<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-inter-domain-problem-statement-15" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="Inter-domain SAVNET Problem Statement">Gap Analysis, Problem Statement, and Requirements for Inter-Domain SAV</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-15"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="K." surname="Sriram" fullname="Kotikalapudi Sriram">
      <organization abbrev="USA NIST">USA National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <city>Gaithersburg</city>
          <region>MD</region>
          <country>United States of America</country>
        </postal>
        <email>sriram.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="18"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 106?>

<t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 110?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) is a fundamental mechanism for detecting and mitigating source address spoofing attacks <xref target="RFC2827"/> <xref target="RFC5210"/> <xref target="RFC3704"/> <xref target="RFC8704"/>. 
This document provides a gap analysis of existing inter-domain SAV mechanisms, describes the problem space, and defines the requirements for technical improvements.
The corresponding work related to intra-domain SAV is documented in <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>.</t>
      <t>In this document, inter-domain SAV refers to SAV on AS-to-AS interfaces that carry external BGP (eBGP) sessions. The eBGP sessions include Customer-to-Provider (C2P), Provider-to-Customer (P2C), lateral peering (P2P), and Route Server (RS) to RS-client connections. The terms customer, provider (transit provider), and lateral peer (non-transit peer; peer (for simplicity)) used in this document are consistent with those defined in <xref target="RFC7908"/> <xref target="RFC9234"/>. Further, <xref target="RFC9234"/> mentions RS and RS-client. An RS-to-RS-client interface is akin to the customer interface. For the purposes of SAV, an RS-client-to-RS interface may be treated (1) like a provider interface for simplicity, or (2) like a union of lateral peers considering all the ASes the RS-client chose to peer with at the IXP RS.</t>
      <t>Access Control List (ACL) and unicast Reverse Path Forwarding (uRPF) based techniques are currently utilized to some extent for inter-domain SAV. In this document, the inter-domain SAV methods from only the existing IETF RFCs (BCP 38 <xref target="RFC2827"/> and BCP 84 <xref target="RFC3704"/> <xref target="RFC8704"/>) are considered for the gap analysis; IETF work-in-progress documents are not considered. 
Other documents, such as <xref target="SAC-004"/>, discuss the underlying anti-spoofing problem space from an operational and security perspective, but are not used as the basis of the method-by-method gap analysis.
This document analyzes the available methods and attempts to answer: (1) what are the technical gaps (<xref target="gap"/>), (2) what are the outstanding problems (problem statement) (<xref target="problem"/>), and (3) what are the practical requirements for the solutions to these problems (<xref target="req"/>).</t>
      <t>The following summarizes the fundamental problems with existing SAV mechanisms, as analyzed in <xref target="gap"/> and <xref target="problem"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Improper block: Existing uRPF-based mechanisms suffer from improper block (false positives) in two inter-domain scenarios: limited propagation of a prefix and hidden prefix.</t>
        </li>
        <li>
          <t>Improper permit: With some existing uRPF-based SAV mechanisms, improper permit (false negatives) can happen on any type of interface (customer, lateral peer, or provider). Specifically, if the method relaxes the directionality constraint <xref target="RFC3704"/> <xref target="RFC8704"/> to try to achieve zero improper blocking, the possibility of improper permit increases. (Note: It is recognized that unless there is full adoption of SAV in the customer cone (CC) of the interface in consideration, improper permit is not fully preventable in scenarios where source address spoofing occurs from within the CC, i.e., a prefix at one Autonomous System (AS) in the CC is spoofed from another AS in the same CC.)</t>
        </li>
        <li>
          <t>High operational overhead: ACL-based ingress SAV filtering introduces significant operational overhead, as it needs to update ACL rules manually to adapt to prefix or routing changes in a timely manner. The high operational overhead issue does not pertain to existing uRPF-based mechanisms.</t>
        </li>
      </ul>
      <t>To address these problems, this document specifies (<xref target="req"/>) the following key technical requirements for any new solution:</t>
      <ul spacing="normal">
        <li>
          <t>Improved SAV accuracy over existing mechanisms: Any new inter-domain SAV mechanism <bcp14>MUST NOT</bcp14> be worse than existing inter-domain SAV mechanisms in terms of improper block and improper permit. It <bcp14>SHOULD</bcp14> avoid improper blocking and improve the directionality of filtering (i.e., rejecting spoofed traffic).</t>
        </li>
        <li>
          <t>Reduced operational overhead: Any new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> be able to automatically adapt to network dynamics and asymmetric routing scenarios. Any such solution <bcp14>MUST</bcp14> have less operational overhead than ACL-based ingress SAV filtering.</t>
        </li>
        <li>
          <t>Benefit in incremental/partial deployment: Any new solution <bcp14>MUST NOT</bcp14> assume pervasive adoption of the SAV method, the SAV-related information (<xref target="terminology"/>), or the SAV-specific information (<xref target="terminology"/>). It <bcp14>SHOULD</bcp14> benefit early adopters by providing effective protection from spoofing of source addresses even in partial deployment.</t>
        </li>
        <li>
          <t>Automatic updates to the SAV list and efficient convergence: Any new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> be responsive to changes in the SAV-related information or the SAV-specific information. It <bcp14>SHOULD</bcp14> automatically update the SAV list while achieving efficient re-convergence of the same.</t>
        </li>
        <li>
          <t>Providing necessary security guarantee: If any proposed new SAV method requires exchanging SAV-specific information between ASes, security mechanisms must exist to prevent malicious injection or alteration of the SAV-specific information.</t>
        </li>
      </ul>
      <t>In addition, any new inter-domain SAV mechanisms should avoid packet modification in the data plane. 
Note that this document focuses on inter-domain SAV mechanisms that validate and filter packets without modifying data plane packets. This scope limitation is intentional, since allowing packet modification would introduce additional design, forwarding, interoperability, and deployment considerations beyond the problem space studied in this document. Therefore, packet-modifying approaches are outside the scope of this document.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV List:</dt>
        <dd>
          <t>The table of prefixes that indicates the validity of a specific source IP address or source IP prefix per interface. Sometimes the terms 'RPF (Reverse Path Forwarding) list' or 'SAV rules' are used interchangeably with 'SAV list'.</t>
        </dd>
        <dt>Improper Block:</dt>
        <dd>
          <t>The validation results in packets with legitimate source addresses being blocked improperly due to an inaccurate SAV list.</t>
        </dd>
        <dt>Improper Permit:</dt>
        <dd>
          <t>The validation results in packets with spoofed source addresses being permitted improperly due to an inaccurate SAV list.</t>
        </dd>
        <dt>Customer Cone:</dt>
        <dd>
          <t>The Customer Cone of a given AS, denoted as AS-A, includes: (1) AS-A itself, (2) AS-A's direct customers (ASes), (3) The customers of AS-A's direct customers (indirect customers), (4) And so on, recursively, following all chains of provider-to-customer (P2C) links down the hierarchy.</t>
        </dd>
        <dt>Customer Cone Prefixes:</dt>
        <dd>
          <t>IP prefixes permitted by their owners to be originated by, or used as source addresses for data traffic originated from, one or more ASes within the CC.</t>
        </dd>
        <dt>SAV-related Information:</dt>
        <dd>
          <t>Routing information (e.g., RIB and FIB) and objects published in the Resource Public Key Infrastructure (RPKI) that were originally proposed for non-SAV purposes but may also be used for SAV. The RPKI objects include existing RPKI object types (e.g., ROAs and ASPAs) as well as any new types that may be proposed.</t>
        </dd>
        <dt>SAV-specific Information:</dt>
        <dd>
          <t>Information dedicated to SAV, which may be defined and exchanged between ASes using a potentially new inter-AS communication protocol or an extension of an existing protocol. The information may also take the form of new RPKI object type(s) or management information from operators.</t>
        </dd>
      </dl>
    </section>
    <section anchor="SAV_methods">
      <name>Existing Inter-domain SAV Mechanisms</name>
      <t>Inter-domain SAV is typically performed at the AS level (on a per neighbor-AS-interface basis) and can be deployed at AS border routers (ASBRs) to prevent source address spoofing. There are various mechanisms available to implement inter-domain SAV for anti-spoofing ingress filtering <xref target="nist"/> <xref target="manrs"/> <xref target="isoc"/>, which are reviewed in this section.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering <xref target="RFC3704"/>: ACL-based ingress SAV filtering is a technique that relies on ACL rules to filter packets based on their source addresses. However, ACL-based ingress SAV filtering introduces significant operational overhead, as ACL rules need to be updated in a timely manner to reflect prefix or routing changes in the inter-domain routing system. One may think of using ACL as a disallow list on a provider interface to block source prefixes that are clearly invalid in the inter-domain routing context, such as IANA special purpose or unallocated IPv4/IPv6 prefixes, etc. But it is impractical to store and maintain a very large and dynamically varying set of unallocated IPv6 prefixes. Also, for the customer interfaces, the ACL method is impractical while other techniques (as described below) are more effective. ACL-based ingress SAV filtering has applicability for broadband cable or digital subscriber access loop (DSL) access networks where the service provider has clear knowledge of IP address prefixes it has allocated to manage those services. Here ACL can be used in an allow-list form.</t>
        </li>
        <li>
          <t>uRPF-based mechanisms: A class of SAV mechanisms are based on Unicast Reverse Path Forwarding (uRPF) <xref target="RFC3704"/> <xref target="RFC8704"/>. The core idea of uRPF for SAV is to exploit the symmetry of inter-domain routing: in many cases, the best next hop for a destination is also the best previous hop for the source. In other words, if a packet arrives from a certain interface, the source address of that packet should be reachable via the same interface, according to the FIB. However, symmetry in routing does not always hold in practice, and to address cases where it does not hold, many enhancements and modes of uRPF have evolved. Different modes of uRPF have different levels of strictness and flexibility, and network operators can choose from them to suit particular network scenarios. We briefly describe these modes as follows:  </t>
          <ul spacing="normal">
            <li>
              <t>Strict uRPF <xref target="RFC3704"/>: Strict uRPF is the most stringent mode. It permits a packet only if it has a source address that is covered by a prefix in the FIB, and the next hop for that prefix is the same interface that the packet arrived on. This mode can be deployed at customer interfaces in some scenarios, e.g., a directly connected single-homed stub customer AS <xref target="nist"/>.</t>
            </li>
            <li>
              <t>Loose uRPF <xref target="RFC3704"/>: Loose uRPF verifies that the source address of a packet is routable on the internet by matching it with one or more prefixes in the FIB, regardless of the interface on which the packet arrives. If the source address is not routable, Loose uRPF discards the packet. Loose uRPF is typically deployed at the provider interfaces of an AS to block packets with source addresses from prefixes that are not routed on the global internet (e.g., IANA-allocated private-use addresses, unallocated IPv4/IPv6 addresses, multicast addresses, etc.).</t>
            </li>
            <li>
              <t>Feasible Path uRPF (FP-uRPF) <xref target="RFC3704"/>: Unlike Strict uRPF, which requires the packet to arrive on the exact best return path, FP-uRPF allows a packet to pass as long as the router could reach that source address through the interface it arrived on (based on the feasible routes in the Adj-RIBs-In <xref target="RFC4271"/>), even if the route isn't the primary route (per best path selection). This makes it more effective in multi-homed environments where asymmetric routing is common, as it prevents legitimate traffic from being dropped simply because it didn't take the "best" path back to the sender.</t>
            </li>
            <li>
              <t>Enhanced Feasible Path uRPF with Algorithm A (EFP-uRPF Alg-A) <xref target="RFC8704"/>: EFP-uRPF Alg-A expands the list of valid source addresses for a specific interface by including all prefixes associated with any Origin AS that is reachable through that interface. Instead of only accepting prefixes directly advertised on a link, the router identifies all the origin ASes present in the BGP updates received on that interface and then permits any prefix from those same ASes that it sees elsewhere in its Adj-RIBs-In (associated with all neighbors — customers, providers, peers). This "Origin AS-based" approach provides significantly more flexibility than strict or traditional FP-uRPF, as it accounts for cases where an AS in the CC may send traffic for one of its prefixes over a link where it only advertised a different prefix (multi-homing and asymmetric routing scenarios).</t>
            </li>
            <li>
              <t>Enhanced Feasible Path uRPF with Algorithm B (EFP-uRPF Alg-B) <xref target="RFC8704"/>: EFP-uRPF Alg-B provides even greater flexibility (compared to EFP-uRPF Alg-A) by aggregating all customer interfaces into a single "customer group" for validation purposes. The router first identifies all unique prefixes and origin ASes associated with all directly connected customer interfaces using only the Adj-RIBs-In associated with them. It then constructs a comprehensive RPF list that includes every prefix originated by those ASes, regardless of whether those prefixes were learned via customer, peer, or transit provider links. This list is applied uniformly across all customer-facing interfaces, attempting to ensure that legitimate traffic from a multihomed AS in the CC is never dropped, even if the traffic arrives on a different customer-facing port than the one where the specific prefix was advertised. In comparison to EFP-uRPF Alg-A, this method (Alg-B) reduces the possibility of improper block but at the expense of increased possibility of improper permit, i.e., reduced directionality.</t>
            </li>
            <li>
              <t>Virtual Routing and Forwarding (VRF) uRPF <xref target="RFC4364"/> <xref target="urpf"/> <xref target="manrs"/>: VRF uRPF uses a separate VRF table for each external BGP peer and is only a way of implementation for a SAV list.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="gap">
      <name>Gap Analysis</name>
      <t>Inter-domain SAV is essential for preventing source address spoofing traffic at all AS interfaces — customers, providers, and lateral peers. An ideal inter-domain SAV mechanism must block all spoofing traffic while permitting legitimate traffic in all scenarios of interest. However, in some cases, existing SAV mechanisms may unintentionally block legitimate traffic or permit spoofing traffic. This section aims to conduct a gap analysis of existing SAV mechanisms for different types of interfaces under various scenarios to identify their technical limitations.</t>
      <section anchor="sav_at_cust">
        <name>SAV at Customer Interfaces</name>
        <t>To prevent source address spoofing on customer interfaces, operators can enable ACL-based ingress filtering, or uRPF-based mechanisms such as Strict uRPF, FP-uRPF, or EFP-uRPF. However, the ACL method typically has high operational overhead. The uRPF-based mechanisms may cause improper block in two inter-domain scenarios: Limited Propagation of a Prefix and Hidden Prefix. They may also cause improper permit in the scenarios of source address Spoofing within a CC. One example for Limited Propagation of a Prefix scenario is when an AS attaches NO_EXPORT BGP Community to some prefixes (routes) forwarded to some upstream providers (in multi-homing scenarios) (see <xref target="noexp"/>). Sometimes this scenario occurs by selectively propagating different sets of prefixes to different upstream providers. The Hidden Prefix scenario is typically associated with the Direct Server Return (DSR) scenario; anycast prefix in a Content Delivery Network (CDN) application is not announced by the AS where the DSR (edge server) is located (see <xref target="dsrp"/>). Source address Spoofing within a CC scenario arises when a prefix at one AS in the CC is spoofed from another AS in the same CC <xref target="spoofing_within_cc"/>. It is recognized that unless there is full adoption of SAV in the CC of the interface in consideration, improper permit is not fully preventable in the Source address Spoofing within a CC scenario.</t>
        <t><xref target="customer_gap"/> provides an overview of the gaps associated with the ACL method, Strict uRPF, FP-uRPF, and EFP-uRPF for SAV at customer interfaces in the Limited Propagation of a Prefix, Hidden Prefix, and Source address Spoofing within a CC scenarios mentioned above. Illustrations and analyses of these gaps are provided in <xref target="noexp"/>, <xref target="dsrp"/>, and <xref target="spoofing_within_cc"/>, respectively.</t>
        <figure anchor="customer_gap">
          <name>The gaps of ACL-based ingress filtering, Strict uRPF, FP-uRPF, and EFP-uRPF for customer interfaces for the scenarios of interest.</name>
          <artwork><![CDATA[
+--------------------+------------+-----------+-------+--------+
|Traffic & Scenarios |     ACL    |Strict uRPF|FP-uRPF|EFP-uRPF|
+----------+---------+------------+-----------+-------+--------+
|Legitimate|   LPP   |            |                            |
|Traffic   +---------+            |       Improper Block       |
|          |   HP    |    High    |         possible           |
+----------+---------+Operational-+-------------------+--------+
|          |         |  Overhead  |                   |Improper|
|Spoofed   |  no SCC |            |                   |Permit  |
|Traffic   |         |            |   Functions as    |only for|
|          |         |            |      Expected     |EFP-uRPF|
|          |         |            |                   |Alg-B   |
|+---------+---------+            +-------------------+--------|
|Spoofed   |   SCC   |            |                            |
|Traffic   |         |            |       Improper Permit      |
|          |         |            |    (in partial deployment) |
+----------+---------+------------+----------------------------+

LPP = Limited Propagation of a Prefix
HP = Hidden Prefix 
SCC = Spoofing within a CC
'Functions as Expected' connotes the absence of improper permit. 
It also connotes low operational overhead. 
]]></artwork>
        </figure>
        <section anchor="noexp">
          <name>Limited Propagation of a Prefix Scenario</name>
          <t>In inter-domain networks, some prefixes may not propagate from a customer to all its providers and/or may not propagate transitively from the providers to all their providers due to various factors, such as the use of NO_EXPORT or NO_ADVERTISE Communities, or some other selective-export policies. In these cases, it is possible that a prefix (route) announcement in the CC associated with a customer interface has limited propagation in the CC and is not received on that interface. Then the prefix is invisible in BGP at that interface but the traffic with source address in that prefix may still be received on that interface. This can give rise to improper block when performing SAV with existing mechanisms. These mechanisms include EFP-uRPF Alg-A, which is the focus on in the following analysis, while it also applies to Strict uRPF and FP-uRPF. All these mechanisms suffer from the same problem of improper block in this scenario.</t>
          <figure anchor="no-export">
            <name>Limited propagation of a prefix caused by NO_EXPORT.</name>
            <artwork><![CDATA[
                          +----------------+
                          |    AS 3(P3)    |
                          +-+/\------+/\+--+
                             /         \
                            /           \ 
                           /             \
                          / (C2P)         \
                 +------------------+      \
                 |     AS 4(P4)     |       \
                 ++/\+--+/\+----+/\++        \
                   /     |        \           \
         P2[AS 2] /      |         \           \
                 /       |          \           \
                / (C2P)  |           \ P5[AS 5]  \ P5[AS 5]
+----------------+       |            \           \    
|    AS 2(P2)    |       | P1[AS 1]    \           \
+----------+/\+--+       | P6[AS 1]     \           \
             \           |               \           \
     P1[AS 1] \          |                \           \
     NO_EXPORT \         |                 \           \
                \(C2P)   |(C2P)        (C2P)\      (C2P)\
              +----------------+          +----------------+
              |  AS 1(P1, P6)  |          |    AS 5(P5)    |
              +----------------+          +----------------+
]]></artwork>
          </figure>
          <t>In the scenario of <xref target="no-export"/>, AS 1 is a customer of AS 2; AS 1 and AS 2 are customers of AS 4; AS 4 is a customer of AS 3; and AS 5 is a customer of both AS 3 and AS 4. AS 1 advertises prefixes P1 to AS 2 with the NO_EXPORT community attribute attached, preventing AS 2 from further propagating the route for prefix P1 to AS 4. Consequently, AS 4 only learns the route for prefix P1 from AS 1 in this scenario. Suppose AS 1 and AS 4 have deployed inter-domain SAV while other ASes have not, and AS 4 has deployed EFP-uRPF at its customer interfaces.</t>
          <t>If AS 4 deploys EFP-uRPF Alg-A at customer interfaces, it will require packets with source addresses in P1 or P6 to only arrive on the interface with AS 1. When AS 1 sends legitimate packets with source addresses in P1 or P6 to AS 4 via AS 2, AS 4 improperly blocks these packets. The same improper block problem occurs with the use of Strict uRPF or FP-uRPF. EFP-uRPF with Alg-B can avoid the improper block in this specific scenario, but even this SAV method would have the improper block if the TE at AS 1 is such that none of the customer interfaces at AS 4 receives a route for P1 (or P6).</t>
        </section>
        <section anchor="dsrp">
          <name>Hidden Prefix Scenario</name>
          <t>CDNs use the concepts of anycast <xref target="RFC4786"/><xref target="RFC7094"/> and DSR to improve the quality of service by placing edge servers with content closer to users. An anycast IP address is assigned to devices in different locations, and incoming requests are routed to the closest edge server (DSR) location. Usually, only locations with rich connectivity announce the anycast IP address through BGP. The CDN server receives requests from users and creates tunnels to the edge locations, from where content is sent directly to users. DSR requires servers in the edge locations to use the anycast IP address as the source address in response packets. However, the ASes serving the edge servers do not announce the anycast prefixes through BGP, so the anycast prefix is hidden (invisible in BGP) on the customer interface side at intermediate ASes which — with existing inter-domain SAV mechanisms — would improperly block the response packets.</t>
          <t><xref target="dsr"/> illustrates a DSR scenario where the anycast IP prefix P7 is advertised by AS 3 through BGP. In this example, AS 3 is the provider of AS 4 and AS 5; AS 4 is the provider of AS 1, AS 2, and AS 5; and AS 2 is the provider of AS 1. AS 2 and AS 4 have deployed inter-domain SAV. When a user at AS 2 sends a request to the anycast destination IP, the forwarding path is AS 2-&gt;AS 4-&gt;AS 3. The anycast server in AS 3 receives the request and tunnels it to the edge servers in AS 1. Finally, the edge server sends the content packets to the user with source addresses in prefix P3. Let us say, the forwarding path for the content packets is AS 1-&gt;AS 2. Since AS 2 does not receive routing information for prefix P3 from AS 1, EFP-uRPF Alg-A or EFP-uRPF Alg-B (or any other existing uRPF-based mechanism) at the customer interface of AS 2 facing AS 1 will improperly block the response packets from AS 1.</t>
          <figure anchor="dsr">
            <name>A Direct Server Return (DSR) scenario.</name>
            <artwork><![CDATA[
                                +----------------+
                Anycast Server+-+  AS 3(P3, P7)  |
                                +-+/\----+/\+----+
                                   /       \
                         P3[AS 3] /         \ P3[AS 3]
                        P7[AS 3] /           \ P7[AS 3]
                                / (C2P)       \
                       +----------------+      \
                       |    AS 4(P4)    |       \
                       ++/\+--+/\+--+/\++        \
                         /     |      \           \
         P3[AS 4, AS 3] /      |       \           \
        P7[AS 4, AS 3] /       |        \           \
                      / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
      +----------------+       |          \           \    
User+-+    AS 2(P2)    |       | P1[AS 1]  \           \
      +----------+/\+--+       | P6[AS 1]   \           \
                   \           |             \           \
           P6[AS 1] \          |              \           \
            P1[AS 1] \         |               \           \
                      \(C2P)   |(C2P)      (C2P)\      (C2P)\
                    +---------------+         +----------------+
       Edge Server+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                    +----------------+        +----------------+
P7 is the anycast prefix and is advertised only by AS 3 via BGP.
Note that, unlike the other AS network figures in this document,
this figure illustrates that AS 3 advertises prefixes P3 and P7 
to AS 2 through AS 4, and does not depict the propagation of 
prefixes P1 and P6 beyond AS 2.
]]></artwork>
          </figure>
          <t>Further, there are cases of specific prefixes that may be exclusively used as source addresses (legitimately) without being advertised via BGP by any AS. While different from DSR scenarios, these cases similarly result in existing inter-domain SAV mechanisms improperly blocking legitimate traffic originating from such prefixes.</t>
        </section>
        <section anchor="spoofing_within_cc">
          <name>Source Address Spoofing within a Customer Cone Scenario</name>
          <t>In general, improper permit of spoofed packets in Source Address Spoofing within a CC scenarios is unavoidable for various uRPF-based methods in partial deployment. For example, consider a topology in which AS 1 and AS 2 are customers of AS 3; and AS 3 is a customer of AS 4. AS 1 and AS 2 originate prefixes P1 and P2, respectively. AS 4 performs SAV on its customer interface with AS 3. P1 and P2 are announced from AS 3 to AS 4 and they would be included in the SAV list (allowlist) of AS 4 with any SAV mechanism. Assume AS 3 doesn't do SAV. Now as an example of Source Address Spoofing within a CC, if AS 2 spoofs AS 1's prefix P1 and sends the spoofed packets to AS 4 (via AS 3), there is no way for AS 4 to detect the spoofed traffic. AS 4's SAV cannot differentiate between the spoofed and the legitimate packets that have source address in P1. In an Source Address Spoofing within a CC scenario of this nature, the only recourse for blocking the spoofed traffic is for AS 3 also to be upgraded to do SAV, i.e., deployment of SAV closer to the source of spoofing.</t>
          <t>Another scenario is highlighted in <xref target="customer-spoofing"/> while using EFP-uRPF Alg-B method on customer interfaces. This scenario is not Source Address Spoofing within a CC from the perspective of each individual customer interfaces of AS 4, but it is Source Address Spoofing within a CC from the perspective of AS 4 as a whole. EFP-uRPF Alg-B relaxes directionality to reduce (or eliminate) false positives and that makes it more susceptible to Source Address Spoofing within a CC (per the latter perspective). This is expected because EFP-uRPF Alg-B somewhat conservatively applies the same relaxed SAV list across all customer interfaces.</t>
          <figure anchor="customer-spoofing">
            <name>A scenario of source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                       +----------------+
                                       |    AS 3(P3)    |
                                       +-+/\----+/\+----+
                                          /       \
                                         /         \ 
                                        /           \
                                       / (C2P)       \
                              +----------------+      \
                              |    AS 4(P4)    |       \
                              ++/\+--+/\+--+/\++        \
                 P6[AS 2, AS 1] /     |      \           \
                P1[AS 2, AS 1] /      |       \           \
                     P2[AS 2] /       |        \           \
                             / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
             +----------------+       |          \           \    
Spoofer(P5')-+    AS 2(P2)    |       | P1[AS 1]  \           \
             +----------+/\+--+       | P6[AS 1]   \           \
                          \           |             \           \
                  P6[AS 1] \          |              \           \
                   P1[AS 1] \         |               \           \
                             \(C2P)   |(C2P)      (C2P)\      (C2P)\
                           +----------------+        +----------------+
                           |  AS 1(P1, P6)  |        |    AS 5(P5)    |
                           +----------------+        +----------------+
P5' is the spoofed source prefix P5 by the spoofer which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t>In <xref target="customer-spoofing"/>, the source address spoofing takes place within AS 4's CC, where the spoofer, which is inside of AS 2 or connected to AS 2 through other ASes, sends spoofing traffic with spoofed source addresses in P5 to AS 3 along the path AS 2-&gt;AS 4-&gt; AS 3. The arrows in <xref target="customer-spoofing"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>If AS 4 deploys EFP-uRPF Alg-B at its customer interfaces, it will allow packets with source addresses in P5 to originate from AS 1, AS 2, and AS 5. Consequently, AS 4 will improperly permit the spoofed packets from AS 2, enabling them to propagate further.</t>
          <t>In the scenario of <xref target="customer-spoofing"/>, Strict uRPF, FP-uRPF, and EFP-uRPF Alg-A — applied on the customer interfaces — work effectively to block the spoofed packets from AS 2. This is because these mechanisms have stronger directionality property than EFP-uRPF Alg-B.</t>
        </section>
      </section>
      <section anchor="sav_at_peer">
        <name>SAV at Peer Interfaces</name>
        <t>SAV is used at peer interfaces for validating the traffic entering the validating AS and destined for the AS's customer cone.
The data packets received from a customer or lateral peer AS must have source addresses belonging only to the prefixes in the CC of that AS. 
In both cases, the focus is on discovering all prefixes in the CC of the neighbor AS.
So, in principle, the SAV techniques suitable on a customer interface may also be used on a peer interface, especially EFP-uRPF Alg-A or Alg-B, which are more accommodative of asymmetric routing.
Indeed, asymmetric routing is thought to be prevalent for peer interfaces.
If SAV techniques suitable for customer interfaces are considered for peer interfaces, then the gap analysis of <xref target="sav_at_cust"/> would also be applicable to the SAV for the peer interfaces.
However, due to increased concern about asymmetric routing, network operators may conservatively use the same relaxed SAV techniques for peer interfaces as those for provider interfaces, e.g., Loose uRPF <xref target="sav_at_prov"/>.
In that case, the gap analysis of <xref target="sav_at_prov"/> would also be applicable to the SAV for peer interfaces.</t>
      </section>
      <section anchor="sav_at_prov">
        <name>SAV at Provider Interfaces</name>
        <t>SAV is used at provider interfaces for validating the traffic entering the AS and destined for the AS's customer cone. <xref target="provider_peer_gap"/> summarizes the gaps of ACL-based ingress filtering and Loose uRPF for SAV at provider interfaces in the scenarios of interest. ACL-based ingress filtering may effectively block spoofing traffic from provider AS, while appropriately allowing legitimate traffic, but it has high operational overhead. On the other hand, Loose uRPF correctly permits legitimate traffic, but it can also mistakenly allow spoofing traffic to pass through.</t>
        <t>In <xref target="provider_peer_gap"/>, Spoofing from Providers refers to a scenario in which spoofed traffic comes from provider ASes, either because they generate the spoofed traffic themselves or because they relay spoofed traffic originating from their customers' or peers' respective CCs. The spoofed prefix may belong to (originated by) any AS in the Internet other than the spoofing AS; it may even belong to an AS in the customer cone of the validating AS (example below).</t>
        <figure anchor="provider_peer_gap">
          <name>The gaps of ACL-based ingress filtering and Loose uRPF at provider interfaces in the scenarios of interest.</name>
          <artwork><![CDATA[
+------------------------+------------+---------------+
|   Traffic & Scenarios  |     ACL    |   Loose uRPF  |
+----------+-------------+------------+---------------+
|Legitimate|             |            |  Functions    |
|Traffic   |     --      |    High    |  as Expected  |
+----------+-------------+Operational +---------------+
|Spoofed   |   Spoofing  |  Overhead  |               |
|Traffic   |     from    |   (HOO)    |Improper Permit|
|          |   Providers |            |               |
+----------+-------------+------------+---------------+

'Functions as Expected' connotes the absence of improper block.
It also connotes low operational overhead.
]]></artwork>
        </figure>
        <t><xref target="provider-spoofing"/> illustrates a scenario of Spoofing from Providers and is used to analyze the gaps of ACL-based ingress filtering and Loose uRPF.</t>
        <figure anchor="provider-spoofing">
          <name>A scenario of source address spoofing from provider AS.</name>
          <artwork><![CDATA[
                          +----------------+
            Spoofer(P1')+-+    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P)       \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
    P6[AS 2, AS 1] /     |      \           \
   P1[AS 2, AS 1] /      |       \           \
        P2[AS 2] /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
             \           |             \           \
     P6[AS 1] \          |              \           \
      P1[AS 1] \         |               \           \
                \ (C2P)  | (C2P)    (C2P) \     (C2P) \
               +----------------+        +----------------+
               |  AS 1(P1, P6)  |        |    AS 5(P5)    |
               +----------------+        +----------------+
P1' is the spoofed source prefix P1 by the spoofer which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
        </figure>
        <t>In <xref target="provider-spoofing"/>, the spoofer which is inside of AS 3 or connected to AS 3 through other ASes forges the source addresses in P1 and sends the spoofing traffic to the destination addresses in P2 at AS 2. AS 1 is a customer of AS 2; AS 1 and AS 2 are customers of AS 4; AS 4 is a customer of AS 3; and AS 5 is a customer of both AS 3 and AS 4. Suppose AS 4 and AS 1 have deployed inter-domain SAV, while the other ASes have not.</t>
        <t>Using the ACL method in the form of a disallow (deny) list at the provider interface of AS 4 (facing AS 3) incurs a very high operational overhead, as mentioned in <xref target="SAV_methods"/>.</t>
        <t>Applying Loose uRPF at the provider interface of AS 4 (facing AS 3) can greatly reduce the operational overhead because it uses the FIB as the information source for allowed prefixes, and can adapt to changes in the network to prevent false positives (improper blocking). 
However, using Loose uRPF at AS 4 will naturally permit packets with source addresses in P1 (since P1 is present in the FIB) and hence will not prevent the improper permit of the spoofed packets from AS 3 <xref target="provider-spoofing"/>.
This is an expected limitation of Loose uRPF.</t>
      </section>
    </section>
    <section anchor="problem">
      <name>Problem Statement</name>
      <t><xref target="problem_sum"/> provides a comprehensive summary of the gap analysis in <xref target="gap"/>. It highlights the scenarios where existing inter-domain SAV mechanisms may encounter issues, including instances of improper blocking of legitimate traffic, improper permitting of spoofing traffic, or high operational overhead. The various entries in the table in <xref target="gap"/> can be traced back to the terminology and analyses presented in <xref target="gap"/>.</t>
      <figure anchor="problem_sum">
        <name>The scenarios where existing inter-domain SAV mechanisms may have improper block problem for legitimate traffic, improper permit problem for spoofing traffic, or high operational overhead.</name>
        <artwork><![CDATA[
+--------+----------+-----------+----------+-------+--------+
|Problems|    ACL   |   Strict  |  Loose   |FP-uRPF|EFP-uRPF|
|        |          |   uRPF    |  uRPF    |       |        |
|        |(CI or PI)|   (CI)    |  (PI)    | (CI)  | (CI)   |
+--------+----------+-----------+----------+-------+--------+
|Improper|  YES/NO  |    YES    |   NO**   |      YES       |
|Block   |(manual   | (LPP, HP) |          |    (LPP, HP)   |
|        |operator  |           |          |                |
|        |diligence)|           |          |                |
+--------+----------+-----------+----------+-------+--------+
|Improper|  YES/NO  |NO (no SCC)|   YES    |   NO (no SCC)  |
|Permit  |(manual   |YES (SCC)  |(Spoofing |   YES (SCC)    |
|        |operator  |           |  from    |                |
|        |diligence)|           |Providers)|                |
+--------+----------+-----------+----------+-------+--------+
|        |   YES    |                                       |
|  HOO   |  (Any    |                  NO                   |
|        |Scenarios)|                                       |
+--------+----------+---------------------------------------+
CI = Customer Interface
PI = Provider Interface
HOO = High Operational Overhead
LPP = Limited Propagation of a Prefix
HP = Hidden Prefix
SCC = Spoofing within a CC  
** Typically, an HP (like DSR prefixes) is hidden on the CIs
   but received on a provider or peer interface; 
   hence included in the FIB and that helps avoid
   improper block for Loose uRPF.      
]]></artwork>
      </figure>
      <t>The problem statement that results from the gap analysis can be expressed as follows. New proposals for SAV should aim to fill in the following problem areas (gaps) found in the currently standardized SAV methods (found in IETF RFCs):</t>
      <ul spacing="normal">
        <li>
          <t>Improper block: Existing uRPF-based mechanisms suffer from improper block (false positives) in two inter-domain scenarios: Limited Propagation of a Prefix (e.g., NO_EXPORT and some other selective-export scenarios) and Hidden Prefix (e.g., CDN/DSR scenario).</t>
        </li>
        <li>
          <t>Improper permit: With some existing uRPF-based SAV mechanisms, improper permit (false negatives) can happen on any type of interface (customer, lateral peer, or provider). Specifically, if the method relaxes the directionality constraint <xref target="RFC3704"/> <xref target="RFC8704"/>} to try to achieve zero improper blocking, the possibility of improper permit increases. (Note: It is recognized that unless there is full adoption of SAV in the CC of the interface in consideration, improper permit is not fully preventable in scenarios where source address spoofing occurs from within the CC, i.e., a prefix at one AS in the CC is spoofed from another AS in the same CC.)</t>
        </li>
        <li>
          <t>High operational overhead: ACL-based ingress SAV filtering introduces significant operational overhead, as it needs to update ACL rules manually to adapt to prefix or routing changes in a timely manner. The high operational overhead issue does not pertain to existing uRPF-based mechanisms.</t>
        </li>
      </ul>
      <t>The limitations of existing uRPF-based mechanisms are due to their exclusive reliance on BGP data. Although the algorithms themselves have evolved (e.g., <xref target="RFC8704"/>), the underlying input has remained unchanged, inherently constraining their accuracy in scenarios such as LPP and HP. With the availability of authoritative SAV-related information, plus the potential SAV-specific information (<xref target="terminology"/>), it would be possible to develop comprehensive new SAV algorithms or mechanisms to overcome the existing gaps.</t>
    </section>
    <section anchor="req">
      <name>Requirements for New Inter-domain SAV Mechanisms</name>
      <t>This section lists the requirements for any new inter-domain SAV mechanisms which may be proposed to bridge the technical gaps of existing mechanisms.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>Any new inter-domain SAV mechanism <bcp14>MUST NOT</bcp14> be worse than existing inter-domain SAV mechanisms in terms of improper block and improper permit. It <bcp14>SHOULD</bcp14> avoid improper blocking and improve the directionality of filtering (i.e., rejecting spoofed traffic).
The requirement applies for all directions of AS peering (customer, provider, and peer).</t>
      </section>
      <section anchor="reducing-operational-overhead">
        <name>Reducing Operational Overhead</name>
        <t>Any new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> be able to automatically adapt to network dynamics and asymmetric routing scenarios. Any such solution <bcp14>MUST</bcp14> have less operational overhead than ACL-based ingress SAV filtering.</t>
      </section>
      <section anchor="early-adopters-benefit-in-incrementalpartial-deployment">
        <name>Early Adopters Benefit in Incremental/Partial Deployment</name>
        <t>Any new solution <bcp14>MUST NOT</bcp14> assume pervasive adoption of the SAV method, the SAV-related information, or the SAV-specific information. It <bcp14>SHOULD</bcp14> benefit early adopters by providing effective protection from spoofing of source addresses even in partial deployment.</t>
      </section>
      <section anchor="providing-necessary-security-guarantee">
        <name>Providing Necessary Security Guarantee</name>
        <t>SAV-related information, e.g., routing information and RPKI objects, may be used to design more accurate SAV mechanisms. Such information must be protected during both its creation and dissemination (the BGP security community is already diligent about this). If any proposed new SAV method requires exchanging SAV-specific information between ASes, security mechanisms must exist to prevent malicious injection or alteration of the SAV-specific information.</t>
      </section>
      <section anchor="automatic-updates-to-the-sav-list-and-efficient-convergence">
        <name>Automatic Updates to the SAV List and Efficient Convergence</name>
        <t>Any new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> be responsive to changes in the SAV-related information or the SAV-specific information. It <bcp14>SHOULD</bcp14> automatically update the SAV list while achieving efficient re-convergence of the same.
In this context, convergence refers to the stabilization of the SAV lists on the AS-to-AS interfaces performing SAV.
It is essential that any new SAV mechanism converges to the correct updated SAV list in a proper manner, minimizing both improper block and improper permit during the process.</t>
      </section>
    </section>
    <section anchor="inter-domain-sav-scope">
      <name>Inter-domain SAV Scope</name>
      <t>Any new inter-domain SAV mechanisms should work in the same Internet Protocol (IP) address scenarios as existing SAV methods do. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: This includes both the global routing table based forwarding and Customer Edge (CE) site forwarding of VPN traffic.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): In this scenario, the focus is on the validation of the outer layer IP source address.</t>
        </li>
        <li>
          <t>Both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>The scope does not include:</t>
      <ul spacing="normal">
        <li>
          <t>Non-IP packets: This includes MPLS label-based forwarding and other non-IP-based forwarding.</t>
        </li>
      </ul>
      <t>In addition, any new inter-domain SAV mechanisms should avoid packet modification in the data plane. Existing architectures or protocols or mechanisms can be inherited by any such mechanism to achieve better SAV effectiveness.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>The SAV list will be generated based on SAV-related information and/or SAV-specific information. If the information is poisoned by attackers, the SAV list will be inaccurate. Legitimate packets may be dropped improperly or malicious traffic with spoofed source addresses may be permitted improperly. BGP routing security using available methods for the prevention, detection, and mitigation of route hijacks, route leaks, and AS_PATH manipulations should be deployed which leads to greater accuracy of the routing information (e.g., RIB and FIB) in the SAV-related information used for computing SAV lists.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Nan Geng<br/>
  Huawei<br/>
  Beijing,
  China <br/>
  Email: gengnan@huawei.com</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4271">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC5210">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC7908">
          <front>
            <title>Problem Definition and Classification of BGP Route Leaks</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="B. Dickson" initials="B." surname="Dickson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>A systemic vulnerability of the Border Gateway Protocol routing system, known as "route leaks", has received significant attention in recent years. Frequent incidents that result in significant disruptions to Internet routing are labeled route leaks, but to date a common definition of the term has been lacking. This document provides a working definition of route leaks while keeping in mind the real occurrences that have received significant attention. Further, this document attempts to enumerate (though not exhaustively) different types of route leaks based on observed events on the Internet. The aim is to provide a taxonomy that covers several forms of route leaks that have been observed and are of concern to the Internet user community as well as the network operator community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7908"/>
          <seriesInfo name="DOI" value="10.17487/RFC7908"/>
        </reference>
        <reference anchor="RFC9234">
          <front>
            <title>Route Leak Prevention and Detection Using Roles in UPDATE and OPEN Messages</title>
            <author fullname="A. Azimov" initials="A." surname="Azimov"/>
            <author fullname="E. Bogomazov" initials="E." surname="Bogomazov"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="K. Patel" initials="K." surname="Patel"/>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>Route leaks are the propagation of BGP prefixes that violate assumptions of BGP topology relationships, e.g., announcing a route learned from one transit provider to another transit provider or a lateral (i.e., non-transit) peer or announcing a route learned from one lateral peer to another lateral peer or a transit provider. These are usually the result of misconfigured or absent BGP route filtering or lack of coordination between autonomous systems (ASes). Existing approaches to leak prevention rely on marking routes by operator configuration, with no check that the configuration corresponds to that of the External BGP (eBGP) neighbor, or enforcement of the two eBGP speakers agreeing on the peering relationship. This document enhances the BGP OPEN message to establish an agreement of the peering relationship on each eBGP session between autonomous systems in order to enforce appropriate configuration on both sides. Propagated routes are then marked according to the agreed relationship, allowing both prevention and detection of route leaks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9234"/>
          <seriesInfo name="DOI" value="10.17487/RFC9234"/>
        </reference>
        <reference anchor="RFC7094">
          <front>
            <title>Architectural Considerations of IP Anycast</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="D. Oran" initials="D." surname="Oran"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo discusses architectural implications of IP anycast and provides some historical analysis of anycast use by various IETF protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7094"/>
          <seriesInfo name="DOI" value="10.17487/RFC7094"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="18" month="January" year="2026"/>
            <abstract>
              <t>   This document provides a gap analysis of existing intra-domain source
   address validation mechanisms, describes the fundamental problems,
   and defines the basic requirements for technical improvements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-21"/>
        </reference>
        <reference anchor="manrs" target="https://manrs.org/resources/training/tutorials/anti-spoofing/">
          <front>
            <title>Anti-Spoofing - Preventing traffic with spoofed source IP addresses (Module 5)</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="isoc" target="https://www.internetsociety.org/resources/doc/2015/addressing-the-challenge-of-ip-spoofing/">
          <front>
            <title>Addressing the challenge of IP spoofing</title>
            <author>
              <organization>Internet Society</organization>
            </author>
            <date year="2015"/>
          </front>
        </reference>
        <reference anchor="nist" target="https://doi.org/10.6028/NIST.SP.800-189r1.ipd">
          <front>
            <title>Border Gateway Protocol Security and Resilience</title>
            <author initials="K." surname="Sriram">
              <organization>NIST</organization>
            </author>
            <author initials="D." surname="Montgomery">
              <organization>NIST</organization>
            </author>
            <date year="2025"/>
          </front>
          <seriesInfo name="NIST SP 800-189r1" value=""/>
        </reference>
        <reference anchor="urpf" target="https://www.cisco.com/c/dam/en_us/about/security/intelligence/urpf.pdf">
          <front>
            <title>Unicast Reverse Path Forwarding Enhancements for the Internet Service Provider-Internet Service Provider Network Edge</title>
            <author>
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
        <reference anchor="SAC-004" target="https://www.icann.org/en/ssac/publications/documents/sac-004-security-and-stability-advisory-committee-securing-the-edge-17-10-2002-en">
          <front>
            <title>SAC 004 | Security and Stability Advisory Committee - Securing the Edge</title>
            <author initials="" surname="Paul Vixie">
              <organization>ISC</organization>
            </author>
            <date year="2002"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 549?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Jared Mauch, Barry Greene, Fang Gao, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Ron Bonica, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, John O'Brien, Roland Dobbins, Paul Vixie, Amir Herzberg, Jeffrey Haas, and Xueyan Song for their reviews, comments, and suggestions. 
Apologies to any others whose names the authors may have inadvertently missed mentioning.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
