Information |     &     |          |               |
|           +-------------+  Improper +----------+---------------+
|           |  IRR Data   |   Permit  |    NO    |       NO      |
|           |             |           |          |               |
+-----------+-------------+-----------+----------+---------------+
|                         |Functioning|          |               |
|SAV-specific Information |    as     |    YES   |       YES     |
|                         | Expected  |          |               |
+-------------------------+-----------+----------+---------------+
]]></artwork>
        </figure>
        <t><xref target="diffsavinfo"/> shows the comprehensive comparasions between different SAV-related information when only using the corresponding information as the source to generate SAV rules and can help clarify their distinctions. Compared against general information, SAV-specific information is more accurate, trustworthy, and authoritive, while it can update the SAV rules in a timely manner to adapt to the prefix or route changes.</t>
      </section>
    </section>
    <section anchor="sib-sec">
      <name>SAV Information Base</name>
      <figure anchor="sav_src">
        <name>Priority ranking for the SAV information sources.</name>
        <artwork><![CDATA[
+---------------------------------------------------+----------+
|              SAV Information Sources              |Priorities|
+---------------------------------------------------+----------+
|              SAV-specific Information             |     1    |
+---------------------+-----------------------------+----------+
|                     | RPKI ROA Obj. and ASPA Obj. |     2    |
|                     +-----------------------------+----------+
|                     |             RIB             |     3    |
| General Information +-----------------------------+----------+
|                     |             FIB             |     4    |
|                     +-----------------------------+----------+
|                     |           IRR Data          |     5    |
+---------------------+-----------------------------+----------+
Priority ranking from 1 to 5 represents high to low priority.
]]></artwork>
      </figure>
      <t>The SIB is managed by the SIB manager, which can consolidate SAV-related information from different sources. <xref target="sav_src"/> presents the priority ranking for the SAV-specific information and general information. Priority ranking from 1 to 5 represents high to low priority. Inter-domain SAVNET architecture uses the SAV-specific information and general information based on their priorities. Once the SAV-specific information for a prefix is available within the SIB, the inter-domain SAVNET generates SAV rules based on SAV-specific information; otherwise, the inter-domain SAVNET generates SAV rules based on general information. In other words, the inter-domain SAVNET architecture assigns priorities to the information from different SAV information sources, and always generates the SAV rules using the information with the highest priority, as long as the information is available.</t>
      <t>The priority ranking recommendation for different SAV information sources in <xref target="sav_src"/> is based on the accuracy, timeliness, trustness of the information from these sources. These properties determine that whether the requirements for new inter-domain SAV mechanisms proposed in <xref target="inter-domain-ps"/> can be well satisfied. SAV-specific information has higher priority than the general information, since the SAV-specific information is specifically designed to carry more accurate SAV information which comprises ASes' prefixes and their legitimate incoming interfaces to an AS, and can be updated in a timely manner to adapt to the prefix or route changes. The general information from RPKI ROA objects and ASPA objects, RIB, FIB, IRR data has different priorities, ranking 2, 3, 4, and 5, respectively. The information from RPKI ROA object and ASPA object has higher priority than the one from RIB, FIB, and IRR data, this is because RPKI ROA and ASPA object can provide authoritative prefixes and topology information, which can be used to generate more accurate SAV rules. The information from RPKI ROA and ASPA object is more stable and can be used to reduce the risk of improper blocks during the convergence process of the network. Although the information source for RIB and FIB is the same, the RIB consists of more backup path information than the FIB, which can reduce improper blocks. IRR data have the lowest priority compared to others, since they are usually updated in a slower manner than the real network changes and not always correct.</t>
      <figure anchor="as-topo">
        <name>An example of AS topology.</name>
        <artwork><![CDATA[
                        +----------------+
                        |    AS 3(P3)    |
                        +-+/\-----+/\+/\++
                           /        \  \
                 P3[AS 3] /          \  \ P3[AS 3]
                         /            \  \
                        / (C2P)        \  \
               +----------------+       \  \
               |    AS 4(P4)    |        \  \
               ++/\+/\+/\+/\+/\++         \  \
  P6[AS 1, AS 2] /  /  |  |    \           \  \
       P2[AS 2] /  /   |  |     \           \  \
               /  /    |  |      \           \  \
              /  /     |  |       \ P5[AS 5]  \  \ P5[AS 5]
             /  /      |  |        \           \  \
            /  /(C2P)  |  |         \           \  \
+----------------+     |  |          \           \  \  
|    AS 2(P2)    |     |  | P1[AS 1]  \           \  \
+--------+/\+----+     |  | P6[AS 1]   \           \  \
  P6[AS 1] \           |  | NO_EXPORT   \           \  \
   P1[AS 1] \          |  |              \           \  \
   NO_EXPORT \         |  |               \           \  \
              \ (C2P)  |  | (C2P/P2P) (C2P)\     (C2P) \  \
           +----------------+              +----------------+
           |  AS 1(P1, P6)  |              |    AS 5(P5)    |
           +----------------+              +----------------+
Both AS 1 and AS 4 deploy the inter-domain SAVNET architecture 
and can exchange the SAV-specific information with each other, 
while other ASes do not deploy it.
]]></artwork>
      </figure>
      <figure anchor="sib">
        <name>An example for the SAV information base of AS 4 in Figure 6.</name>
        <artwork><![CDATA[
+-----+------+------------------+--------+------------------------+
|Index|Prefix|Incoming Direction|Relation| SAV Information Source |
+-----+------+------------------+--------+------------------------+
|  0  |  P1  |       AS 2       |Customer|SAV-specific Information| 
+-----+------+------------------+--------+------------------------+
|  1  |  P1  |       AS 1       |Customer|  General Information   |
+-----+------+------------------+--------+------------------------+
|  2  |  P2  |       AS 2       |Customer|  General Information   |
+-----+------+------------------+--------+------------------------+
|  3  |  P3  |       AS 3       |Provider|  General Information   |
+-----+------+------------------+--------+------------------------+
|  4  |  P5  |       AS 3       |Provider|  General Information   |
+-----+------+------------------+--------+------------------------+
|  5  |  P5  |       AS 5       |Customer|  General Information   |
+-----+------+------------------+--------+------------------------+
|  6  |  P6  |       AS 2       |Customer|  General Information   |
|     |      |                  |        |SAV-specific Information|
+-----+------+------------------+--------+------------------------+
|  7  |  P6  |       AS 1       |Customer|  General Information   |
+-----+------+------------------+--------+------------------------+
]]></artwork>
      </figure>
      <t>We use the examples shown in <xref target="as-topo"/> and <xref target="sib"/> to introduce SIB and illustrate how to generate SAV rules based on the SIB. <xref target="sib"/> depicts an example of the SIB established in AS 4 displayed in <xref target="as-topo"/>. Each row of the SIB contains an index, prefix, incoming direction of the prefix, reltation between ASes, and the corresponding sources of the information. The incoming direction consists of customer, provider, and peer. For example, in <xref target="sib"/>, the row with index 0 indicates the incoming direction of P1 is AS 2 and the information source is SAV-specific information. Note that the same SAV-related information may have multiple sources and the SIB records them all, such as the row indexed 6. Moreover, SIB should be carefully implemented in the specific protocol or protocol extensions to avoid becoming a heavy burden of the router, and the similar optimization approaches used for the RIB may be applied.</t>
      <t>Recall that inter-domain SAVNET architecture generates SAV rules based on the SAV-related information in the SIB and their priorities. In addition, in the case of an AS's interfaces facing provider or lateral peer ASes where loose SAV rules are applicable, the inter-domain SAVNET architecture recommends to use blocklist at such directions to only block the prefixes that are sure not to come at these directions, while in the case of an AS's interfaces facing customer ASes that necessitate stricter SAV rules, the inter-domain SAVNET architecture recommends to use allowlist to only permit the prefixes that are allowed to come at these directions.</t>
      <t>Based on the above rules, taking the SIB in <xref target="sib"/> as an example to illustrate how the inter-domain SAVNET generates rules, AS 4 can conduct SAV as follows: SAV at the interfaces facing AS 3 blocks P1, P2, and P6 according to the rows indexed 0, 2, and 6 in the SIB, SAV at the interfaces facing AS 2 permits P1, P2, and P6 according to the rows indexed 0, 2, and 6 in the SIB, SAV at the interfaces facing AS 1 does not permit any prefixes according to the row indexed 0, 1, 6, and 7 in the SIB, and SAV at the interfaces facing AS 5 permits P5 according to the row indexed 5 in the SIB.</t>
    </section>
    <section anchor="savnet-communication-mechanism">
      <name>SAVNET Communication Mechanism</name>
      <figure anchor="sav_agent_config">
        <name>SAVNET communication mechanism for gathering SAV-related information from different SAV information sources.</name>
        <artwork><![CDATA[
+------+  SAV-specific Information
|      |  Communication Mechanism  +-----------------------------+ 
|      |<==========================|  SAVNET Agent in other ASes |
|      |                           +-----------------------------+
|      |                         +---------------------------------+
|      |                         | +-----------------------------+ |
|      |                         | | RPKI ROA Obj. and ASPA Obj. | |
|      |                         | +-----------------------------+ |
|      |                         | +-----------------------------+ |
|SAVNET|  General Information    | |             RIB             | |
|Agent | Communication Mechanism | +-----------------------------+ |
|  in  |<------------------------| +-----------------------------+ |
| AS X |                         | |             FIB             | |
|      |                         | +-----------------------------+ |
|      |                         | +-----------------------------+ |
|      |                         | |         IRR Database        | |
|      |                         | +-----------------------------+ |
|      |                         +---------------------------------+
|      |  Management Mechanism   +-----------------------------+
|      |<------------------------|      Network Operators      |
|      |                         +-----------------------------+
+------+
]]></artwork>
      </figure>
      <t>SAV-specific information relies on the communication between SAVNET agents and general information can be from RPKI ROA objects and ASPA objects, RIB, FIB, and IRR data. Therefore, as illustrated in <xref target="sav_agent_config"/>, the SAVNET agent needs to receive the SAV-related information from these SAV information sources. AS 1 and AS X are the corresponding ASes shown in <xref target="expcase"/>. SAVNET agent also needs to accept the configurations from network operators for the management operations. Gathering these types of information relies on the SAVNET communication mechanism, which includes SAV-specific information communication mechanism, general information communication mechanism, and management mechanism.</t>
      <section anchor="sav-specific-information-communication-mechanism">
        <name>SAV-specific Information Communication Mechanism</name>
        <figure anchor="sav_msg">
          <name>An example for exchanging SAV-specific information with SAV-specific information communication mechanism between AS1 and AS X.</name>
          <artwork><![CDATA[
+------------------+                        +------------------+
|   AS 1 (P1, P6)  | SAV-specific Messages  |     AS X (P4)    |
| +-------------+  | (P1, AS 2), (P6, AS 2) |  +-------------+ |
| |    SAVNET   |--|------------------------|->|    SAVNET   | |
| |    Agent    |<-|------------------------|--|    Agent    | |
| +-------------+  |      (P4, AS X)        |  +-------------+ |
+------------------+  SAV-specific Messages +------------------+
]]></artwork>
        </figure>
        <t><xref target="sav_msg"/> uses an example for exchanging SAV-specific information with SAV-specific messages between AS1 and AS X. The SAV-specific information can be expressed as &lt;Prefix, Incoming Direction&gt; pairs, e.g., (P1, AS 2), (P6, AS 2), and (P4, AS X) in <xref target="sav_msg"/>.</t>
        <t>The SAV-specific information can be exchanged between ASes via SAV-specific messages. SAV-specific messages are used to propagate or originate the SAV-specific information between ASes by the SAVNET agent. For an AS which initiates its own SAV-specific messages, the SAVNET agent within the AS can obtain incoming direction of its own prefixes to enter other ASes based on the local RIB and uses SAV-specific messages to carry the AS's prefixes to the corresponding ASes. When the SAVNET agents of other ASes receive the SAV-specific messages, they parse the messages to obtain source prefixes and their corresponding incoming directions to enter these ASes.</t>
        <t>Additionally, if SAV-specific information is communicated between ASes, a new SAV-specific information communication mechanism would need to be developed to communicate it and can be implemented by a new protocol or extending an existing protocol. The SAV-specific information communication mechanism needs to define the data structure or format to communicate the SAV-specific messages and the operations and timing for originating, processing, propagating, and terminating the messages. If an extension to an existing protocol is used to exchange SAV-specific information, the corresponding existing protocol should not be affected. The SAVNET agent is the entity to support the SAV-specific communication mechanism. By parsing the SAV-specific messages, it obtains the prefixes and their incoming AS direction for maintaining the SIB. It is important to note that the SAVNET agent within an AS has the capability to establish connections with multiple SAVNET agents within different ASes, relying on either manual configurations by operators or an automatic mechanism. In addition, SAVNET agents should validate the authenticity of the connection for communicating the SAV-specific information to verify whether the SAV-specific information is provided over a secure connection with an authenticated AS.</t>
        <t>The need for a SAV-specific communication mechanism arises from the facts that the SAV-specific information needs to be obtained and communicated between ASes. Different from the general information such as routing information from the RIB, there are no existing mechanism which can support the perception and communication of SAV-specific information between ASes. Hence, a SAV-specific communication mechanism is needed to provide a medium and set of rules to establish communication between different ASes for the exchange of SAV-specific information.</t>
        <t>Furthermore, an AS needs to assemble its source prefixes into the SAV-specific messages. In order to obtain all the source prefixes of an AS, the inter-domain SAVNET architecture can communicate with the intra-domain SAVNET architecture <xref target="intra-domain-arch"/> to obtain all the prefixes belonging to the AS.</t>
        <t>The preferred AS paths of an AS may change over time due to route changes or network failures. The SAVNET agent should launch SAV-specific messages to adapt to the route changes in a timely manner. The SAV-specific information communication mechanism should handle route changes carefully to avoid improper blocks. The reasons for leading to improper blocks may include late detection of route changes, delayed message transmission, or packet losses. However, the detailed design of SAV-specific information communication mechanism for dealing with route changes is outside the scope of this document.</t>
      </section>
      <section anchor="general-information-communication-mechanism">
        <name>General Information Communication Mechanism</name>
        <t>The general information communication mechanism is used for communicating routing information between ASes, obtaining RPKI ROA objects and ASPA objects from RPKI cache servers, and obtaining the information about ASes and their prefixes from IRR databases. The general communication mechanism can be implemented by using existing protocols for collecting the relative information, such as BGP, RTR <xref target="RFC8210"/>, and FTP <xref target="RFC959"/>.</t>
      </section>
      <section anchor="management-mechanism">
        <name>Management Mechanism</name>
        <t>The primary purpose of the management mechanism is to deliver manual configurations of network operators. Examples of the management configurations include, but are not limited to:</t>
        <ul spacing="normal">
          <li>
            <t>SAVNET configurations using YANG, CLI, RTBH, or Flowspec.</t>
          </li>
          <li>
            <t>SAVNET operation.</t>
          </li>
          <li>
            <t>Inter-domain SAVNET provisioning.</t>
          </li>
        </ul>
        <t>Note that the configuration information can be delivered at any time and requires reliable delivery for the management mechanism implementation. Additionally, the management mechanism can carry telemetry information, such as metrics pertaining to forwarding performance, the count of spoofing packets and discarded packets, provided that the inter-domain SAVNET has access to such data. It can include information regarding the prefixes associated with the spoofing traffic, as observed until the most recent time.</t>
      </section>
    </section>
    <section anchor="usecases">
      <name>Use Cases</name>
      <t>This section utilizes the sample use cases to showcase that the inter-domain SAVNET architecture can improve the validation accuracy in the scenarios of limited propagation of prefixes, hidden prefixes, reflection attacks, and direct attacks, compared to existing SAV mechanisms, which are also utilized for the gap analysis of existing inter-domain SAV mechanisms in <xref target="inter-domain-ps"/>. In the following, these use cases are discussed for SAV at customer interfaces and SAV at provider/peer interfaces, respectively.</t>
      <section anchor="sav-at-customer-interfaces">
        <name>SAV at Customer Interfaces</name>
        <t>In order to prevent the source address spoofing, operators can enable ACL-based ingress filtering, source-based RTBH filtering, and/or uRPF-based mechanisms at customer interfaces, namely Strict uRPF, FP-uRPF, VRF uRPF, or EFP-uRPF <xref target="manrs"/> <xref target="nist"/>. However, as analyzed in <xref target="inter-domain-ps"/>, uRPF-based mechanisms may lead to false positives in two inter-domain scenarios: limited propagation of prefixes and hidden prefixes, or may lead to false negatives in the scenarios of source address spoofing attacks within a customer cone, while ACL-based ingress filtering and source-based RTBH filtering need to update SAV rules in a timely manner and lead to high operational overhead. The following showcases that the inter-domain SAVNET architecture can avoid false positives and false negatives in these scenarios.</t>
        <section anchor="limited-propagation-of-prefixes">
          <name>Limited Propagation of Prefixes</name>
          <figure anchor="no-export">
            <name>Limited propagation of prefixes caused by NO_EXPORT.</name>
            <artwork><![CDATA[
                        +----------------+
                        |    AS 3(P3)    |
                        +-+/\-----+/\+/\++
                           /        \  \
                 P3[AS 3] /          \  \ P3[AS 3]
                         /            \  \
                        / (C2P)        \  \
               +----------------+       \  \
               |    AS 4(P4)    |        \  \
               ++/\+/\+/\+/\+/\++         \  \
                 /  /  |  |    \           \  \
       P2[AS 2] /  /   |  |     \           \  \
               /  /    |  |      \           \  \
              /  /     |  |       \ P5[AS 5]  \  \ P5[AS 5]
             /  /      |  |        \           \  \
            /  /(C2P)  |  |         \           \  \
+----------------+     |  |          \           \  \  
|    AS 2(P2)    |     |  | P1[AS 1]  \           \  \
+--------+/\+----+     |  | P6[AS 1]   \           \  \
           \           |  | NO_EXPORT   \           \  \
   P1[AS 1] \          |  |              \           \  \
   NO_EXPORT \         |  |               \           \  \
              \ (C2P)  |  | (C2P/P2P) (C2P)\     (C2P) \  \
           +----------------+              +----------------+
           |  AS 1(P1, P6)  |              |    AS 5(P5)    |
           +----------------+              +----------------+
]]></artwork>
          </figure>
          <t><xref target="no-export"/> presents a scenario where the limited propagation of prefixes occurs due to the NO_EXPORT community attribute. In this scenario, AS 1 is a customer of AS 2, AS 2 is a customer of AS 4, AS 4 is a customer of AS 3, and AS 5 is a customer of both AS 3 and AS 4. The relationship between AS 1 and AS 4 can be either customer-to-provider (C2P) or peer-to-peer (P2P). AS 1 advertises prefixes P1 to AS 2 and adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 2, preventing AS 2 from further propagating the route for prefix P1 to AS 4. Similarly, AS 1 adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 4, resulting in AS 4 not propagating the route for prefix P6 to AS 3. Consequently, AS 4 only learns the route for prefix P1 from AS 1 in this scenario. Suppose AS 1 and AS 4 have deployed inter-domain SAV while other ASes have not, and AS 4 has deployed EFP-uRPF at its customer interfaces.</t>
          <t>In this scenario, existing uRPF-based SAV mechanisms would block the traffic with P1 as source addresses improperly, and thus suffer from the problem of false positives <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P1 as source addresses can arrive at the interfaces facing AS 1 and AS 2. As a result, the false positive problem can be avoided.</t>
        </section>
        <section anchor="hidden-prefixes">
          <name>Hidden Prefixes</name>
          <figure anchor="dsr">
            <name>A Direct Server Return (DSR) scenario.</name>
            <artwork><![CDATA[
                             +----------------+
             Anycast Server+-+    AS 3(P3)    |
                             +-+/\-----+/\+/\++
                                /        \  \
                      P3[AS 3] /          \  \ P3[AS 3]
                              /            \  \
                             / (C2P)        \  \
                     +----------------+      \  \
                     |    AS 4(P4)    |       \  \
                     ++/\+/\+/\+/\+/\++        \  \
        P6[AS 1, AS 2] /  /  |  |   \           \  \
             P2[AS 2] /  /   |  |    \           \  \
                     /  /    |  |     \           \  \
                    /  /     |  |      \ P5[AS 5]  \  \ P5[AS 5]
                   /  /      |  |       \           \  \
                  /  /(C2P)  |  |        \           \  \
      +----------------+     |  |         \           \  \  
User+-+    AS 2(P2)    |     |  | P1[AS 1] \           \  \
      +--------+/\+----+     |  | P6[AS 1]  \           \  \
        P6[AS 1] \           |  | NO_EXPORT  \           \  \
         P1[AS 1] \          |  |             \           \  \
         NO_EXPORT \         |  |              \           \  \
                    \ (C2P)  |  | (C2P)   (C2P) \     (C2P) \  \
                 +----------------+            +----------------+
    Edge Server+-+  AS 1(P1, P6)  |            |    AS 5(P5)    |
                 +----------------+            +----------------+
P3 is the anycast prefix and is only advertised by AS 3 through BGP.
]]></artwork>
          </figure>
          <t><xref target="dsr"/> illustrates a direct server return (DSR) scenario where the anycast IP prefix P3 is only advertised by AS 3 through BGP. In this example, AS 3 is the provider of AS 4 and AS 5, AS 4 is the provider of AS 1, AS 2, and AS 5, and AS 2 is the provider of AS 1. AS 1 and AS 4 have deployed inter-domain SAV, while other ASes have not. When users in AS 2 send requests to the anycast destination IP, the forwarding path is AS 2-&gt;AS 4-&gt;AS 3. The anycast servers in AS 3 receive the requests and tunnel them to the edge servers in AS 1. Finally, the edge servers send the content to the users with source addresses in prefix P3. The reverse forwarding path is AS 1-&gt;AS 4-&gt;AS 2.</t>
          <t>In this scenario, existing uRPF-based mechanisms will improperly block the legitimate response packets from AS 1 at the customer interface of AS 4 facing AS 1 <xref target="inter-domain-ps"/>. In contrast, if the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P3 as source addresses can arrive at the interfaces facing AS 1 and AS 3. As a result, the legitimate response packets with P3 as source addresses from AS 1 can be allowed and the false positive problem can be avoided.</t>
        </section>
        <section anchor="reflection_attack_customer">
          <name>Reflection Attacks</name>
          <figure anchor="customer-reflection-attack">
            <name>A scenario of reflection attacks by source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                   +----------------+
                                   |    AS 3(P3)    |
                                   +-+/\-----+/\+/\++
                                         /     \  \
                                        /       \  \
                                       /         \  \
                                      / (C2P)     \  \
                             +----------------+    \  \
                             |    AS 4(P4)    |     \  \
                             ++/\+/\+/\+/\+/\++      \  \
                P6[AS 1, AS 2] /  /  |  |    \        \  \
                     P2[AS 2] /  /   |  |     \        \  \
                             /  /    |  |      \        \  \
                            /  /     |  |       \P5[AS 5]\  \ P5[AS 5]
                           /  /      |  |        \        \  \
                          /  /(C2P)  |  |         \        \  \
              +----------------+     |  |          \        \  \  
Attacker(P1')-+    AS 2(P2)    |     |  | P1[AS 1]  \        \  \
              +--------+/\+----+     |  | P6[AS 1]   \        \  \
                P6[AS 1] \           |  | NO_EXPORT   \        \  \
                 P1[AS 1] \          |  |              \        \  \
                 NO_EXPORT \         |  |               \        \  \
                            \ (C2P)  |  | (C2P) (C2P)    \  (C2P) \  \
                         +----------------+           +----------------+
                 Victim+-+  AS 1(P1, P6)  |   Server+-+    AS 5(P5)    |
                         +----------------+           +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="customer-reflection-attack"/> depicts the scenario of reflection attacks by source address spoofing within a customer cone. The reflection attack by source address spoofing takes place within AS 4's customer cone, where the attacker spoofs the victim's IP address (P1) and sends requests to servers' IP address (P5) that are designed to respond to such requests. As a result, the server sends overwhelming responses back to the victim, thereby exhausting its network resources. The arrows in <xref target="customer-reflection-attack"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>In this scenario, EFP-uRPF with algorithm A/B will improperly permit the spoofing attacks originating from AS 2 <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P1 as source addresses can only arrive at the interface facing AS 1. Therefore, at the interface of AS 4 facing AS 2, the spoofing traffic can be blocked.</t>
        </section>
        <section anchor="direct_attack_customer">
          <name>Direct Attacks</name>
          <figure anchor="customer-direct-attack">
            <name>A scenario of the direct attacks by source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                   +----------------+
                                   |    AS 3(P3)    |
                                   +-+/\-----+/\+/\++
                                      |        \  \
                                      |         \  \
                                      |          \  \
                                      | (C2P)     \  \
                             +----------------+    \  \
                             |    AS 4(P4)    |     \  \
                             ++/\+/\+/\+/\+/\++      \  \
                P6[AS 1, AS 2] /  /  |  |   \         \  \
                     P2[AS 2] /  /   |  |    \         \  \
                             /  /    |  |     \         \  \
                            /  /     |  |      \P5[AS 5] \  \ P5[AS 5]
                           /  /      |  |       \         \  \
                          /  /(C2P)  |  |        \         \  \
              +----------------+     |  |         \         \  \  
Attacker(P5')-+    AS 2(P2)    |     |  | P1[AS 1] \         \  \
              +--------+/\+----+     |  | P6[AS 1]  \         \  \
                P6[AS 1] \           |  | NO_EXPORT  \         \  \
                 P1[AS 1] \          |  |             \         \  \
                 NO_EXPORT \         |  |              \         \  \
                            \ (C2P)  |  | (C2P)   (C2P) \   (C2P) \  \
                         +----------------+           +----------------+
                 Victim+-+  AS 1(P1, P6)  |           |    AS 5(P5)    |
                         +----------------+           +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="customer-direct-attack"/> portrays a scenario of direct attacks by source address spoofing within a customer cone and is used to analyze the gaps of uRPF-based mechanisms below. The direct attack by source address spoofing takes place within AS 4's customer cone, where the attacker spoofs a source address (P5) and directly targets the victim's IP address (P1), overwhelming its network resources. The arrows in <xref target="customer-direct-attack"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>In this scenario, EFP-uRPF with algorithm A/B will improperly permit the spoofing attacks <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 5 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P5 as source addresses can arrive at the interface facing AS 3 and AS 5. Therefore, at the interface of AS 4 facing AS 2, the spoofing traffic can be blocked.</t>
        </section>
      </section>
      <section anchor="sav_at_p">
        <name>SAV at Provider/Peer Interfaces</name>
        <t>In order to prevent packets with spoofed source addresses from the provider/peer AS, ACL-based ingress filtering, Loose uRPF, and/or source-based RTBH filtering can be deployed <xref target="nist"/>. <xref target="inter-domain-ps"/> exposes the limitations of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF for SAV at provider/peer interfaces in scenarios of source address spoofing attacks from provider/peer AS. The source address spoofing attacks from provider/peer AS include reflection attacks from provider/peer AS and direct attacks from provider/peer AS. The following showcases that the inter-domain SAVNET architecture can avoid false negatives in these scenarios.</t>
        <section anchor="reflect_attack_p">
          <name>Reflection Attacks</name>
          <figure anchor="reflection-attack-p">
            <name>A scenario of reflection attacks by source address spoofing from provider/peer AS.</name>
            <artwork><![CDATA[
                               +----------------+
                Attacker(P1')+-+    AS 3(P3)    |
                               +-+/\-----+/\+/\++
                                  /        \  \
                                 /          \  \
                                /            \  \
                               / (C2P/P2P)    \  \
                       +----------------+      \  \
                       |    AS 4(P4)    |       \  \
                       ++/\+/\+/\+/\+/\++        \  \
          P6[AS 1, AS 2] /  /  |  |    \          \  \
               P2[AS 2] /  /   |  |     \          \  \
                       /  /    |  |      \          \  \
                      /  /     |  |       \ P5[AS 5] \  \ P5[AS 5]
                     /  /      |  |        \          \  \
                    /  /(C2P)  |  |         \          \  \
        +----------------+     |  |          \          \  \
Server+-+    AS 2(P2)    |     |  | P1[AS 1]  \          \  \
        +--------+/\+----+     |  | P6[AS 1]   \          \  \
          P6[AS 1] \           |  | NO_EXPORT   \          \  \
           P1[AS 1] \          |  |              \          \  \
           NO_EXPORT \         |  |               \          \  \
                      \ (C2P)  |  | (C2P)    (C2P) \    (C2P) \  \
                   +----------------+             +----------------+
           Victim+-+  AS 1(P1, P6)  |             |    AS 5(P5)    |
                   +----------------+             +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="reflection-attack-p"/> depicts the scenario of reflection attacks by source address spoofing from provider/peer AS. In this case, the attacker spoofs the victim's IP address (P1) and sends requests to servers' IP address (P2) that respond to such requests. The servers then send overwhelming responses back to the victim, exhausting its network resources. The arrows in <xref target="reflection-attack-p"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>Both ACL-based ingress filtering and source-based RTBH filtering will induce additional operational overhead, and Loose uRPF may improperly permit spoofed packets <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 1 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P1 as source addresses can arrive at the interface facing AS 1 and AS 2. Therefore, at the interface of AS 4 facing AS 3, the spoofing traffic can be blocked.</t>
        </section>
        <section anchor="direct_attack_p">
          <name>Direct Attacks</name>
          <figure anchor="direct-attack-p">
            <name>A scenario of direct attacks by source address spoofing from provider/peer AS.</name>
            <artwork><![CDATA[
                        +----------------+
         Attacker(P2')+-+    AS 3(P3)    |
                        +-+/\-----+/\+/\++
                           /        \  \
                          /          \  \
                         /            \  \
                        / (C2P/P2P)    \  \
               +----------------+       \  \
               |    AS 4(P4)    |        \  \
               ++/\+/\+/\+/\+/\++         \  \
  P6[AS 1, AS 2] /  /  |  |    \           \  \
       P2[AS 2] /  /   |  |     \           \  \
               /  /    |  |      \           \  \
              /  /     |  |       \ P5[AS 5]  \  \ P5[AS 5]
             /  /      |  |        \           \  \
            /  /(C2P)  |  |         \           \  \
+----------------+     |  |          \           \  \
|    AS 2(P2)    |     |  | P1[AS 1]  \           \  \
+--------+/\+----+     |  | P6[AS 1]   \           \  \
  P6[AS 1] \           |  | NO_EXPORT   \           \  \
   P1[AS 1] \          |  |              \           \  \
   NO_EXPORT \         |  |               \           \  \
              \ (C2P)  |  | (C2P)    (C2P) \     (C2P) \  \
           +----------------+              +----------------+
   Victim+-+  AS 1(P1, P6)  |              |    AS 5(P5)    |
           +----------------+              +----------------+
P2' is the spoofed source prefix P2 by the attacker which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
          </figure>
          <t><xref target="direct-attack-p"/> showcases a scenario of direct attack by source address spoofing from provider/peer AS. In this case, the attacker spoofs another source address (P2) and directly targets the victim's IP address (P1), overwhelming its network resources. The arrows in <xref target="direct-attack-p"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>Also, in this scenario, both ACL-based ingress filtering and source-based RTBH filtering will induce additional operational overhead, and Loose uRPF may improperly permit spoofed packets <xref target="inter-domain-ps"/>. If the inter-domain SAVNET architecture is deployed, AS 2 can communicate the SAV-specific information to AS 4 and AS 4 will be aware that the traffic with P2 as source addresses can only arrive at the interface facing AS 2. Therefore, at the interface of AS 4 facing AS 3, the spoofing traffic can be blocked.</t>
        </section>
      </section>
    </section>
    <section anchor="partialincremental-deployment-considerations">
      <name>Partial/Incremental Deployment Considerations</name>
      <t>The inter-domain SAVNET architecture <bcp14>MUST</bcp14> ensure support for partial/incremental deployment as it is not feasible to deploy it simultaneously in all ASes. The partial/incremental deployment of the inter-domain SAVNET architecture consists of different aspects, which include the partial/incremental deployment of the architecture and the partial/incremental deployment of the information sources.</t>
      <t>Within the architecture, the general information like the prefixes and topological information from RPKI ROA Objects and ASPA Objects and the routing information from the RIB can be obtained locally when the corresponding sources are available. Even when both SAV-specific Information and the information from RPKI ROA Objects and ASPA Objects are not available, the routing information from the RIB can be used to generate SAV rules.</t>
      <t>Furthermore, it is not mandatory for all ASes to deploy SAVNET agents for SAV-specific Information. Instead, a SAVNET agent should be able to effortlessly establish a logical neighboring relationship with another AS that has deployed a SAVNET agent. The connections for communicating SAV-specific Information can be achieved by manual configurations set by operators or an automatic neighbor discovery mechanism. This flexibility enables the architecture to accommodate varying degrees of deployment, promoting interoperability and collaboration among participating ASes. During the partial/incremental deployment of SAVNET agent, the SAV-specific Information for the ASes which do not deploy SAVNET agent can not be obtained. To protect the prefixes of these ASes, inter-domain SAVNET architecture can use the SAV-related information from the general information in the SIB to generate SAV rules. At least, the routing information from the RIB can be always available in the SIB.</t>
      <t>As more ASes adopt the inter-domain SAVNET architecture, the "deployed area" expands, thereby increasing the collective defense capability against source address spoofing. Furthermore, if multiple "deployed areas" can be logically interconnected across "non-deployed areas", these interconnected "deployed areas" can form a logical alliance, providing enhanced protection against address spoofing. Especially, along with more ASes deploy SAVNET agent and support the communication of SAV-specific information, the generated SAV rules of the inter-domain SAVNET architecture to protect these ASes will become more accurate, as well as enhancing the protection capability against source address spoofing for the inter-domain SAVNET architecture.</t>
      <t>In addition, releasing the SAV functions of the inter-domain SAVNET architecture incrementally is one potential way to reduce the deployment risks and can be considered in its deployment by network operators:</t>
      <ul spacing="normal">
        <li>
          <t>First, the inter-domain SAVNET can only do the measurement in the data plane and do not take any other actions. Based on the measurement data, the operators can evaluate the effect of the inter-domain SAVNET on the legitimate traffic, including validation accuracy and forwarding performance, as well as the operational overhead.</t>
        </li>
        <li>
          <t>Second, the inter-domain SAVNET can open the function to limit the rate of the traffic that is justified as spoofing traffic. The operators can further evaluate the effect of the inter-domain SAVNET on the legitimate traffic and spoofing traffic, such as limiting the rate of all the spoofing traffic without hurting the legitimate traffic.</t>
        </li>
        <li>
          <t>Third, when the validation accuracy, forwarding performance, and operational overhead have been verified on a large scale by the live network, the inter-domain SAVNET can open the function to directly block the spoofing traffic that is justified by the SAV table in the data plane.</t>
        </li>
      </ul>
    </section>
    <section anchor="convergence-considerations">
      <name>Convergence Considerations</name>
      <t>Convergence issues <bcp14>SHOULD</bcp14> be carefully considered in inter-domain SAV mechanisms due to the dynamic nature of the Internet. Internet routes undergo continuous changes, and SAV rules <bcp14>MUST</bcp14> proactively adapt to these changes, such as prefix and topology changes, in order to prevent false positives and reduce false negatives. To effectively track these changes, the SIM should promptly collect SAV-related information from various SAV information sources and consolidate them in a timely manner.</t>
      <t>In particular, it is essential for the SAVNET agents to proactively communicate the changes of the SAV-specific Information between ASes and adapt to route changes promptly. However, during the routing convergence process, the traffic paths of the source prefixes can undergo rapid changes within a short period. The changes of the SAV-specific Information may not be communicated in time between ASes to update SAV rules, false positives or false negatives may happen. Such inaccurate validation is caused by the delays in communicating SAV-specific Information between ASes, which occur due to the factors like packet losses, unpredictable network latencies, or message processing latencies. The design of the SAV-specific communication mechanism should consider these issues to reduce the inaccurate validation.</t>
      <t>Besides, for the inter-domain SAVNET architecture, the potential ways to deal with the inaccurate validation issues during the convergence of the SAV-specific communication mechanism is to consider using the information from RPKI ROA objects and ASPA objects to generate SAV rules until the convergence process of the SAV-specific communication mechanism is finished, since these information is more stable and can help avoid false positives, and thus avoiding the impact to the legitimate traffic.</t>
    </section>
    <section anchor="manageability-considerations">
      <name>Manageability Considerations</name>
      <t>It is crucial to consider the operations and management aspects of SAV information sources, the SAV-specific communication mechanism, SIB, SIM, and SAV table in the inter-domain SAVNET architecture. The following guidelines should be followed for their effective management:</t>
      <t>First, management interoperability should be supported across devices from different vendors or different releases of the same product, based on a unified data model such as YANG <xref target="RFC6020"/>. This is essential because the Internet comprises devices from various vendors and different product releases that coexist simultaneously.</t>
      <t>Second, scalable operation and management methods such as NETCONF <xref target="RFC6241"/> and syslog protocol <xref target="RFC5424"/> should be supported. This is important as an AS may have hundreds or thousands of border routers that require efficient operation and management.</t>
      <t>Third, management operations, including default initial configuration, alarm and exception reporting, logging, performance monitoring and reporting for the control plane and data plane, as well as debugging, should be designed and implemented in the protocols or protocol extensions. These operations can be performed either locally or remotely, based on the operational requirements.</t>
      <t>By adhering to these rules, the management of SAV information sources and related components can be effectively carried out, ensuring interoperability, scalability, and efficient operations and management of the inter-domain SAVNET architecture.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>In the inter-domain SAVNET architecture, the SAVNET agent plays a crucial role in generating and disseminating SAV-specific messages across different ASes. To safeguard against the potential risks posed by a malicious AS generating incorrect or forged SAV-specific messages, it is important for the SAVNET agents to employ security authentication measures for each received SAV-specific Message. The majour security threats faced by inter-domain SAVNET can be categorized into two aspects: session security and content security. Session security pertains to verifying the identities of both parties involved in a session and ensuring the integrity of the session content. Content security, on the other hand, focuses on verifying the authenticity and reliability of the session content, thereby enabling the identification of forged SAV-specific Messages.</t>
      <t>The threats to session security include:</t>
      <ul spacing="normal">
        <li>
          <t>Session identity impersonation: This occurs when a malicious router deceitfully poses as a legitimate peer router to establish a session with the targeted router. By impersonating another router, the malicious entity can gain unauthorized access and potentially manipulate or disrupt the communication between the legitimate routers.</t>
        </li>
        <li>
          <t>Session integrity destruction: In this scenario, a malicious intermediate router situated between two peering routers intentionally tampers with or destroys the content of the relayed SAV-specific Message. By interfering with the integrity of the session content, the attacker can disrupt the reliable transmission of information, potentially leading to miscommunication or inaccurate SAV-related data being propagated.</t>
        </li>
      </ul>
      <t>The threats to content security include:</t>
      <ul spacing="normal">
        <li>
          <t>Message alteration: A malicious router has the ability to manipulate or forge any portion of a SAV-specific message. For example, the attacker may employ techniques such as using a spoofed Autonomous System Number (ASN) or modifying the AS Path information within the message. By tampering with the content, the attacker can potentially introduce inaccuracies or deceive the receiving ASes, compromising the integrity and reliability of the SAV-related information.</t>
        </li>
        <li>
          <t>Message injection: A malicious router injects a seemingly "legitimate" SAV-specific message into the communication stream and directs it to the corresponding next-hop AS. This type of attack can be likened to a replay attack, where the attacker attempts to retransmit previously captured or fabricated messages to manipulate the behavior or decisions of the receiving ASes. The injected message may contain malicious instructions or false information, leading to incorrect SAV rule generation or improper validation.</t>
        </li>
        <li>
          <t>Path deviation: A malicious router intentionally diverts a SAV-specific Message to an incorrect next-hop AS, contrary to the expected path defined by the AS Path. By deviating from the intended routing path, the attacker can disrupt the proper dissemination of SAV-related information and introduce inconsistencies or conflicts in the validation process. This can undermine the effectiveness and accuracy of source address validation within the inter-domain SAVNET architecture.</t>
        </li>
      </ul>
      <t>Overall, inter-domain SAVNET shares similar security threats with BGP and can leverage existing BGP security mechanisms to enhance both session and content security. Session security can be enhanced by employing session authentication mechanisms used in BGP. Similarly, content security can benefit from the deployment of existing BGP security mechanisms like RPKI, BGPsec, and ASPA. While these mechanisms can address content security threats, their widespread deployment is crucial. Until then, it is necessary to develop an independent security mechanism specifically designed for inter-domain SAVNET. One potential approach is for each origin AS to calculate a digital signature for each AS path and include these digital signatures within the SAV-specific messages. Upon receiving a SAV-specific Message, the SAVNET agent can verify the digital signature to ascertain the message's authenticity. Furthermore, it is worth noting that the information channel of the inter-domain SAVNET architecture may need to operate over a network link that is currently under a source address spoofing attack. As a result, it may experience severe packet loss and high latency due to the ongoing attack, and the implementation of the information channel should ensure uninterrupted communication. Detailed security designs and considerations will be addressed in a separate draft, ensuring the robust security of inter-domain SAVNET.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document has no IANA requirements.</t>
    </section>
    <section anchor="scope">
      <name>Scope</name>
      <t>In this architecture, the choice of protocols used for communication between the SIM and different SAV information sources is not limited. The inter-domain SAVNET architecture presents considerations on how to consolidate SAV-related information from various sources to generate SAV rules and perform SAV using the SAV table in the dataplane. The detailed design and implementation for SAV rule generation and SAV execution depend on the specific inter-domain SAV mechanisms employed.</t>
      <t>This document does not cover administrative or business agreements that may be established between the involved inter-domain SAVNET parties. These considerations are beyond the scope of this document. However, it is assumed that authentication and authorization mechanisms can be implemented to ensure that only authorized ASes can communicate SAV-related information.</t>
    </section>
    <section anchor="assumptions">
      <name>Assumptions</name>
      <t>This document makes the following assumptions:</t>
      <ul spacing="normal">
        <li>
          <t>All ASes where the inter-domain SAVNET is deployed are assumed to provide the necessary connectivity between SAVNET Agent and any intermediate network elements. However, the architecture does not impose any specific limitations on the form or nature of this connectivity.</t>
        </li>
        <li>
          <t>Congestion and resource exhaustion can occur at various points in the inter-domain networks. Hence, in general, network conditions should be assumed to be hostile. The inter-domain SAVNET architecture must be capable of functioning reliably under all circumstances, including scenarios where the paths for delivering SAV-related information are severely impaired. It is crucial to design the inter-domain SAVNET system with a high level of resilience, particularly under extremely hostile network conditions. The architecture should ensure uninterrupted communication between inter-domain SAVNET Agents, even when data-plane traffic saturates the link.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture does not impose rigid requirements for the SAV information sources that can be used to generate SAV rules. Similarly, it does not dictate strict rules on how to utilize the SAV-related information from diverse sources or perform SAV in the dataplane. Network operators have the flexibility to choose their approaches to generate SAV rules and perform SAV based on their specific requirements and preferences. Operators can either follow the recommendations outlined in the inter-domain SAVNET architecture or manually specify the rules for governing the use of SAV-related information, the generation of SAV rules, and the execution of SAV in the dataplane.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture does not impose restrictions on the selection of the local AS with which AS to communicate SAV-specific Information. The ASes have the flexibility to establish connections for SAV-specific communication based on the manual configurations set by operators or other automatic mechanisms.</t>
        </li>
        <li>
          <t>The inter-domain SAVNET architecture provides the flexibility to accommodate Quality-of-Service (QoS) policy agreements between SAVNET-enabled ASes or local QoS prioritization measures, but it does not make assumptions about their presence. These agreements or prioritization efforts are aimed at ensuring the reliable delivery of SAV-specific Information between SAVNET Agents. It is important to note that QoS is considered as an operational consideration rather than a functional component of the inter-domain SAVNET architecture.</t>
        </li>
        <li>
          <t>The information and management channels are loosely coupled and are used for collecting SAV-related information from different sources, and how the inter-domain SAVNET synchronize the management and operation configurations is out of scope of this document.</t>
        </li>
      </ul>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Igor Lubashev<br/>
  Akamai Technologies<br/>
  145 Broadway<br/>
  Cambridge, MA, 02142<br/>
  United States of America<br/>
  Email: ilubashe@akamai.com</t>
      <t>Many thanks to Igor Lubashev for the significantly helpful revision suggestions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC5424">
          <front>
            <title>The Syslog Protocol</title>
            <author fullname="R. Gerhards" initials="R." surname="Gerhards"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way.</t>
              <t>This document has been written with the original design goals for traditional syslog in mind. The need for a new layered specification has arisen because standardization efforts for reliable and secure syslog extensions suffer from the lack of a Standards-Track and transport-independent RFC. Without this document, each other standard needs to define its own syslog packet format and transport mechanism, which over time will introduce subtle compatibility issues. This document tries to provide a foundation that syslog extensions can build on. This layered architecture approach also provides a solid basis that allows code to be written once for each syslog feature rather than once for each transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5424"/>
          <seriesInfo name="DOI" value="10.17487/RFC5424"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="inter-domain-ps" target="https://datatracker.ietf.org/doc/draft-ietf-savnet-inter-domain-problem-statement/">
          <front>
            <title>Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="intra-domain-arch" target="https://datatracker.ietf.org/doc/draft-li-savnet-intra-domain-architecture/">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="RFC5635">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC8955">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8210">
          <front>
            <title>The Resource Public Key Infrastructure (RPKI) to Router Protocol, Version 1</title>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>In order to verifiably validate the origin Autonomous Systems and Autonomous System Paths of BGP announcements, routers need a simple but reliable mechanism to receive Resource Public Key Infrastructure (RFC 6480) prefix origin data and router keys from a trusted cache. This document describes a protocol to deliver them.</t>
              <t>This document describes version 1 of the RPKI-Router protocol. RFC 6810 describes version 0. This document updates RFC 6810.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8210"/>
          <seriesInfo name="DOI" value="10.17487/RFC8210"/>
        </reference>
        <reference anchor="RFC959">
          <front>
            <title>File Transfer Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <author fullname="J. Reynolds" initials="J." surname="Reynolds"/>
            <date month="October" year="1985"/>
            <abstract>
              <t>This memo is the official specification of the File Transfer Protocol (FTP) for the DARPA Internet community. The primary intent is to clarify and correct the documentation of the FTP specification, not to change the protocol. The following new optional commands are included in this edition of the specification: Change to Parent Directory (CDUP), Structure Mount (SMNT), Store Unique (STOU), Remove Directory (RMD), Make Directory (MKD), Print Directory (PWD), and System (SYST). Note that this specification is compatible with the previous edition.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="9"/>
          <seriesInfo name="RFC" value="959"/>
          <seriesInfo name="DOI" value="10.17487/RFC0959"/>
        </reference>
        <reference anchor="manrs" target="https://www.manrs.org/netops/guide/antispoofing/">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="nist" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation">
          <front>
            <title>Resilient Interdomain Traffic Exchange: BGP Security and DDos Mitigation</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="rpki-time-of-flight" target="https://dl.acm.org/doi/10.1007/978-3-031-28486-1_18">
          <front>
            <title>RPKI Time-of-Flight&amp;#58; Tracking Delays in the Management, Control, and Data Planes</title>
            <author>
              <organization>ISOC</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="sav-table" target="https://datatracker.ietf.org/doc/draft-huang-savnet-sav-table/">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 849?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Alvaro Retana, Kotikalapudi Sriram, Rüdiger Volk, Xueyan Song, Ben Maddison, Jared Mauch, Joel Halpern, Aijun Wang, Jeffrey Haas, Xiangqing Chang, Changwang Lin, Mingxing Liu, Zhen Tan, Yuanyuan Zhang, Yangyang Wang, Antoin Verschuren etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
