<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-savnet-source-prefix-advertisement-05" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Intra-domain SPA">Source Prefix Advertisement for Intra-domain SAVNET</title>
    <seriesInfo name="Internet-Draft" value="draft-li-savnet-source-prefix-advertisement-05"/>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="October" day="15"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 51?>

<t>This document proposes a new mechanism for intra-domain source address validation (SAV), called Source Prefix Advertisement (SPA) for Intra-domain SAVNET (referred to as Intra-domain SPA). The mechanism enables intra-domain routers to automatically generate more accurate SAV rules by leveraging both routing information and SAV-specific information, including Source Entity Identifiers (SEIs) and Hidden Prefix Registration (HPR). Intra-domain SPA addresses scenarios such as asymmetric routing and hidden prefixes, improving the precision and reliability of source address validation.</t>
    </abstract>
  </front>
  <middle>
    <?line 55?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Existing unicast Reverse Path Forwarding (uRPF) mechanisms (e.g., strict uRPF) <xref target="RFC3704"/> may incorrectly drop legitimate data packets in scenarios involving asymmetric routing or hidden prefixes. Similarly, ACL-based ingress filtering <xref target="RFC2827"/> relies entirely on manual updates, which can be difficult to maintain (see <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/>).</t>
      <t>To improve accuracy and enable automatic updates, this document proposes a new intra-domain source address validation (SAV) mechanism, called Source Prefix Advertisement (SPA) for Intra-domain SAVNET (referred to as Intra-domain SPA). Intra-domain SPA allows routers in an intra-domain network to obtain and exchange SAV-specific information, including Source Entity Identifiers (SEIs) and Hidden Prefix Registration (HPR), in order to generate more precise SAV rules automatically.</t>
      <t>The reader is encouraged to be familiar with <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/> and <xref target="I-D.ietf-savnet-intra-domain-architecture"/>.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV Rule: The rule that describes the mapping relationship between a source address (prefix) and its valid incoming router interface(s).</t>
        <t>SAVNET Router: An intra-domain router that deploys Intra-domain SPA.</t>
        <t>Non-BGP Customer Network: A stub network connected to one or more routers of the AS for Internet connectivity. It only originates traffic and does not participate in BGP routing exchanges with the AS.</t>
        <t>Source Entity Identifier (SEI): A unique identifier assigned by an operator to represent a specific source entity, such as a non-BGP customer network or a set of hosts within a LAN. Each SEI is associated with one or more interfaces on the SAVNET routers that connect to the corresponding source entity.</t>
        <t>Hidden Prefix Registration (HPR): A registry mechanism maintained by the operator that records hidden prefixes (i.e., prefixes that are legitimately used by source entities but not visible in the intra-domain routing system). Each registered hidden prefix is bound to the SEI of the corresponding source entity.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="deployment-scope">
      <name>Deployment Scope</name>
      <t>Intra-domain SPA focuses solely on source address validation (SAV) performed on the external interfaces of an intra-domain network.
Each SAVNET router can automatically generate either an allowlist SAV rule (i.e., “Interface-based prefix allowlist” mode in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>) or a blocklist SAV rule (i.e., “Interface-based prefix blocklist” mode in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>) for a specific interface, depending on the role of the connected entity.</t>
      <ul spacing="normal">
        <li>
          <t>Interfaces facing a set of hosts: The SAVNET router generates an allowlist SAV rule that precisely covers the source address space legitimately used by the connected hosts.</t>
        </li>
        <li>
          <t>Interfaces facing a non-BGP customer network: The SAVNET router generates an allowlist SAV rule that precisely covers the source address space legitimately used by the non-BGP customer network.</t>
        </li>
        <li>
          <t>Interfaces facing an external AS: The SAVNET router generates a blocklist SAV rule that precisely covers the source address space that is valid only within the local AS and must not be used by external networks.</t>
        </li>
      </ul>
      <section anchor="incremental-deployment-considerations">
        <name>Incremental Deployment Considerations</name>
        <t>Intra-domain SPA can be deployed incrementally and still provide immediate security benefits within its deployment scope.
Each SAVNET router that supports Intra-domain SPA applies SAV rules on its external interfaces — whether facing hosts, non-BGP customer networks, or external ASes.</t>
        <t>When an interface is protected by Intra-domain SPA, spoofed traffic with unallowed source addresses cannot enter the domain through that interface.
As a result, even partial deployment (e.g., enabling Intra-domain SPA on a subset of external interfaces) effectively reduces the potential attack surface.</t>
        <t>By using allowlist SAV rules, SAVNET routers prevent connected hosts or non-BGP customer networks from sending packets with unauthorized source addresses.
By using blocklist SAV rules, SAVNET routers prevent connected external ASes from sending packets that use internal-use-only source addresses.</t>
        <t>As more SAVNET routers in the AS adopt Intra-domain SPA, the overall protection against source address spoofing attacks increases correspondingly, achieving progressive and cumulative deployment benefits without requiring full coverage from the outset.</t>
      </section>
    </section>
    <section anchor="sav-specific-information-in-intra-domain-spa">
      <name>SAV-specific Information in Intra-domain SPA</name>
      <t>Intra-domain SPA introduces two types of SAV-specific information that supplement routing information to enable accurate and automatic generation of SAV rules: Source Entity Identifier (SEI) and Hidden Prefix Registration (HPR). These two types of information serve complementary roles. SEI identifies the source entity that originates traffic, while HPR provides authoritative information about hidden prefixes legitimately used by the source entity.</t>
      <section anchor="source-entity-identifier-sei">
        <name>Source Entity Identifier (SEI)</name>
        <t>A Source Entity Identifier (SEI) is a unique identifier assigned by the network operator to represent a source entity, which can be either a non-BGP customer network or a set of hosts within a LAN connected to the SAVNET router.</t>
        <t>Each SEI is configured on one or more interfaces of SAVNET routers that directly connect to the corresponding source entity. This binding allows routers to explicitly indicate which entity a specific interface belongs to. The SEI is also associated with the operational account of the source entity in the operator’s hidden prefix registration database (HPRD), enabling accountability and controlled hidden prefix registration.</t>
        <t>SAVNET routers include the SEI in the routes they advertise within the domain. When other routers receive such route advertisements, they can identify that multiple routes belong to the same source entity by comparing SEIs. This capability allows routers to correlate and aggregate routes associated with the same entity, which is particularly useful in asymmetric routing scenarios.</t>
        <t>For example, when a non-BGP customer network connects to multiple routers and advertises different subsets of its prefixes, uRPF-based filtering may incorrectly drop return traffic due to path asymmetry. By using SEI, routers can recognize that these prefixes belong to the same source entity and thus generate a unified allowlist for that entity, avoiding false drops.</t>
      </section>
      <section anchor="hidden-prefix-registration-hpr">
        <name>Hidden Prefix Registration (HPR)</name>
        <t>A Hidden Prefix Registration (HPR) mechanism is maintained by the operator to handle hidden prefixes, i.e., prefixes legitimately used by source entities but not visible in the intra-domain routing system. Examples include:</t>
        <ul spacing="normal">
          <li>
            <t>A host that uses a source address not allocated by the operator for Direct Server Return (DSR) or similar applications.</t>
          </li>
          <li>
            <t>A non-BGP customer network that uses certain prefixes not announced to the operator.</t>
          </li>
        </ul>
        <t>To ensure authenticity, the operator maintains an HPR database that records each registered hidden prefix and binds it to the SEI of the corresponding source entity.
When a source entity wishes to register a hidden prefix, it must provide authorization proof that it is legitimately allowed to source traffic from that prefix.
One possible proof is a Traffic Origin Authorization (TOA) object <xref target="I-D.qin-sidrops-toa"/> signed by the prefix holder, which authorizes the operator’s AS to originate traffic from that prefix.</t>
        <t>SAVNET routers can query or periodically retrieve HPR data from the database. Upon learning that a hidden prefix is bound to a specific SEI, routers can augment their allowlists accordingly by ensuring that traffic from the source entity using the hidden prefix is accepted.</t>
      </section>
    </section>
    <section anchor="sav-rule-generation-procedure">
      <name>SAV Rule Generation Procedure</name>
      <t>This section describes two approaches for generating SAV rules in Intra-domain SPA.
The first approach relies solely on routing information and provides a simple baseline mechanism.
The second approach enhances accuracy by combining routing information with SAV-specific information, addressing asymmetric routing and hidden prefix scenarios.</t>
      <section anchor="sav-using-routing-information">
        <name>SAV Using Routing Information</name>
        <t>This subsection first describes how routing information can be used to generate more accurate SAV rules than existing intra-domain SAV mechanisms (e.g., strict uRPF and loose uRPF).</t>
        <t>Each SAVNET router connected to a set of hosts or a non-BGP customer network generates an allowlist SAV rule.
The procedure for allowlist generation is as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Extract prefixes from the Forwarding Information Base (FIB) or/and Routing Information Base (RIB):
Select all unique prefixes in the router’s FIB or/and RIB whose next-hop interface points toward the connected set of hosts or non-BGP customer network.</t>
          </li>
          <li>
            <t>Construct the allowlist:
Include these prefixes in the allowlist SAV rule for the corresponding interface.
The allowlist precisely defines the legitimate source address space that may appear on this interface.</t>
          </li>
        </ol>
        <t>Each SAVNET router connected to an external AS generates a blocklist SAV rule.
The procedure for blocklist generation is as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Extract internal-use prefixes:
Select all unique prefixes from the routing information learned via the intra-domain routing protocol that are originated within the local AS.</t>
          </li>
          <li>
            <t>Construct the blocklist:
Include these internal-use prefixes in the blocklist SAV rule for interfaces facing external ASes, preventing incoming traffic that uses internal source addresses.</t>
          </li>
        </ol>
        <t>This routing-based approach works effectively when routing visibility is complete and symmetric.
However, in scenarios involving asymmetric routing or hidden prefixes, the allowlist derived solely from routing information may not fully cover the legitimate source address space of a set of hosts or a non-BGP customer network.
As a result, legitimate packets may be improperly dropped.</t>
        <t>To improve SAV accuracy and avoid such improper blocking, the next subsection introduces an enhanced rule-generation procedure that combines routing information with SAV-specific information (i.e., Source Entity Identifier and Hidden Prefix Registration).</t>
      </section>
      <section anchor="sav-using-sav-specific-information-and-routing-information">
        <name>SAV Using SAV-specific Information and Routing Information</name>
        <t>This subsection describes an enhanced rule generation approach that leverages both routing information and SAV-specific information to improve SAV accuracy under conditions such as asymmetric routing and hidden prefixes.</t>
        <t>Each SAVNET router connected to an intra-domain stub network (e.g., a host network or a non-BGP customer network) generates an allowlist SAV rule as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Identify source entities:
For all source entities connected to the router, create a set of their corresponding Source Entity Identifier (SEI) values.
Denote this set as Set A.</t>
          </li>
          <li>
            <t>Associate prefixes with SEIs:
Using all available SAV-specific information, for each SEI value in Set A, obtain the set of source prefixes associated with the same SEI value.</t>
          </li>
          <li>
            <t>Construct the allowlist:
Include these prefixes in the allowlist SAV rule of the interface that connects to the corresponding source entity (i.e., the interface associated with the same SEI value).
This ensures that all valid source addresses of each connected source entity are properly permitted, even when the prefixes are not visible in the router’s routing information.</t>
          </li>
        </ol>
        <t>Each SAVNET router connected to an external AS generates a blocklist SAV rule as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Extract internal-use prefixes:
Select all unique prefixes from the routing information learned via the intra-domain routing protocol.</t>
          </li>
          <li>
            <t>Filter out externally valid prefixes:
Exclude prefixes that have an external AS number (ASN) listed as the origin in a valid Route Origin Authorization (ROA) or Transfer Origin Authorization (TOA).</t>
          </li>
          <li>
            <t>Construct the blocklist:
Include the remaining prefixes in the blocklist SAV rule for interfaces facing external ASes.
This prevents traffic from external ASes from using source addresses that are valid only within the local AS.</t>
          </li>
        </ol>
        <t>By incorporating SAV-specific information such as SEI-based mappings and hidden prefix registrations, this enhanced approach ensures comprehensive coverage of legitimate source prefixes while avoiding improper drops caused by asymmetric routing or incomplete routing visibility.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <section anchor="management-of-the-hidden-prefix-registration-database">
        <name>Management of the Hidden Prefix Registration Database</name>
        <t>The operator is responsible for maintaining a Hidden Prefix Registration Database (HPRD), which stores registered hidden prefixes and their associated Source Entity Identifiers (SEIs).
Each entity (e.g., the user of a host or the operator of a non-BGP customer network) registers the prefixes it legitimately uses and binds them to its assigned SEI.</t>
        <t>To ensure the authority and authenticity of the registration, each entity <bcp14>MUST</bcp14> provide valid proof of authorization for using the registered prefix.
Such proof can be verified by the operator, for example through a valid Traffic Origin Authorization (TOA) or other prefix holder-approved authorization mechanisms.</t>
        <t>The operator <bcp14>SHOULD</bcp14> enforce access control to the HPRD. Each registered entity <bcp14>MUST</bcp14> only be able to access and manage its own registration data.</t>
      </section>
      <section anchor="synchronization-with-savnet-routers">
        <name>Synchronization with SAVNET Routers</name>
        <t>SAVNET routers obtain SAV-specific information (including SEI and hidden prefix associations) from the HPRD through a secure synchronization mechanism.
Synchronization <bcp14>MAY</bcp14> be achieved using a pull or push model, depending on the operator’s network management system design.</t>
        <t>Operators <bcp14>SHOULD</bcp14> ensure that SAVNET routers are kept up-to-date with recent registration data to prevent either:</t>
        <ul spacing="normal">
          <li>
            <t>Improper blocking of legitimate traffic due to outdated information; or</t>
          </li>
          <li>
            <t>Improper permitting of spoofed traffic due to stale or revoked registrations.</t>
          </li>
        </ul>
        <t>Consistency across all routers participating in Intra-domain SPA is <bcp14>RECOMMENDED</bcp14> to maintain coherent SAV behavior across the network.</t>
      </section>
      <section anchor="sei-assignment-and-configuration">
        <name>SEI Assignment and Configuration</name>
        <t>Each interface connecting to a set of hosts or a non-BGP customer network <bcp14>MUST</bcp14> be configured with the SEI corresponding to that source entity.
Operators <bcp14>SHOULD</bcp14> automate SEI assignment through centralized management tools to avoid misconfiguration.</t>
        <t>When a source entity connects to multiple routers, all those routers <bcp14>MUST</bcp14> use the same SEI for the entity to enable proper prefix aggregation and identification across the network.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>The security considerations described in <xref target="I-D.ietf-savnet-intra-domain-problem-statement"/> and <xref target="I-D.ietf-savnet-intra-domain-architecture"/> also applies to this document.</t>
      <section anchor="authorization-of-hidden-prefix-registration">
        <name>Authorization of Hidden Prefix Registration</name>
        <t>Entities registering hidden prefixes in the HPRD <bcp14>MUST</bcp14> be properly authenticated using credentials issued by the operator.
Each entity <bcp14>MUST</bcp14> only be allowed to register prefixes it is authorized to use.</t>
        <t>To verify such authorization:</t>
        <ul spacing="normal">
          <li>
            <t>The operator <bcp14>SHOULD</bcp14> require a Traffic Origin Authorization (TOA) or equivalent proof.</t>
          </li>
          <li>
            <t>The HPRD <bcp14>MUST</bcp14> reject or revoke registrations that fail authorization or that have expired.</t>
          </li>
        </ul>
        <t>Operators <bcp14>SHOULD</bcp14> monitor registration activities to detect suspicious or fraudulent registrations.</t>
      </section>
      <section anchor="sei-management-and-consistency">
        <name>SEI Management and Consistency</name>
        <t>Incorrect or conflicting SEI assignments can lead to improper SAV rule generation and may open attack vectors for traffic spoofing.
Operators <bcp14>MUST</bcp14> ensure:</t>
        <ul spacing="normal">
          <li>
            <t>Each SEI is uniquely assigned within the domain (i.e., Autonomous System).</t>
          </li>
          <li>
            <t>SEI values are consistently configured on all interfaces connected to the same source entity.</t>
          </li>
          <li>
            <t>Unauthorized modification of SEI configuration is prevented through access control and configuration management systems.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-general-sav-capabilities" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-general-sav-capabilities-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-general-sav-capabilities.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-02"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-problem-statement-19" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-problem-statement.xml">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="3" month="October" year="2025"/>
            <abstract>
              <t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the basic requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-19"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-intra-domain-architecture-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="13" month="October" year="2025"/>
            <abstract>
              <t>This document specifies the architecture of intra-domain SAVNET, which aims to achieve accurate source address validation (SAV) at external interfaces of an intra-domain network in an automated manner. It describes the conceptual design of intra-domain SAVNET, along with its use cases and design requirements, to help ensure that the intended objectives are met.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-architecture-03"/>
        </reference>
        <reference anchor="I-D.qin-sidrops-toa" target="https://datatracker.ietf.org/doc/html/draft-qin-sidrops-toa-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.qin-sidrops-toa.xml">
          <front>
            <title>A Profile for Traffic Origin Authorizations (TOAs)</title>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Ben Maddison" initials="B." surname="Maddison">
              <organization>Workonline</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <date day="25" month="June" year="2025"/>
            <abstract>
              <t>This document defines a standard profile for Traffic Origin Authorizations (TOAs), a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI). A TOA is a digitally signed object that provides a means of verifying that an IP address block holder has authorized an Autonomous System (AS) to originate traffic using source IP addresses within the address block.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-qin-sidrops-toa-00"/>
        </reference>
      </references>
    </references>
    <?line 282?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
