<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.27 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wu-savnet-inter-domain-problem-statement-07" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.0 -->
  <front>
    <title abbrev="Inter-domain SAVNET Problem Statement">Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-problem-statement-07"/>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2023" month="March" day="25"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <t>This document provides the gap analysis of existing inter-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Source address validation (SAV) is crucial for protecting networks from source address spoofing attacks. The MANRS initiative advocates deploying SAV as close to the source as possible <xref target="manrs"/>, and access networks are the first line of defense against source address spoofing. However, access networks face various challenges in deploying SAV mechanisms due to different network environments, router vendors, and operational preferences. Hence, it is not feasible to deploy SAV at every network edge. Additional SAV mechanisms are needed at other levels of the network to prevent source address spoofing along the forwarding paths of the spoofed packets. The Source Address Validation Architecture (SAVA) <xref target="RFC5210"/> proposes a multi-fence approach that implements SAV at three levels of the network: access, intra-domain, and inter-domain.</t>
      <t>If a spoofing packet is not blocked at the originating access network, intra-domain and inter-domain SAV mechanisms can help block the packet along the forwarding path of the packet. As analyzed in <xref target="intra-domain"/>, intra-domain SAV for an AS can prevent a subnet of the AS from spoofing the addresses of other subnets as well as prevent incoming traffic to the AS from spoofing the addresses of the AS, without relying on the collaboration of other ASes. As complementrary, in scenarios where intra-domain SAV cannot work, inter-domain SAV leverages the collaboration among ASes to help block incoming spoofing packets in an AS which spoof the source addresses of other ASes.</t>
      <t>This document provides an analysis of inter-domain SAV. <xref target="exp-inter-sav"/> illustrates an example for inter-domain SAV. P1 is the source prefix of AS 1, and AS 4 sends spoofing packets with P1 as source addresses to AS 3 through AS 2. Assume AS 4 does not deploy intra-domain SAV, these spoofing packets cannot be blocked by AS 4. Although AS 1 can deploy intra-domain SAV to block incoming packets which spoof the addresses of AS 1, these spoofing traffic from AS 4 to AS 3 do not go through AS 1, so they cannot be blocked by AS 1. Inter-domain SAV can help in this scenario. If AS 1 and AS 2 deploy inter-domain SAV, AS 2 knows the correct incoming interface of packets with P1 as source address, and the spoofing packets can thus be blocked by AS 2 since they come from the incorrect interface.</t>
      <figure anchor="exp-inter-sav">
        <name>An example for illustrating inter-domain SAV</name>
        <artwork><![CDATA[
+------------+
|  AS 1(P1)  #
+------------+ \
                \            Spoofed Packets
              +-+#+--------+ with Source Addresses in P1 +------------+
              |    AS 2    #-----------------------------#    AS 4    |
              +-+#+--------+                             +------------+
                / 
+------------+ /
|    AS 3    #
+------------+
AS 4 sends spoofed packets with source addresses in P1 to AS 3 
  through AS 2.
If AS 1 and AS 2 deploy inter-domain SAV, the spoofed packets 
  can be blocked at AS 2.
]]></artwork>
      </figure>
      <t>There are many existing mechanisms for inter-domain SAV. This document analyzes them and attempts to answer: i) what are the technical gaps (<xref target="gap"/>), ii) what are the fundamental problems (<xref target="problem"/>), and iii) what are the practical requirements for the solution of these problems (<xref target="req"/>).</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV Rule:</dt>
        <dd>
          <t>The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        </dd>
        <dt>Improper Block:</dt>
        <dd>
          <t>The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Improper Permit:</dt>
        <dd>
          <t>The validation results that the packets with spoofed source addresses  are permitted improperly due to inaccurate SAV rules.</t>
        </dd>
      </dl>
    </section>
    <section anchor="existing-inter-domain-sav-mechanisms">
      <name>Existing Inter-domain SAV Mechanisms</name>
      <t>Inter-domain SAV is typically performed at the AS level and can be deployed at AS border routers (ASBR) to prevent source address spoofing. 
There are various mechanisms available to implement inter-domain SAV for anti-spoofing ingress filtering <xref target="manrs"/> <xref target="isoc"/>, which are reviewed in this section.</t>
      <ul spacing="normal">
        <li>ACL-based ingress filtering <xref target="RFC2827"/> <xref target="RFC3704"/>: ACL-based ingress filtering is a technique that relies on ACL rules to filter packets based on their source addresses. It can be applied at provider interfaces, customer interfaces, or peer interfaces of an AS, and is recommended to deploy at provider interfaces or customer interfaces <xref target="manrs"/> <xref target="nist"/>. At the provider interface, ACL-based ingress filtering can block source prefixes that are clearly invalid in the inter-domain routing context, such as suballocated or internal-only prefixes of customer ASes <xref target="nist"/>. At the customer interface, ACL-based ingress filtering can prevent customer ASes from spoofing source addresses of other ASes that are not reachable via the provider AS. It can be implemented at border routers or aggregation routers if border ACLs are not feasible <xref target="manrs"/>. However, ACL-based ingress filtering introduces significant operational overhead, as ACL rules need to be updated in a timely manner to reflect prefix or routing changes in the inter-domain routing system, which requires manual configuration to avoid improper block or improper permit.</li>
        <li>
          <t>uRPF-based machanisms: A class of SAV mechanisms are based on Unicast Reverse Path Forwarding (uRPF) <xref target="RFC3704"/>. The core idea of uRPF for SAV is to exploit the symmetry of inter-domain routing: in many cases, the best next hop for a destination is also the best previous hop for the source. In other words, if a packet arrives from a certain interface, the source address of that packet should be reachable via the same interface, according to the FIB. However, symmetry in routing does not always holds in practice, and to address cases where it does not hold, many enhancements and modes of uRPF are proposed. Different modes of uRPF have different levels of strictness and flexibility, and network operators can choose from them to suit particular network scenarios. We describe these modes as follows:
          </t>
          <ul spacing="normal">
            <li>Strict uRPF <xref target="RFC3704"/>: Strict uRPF is the most stringent mode, and it only permits packets that have a source address that is covered by a prefix in the FIB, and that the next hop for that prefix is the same as the incoming interface. This mode is recommended for deployment at customer interfaces that directly connect to an AS with suballocated address space, as it can prevent spoofing attacks from that AS or its downstream ASes <xref target="nist"/>.</li>
            <li>Loose uRPF <xref target="RFC3704"/>: Loose uRPF verifies that the source address of the packet is routable in the Internet by matching it with one or more prefixes in the FIB, regardless of which interface the packet arrives at. If the source address is not routable, Loose uRPF discards the packet. Loose uRPF is typically deployed at the provider interfaces of an AS to block packets with source addresses that are obviously disallowed, such as non-global prefixes (e.g., private addresses, multicast addresses, etc.) or the prefixes that belong to the customer AS itself <xref target="nist"/>.</li>
            <li>FP-uRPF <xref target="RFC3704"/>: FP-uRPF maintains a reverse path forwarding (RPF) list, which contains the prefixes and all their permissible routes including the optimal and alternative ones. It permits an incoming packet only if the packet's source address is encompassed in the prefixes of the RPF list and its incoming interface is included in the permissible routes of the corresponding prefix. FP-uRPF is recommended to be deployed at customer interfaces or peer interfaces, especially those that are connected to multi-homed customer ASes <xref target="nist"/>.</li>
            <li>Virtual routing and forwarding (VRF) uRPF <xref target="RFC4364"/> <xref target="urpf"/>: VRF uRPF uses a separate VRF table for each external BGP peer. A VRF table is a table that contains the prefixes and the routes that are advertised by a specific peer. VRF uRPF checks the source address of an incoming packet from an external BGP peer against the VRF table for that peer. If the source address matches one of the prefixes in the VRF table, VRF uRPF allows the packet to pass. Otherwise, it drops the packet. VRF uRPF can also be used as a way to implement BCP38 <xref target="RFC2827"/>, which is a set of recommendations to prevent IP spoofing. However, the operational feasibility of VRF uRPF as BCP38 has not been proven <xref target="manrs"/>.</li>
            <li>EFP-uRPF <xref target="RFC8704"/>: EFP-uRPF consists of two algorithms, algorithm A and algorithm B. EFP-uRPF is based on the idea that an AS can receive BGP updates for multiple prefixes that have the same origin AS at different interfaces. For example, this can happen when the origin AS is multi-homed and advertises the same prefixes to different providers. In this case, EFP-uRPF allows an incoming packet with a source address in any of those prefixes to pass on any of those interfaces. This way, EFP-uRPF can handle asymmetric routing scenarios where the incoming and outgoing interfaces for a packet are different. EFP-uRPF has not been implemented in practical networks yet, but BCP84 <xref target="RFC3704"/> <xref target="RFC8704"/> suggests using EFP-uRPF with algorithm B at customer interfaces of an AS. EFP-uRPF can also be used at peer interfaces of an AS.</li>
          </ul>
        </li>
        <li>Source-based remote triggered black hole (RTBH) filtering <xref target="RFC5635"/>: Source-based RTBH filtering enables the targeted dropping of traffic by specifying particular source addresses or address ranges. Source-based RTBH filtering uses uRPF, usually Loose uRPF, to check the source address of an incoming packet against the FIB. If the source address of the packet does not match or is not covered by any prefix in the FIB, or if the route for that prefix points to a black hole (i.e., Null0), Loose uRPF discards the packet. This way, source-based RTBH filtering can filter out attack traffic at specific devices (e.g., ASBR) in an AS based on source addresses, and improve the security of the network.</li>
        <li>Carrier Grade NAT (CGN): CGN is a network technology used by service providers to translate between private and public IPv4 addresses within their network. CGN enables service providers to assign private IPv4 addresses to their customer ASes instead of public, globally unique IPv4 addresses. The private side of the CGN faces the customer ASes, and when an incoming packet is received from a customer AS, CGN checks its source address. If the source address is included in the address list of the CGN's private side, CGN performs address translation. Otherwise, it forwards the packet without translation. However, since CGN cannot determine whether the source address of an incoming packet is spoofed or not, additional SAV mechanisms need to be implemented to prevent source address spoofing <xref target="manrs"/>.</li>
        <li>BGP origin validation (BGP-OV) <xref target="RFC6811"/>: Attackers can bypass uRPF-based SAV mechanisms by using prefix hijacking in combination with source address spoofing. By announcing a less-specific prefix that does not have a legitimate announcement, the attacker can deceive existing uRPF-based SAV mechanisms and successfully perform address spoofing. To protect against this type of attack, a combination of BGP-OV and uRPF-based mechanisms like FP-uRPF or EFP-uRPF is recommended <xref target="nist"/>. BGP routers can use ROA information, which is a validated list of {prefix, maximum length, origin AS}, to mitigate the risk of prefix hijacks in advertised routes.</li>
      </ul>
    </section>
    <section anchor="gap">
      <name>Gap Analysis</name>
      <t>Inter-domain SAV protects against source address spoofing attacks across all AS interfaces, including provider, customer, and peer interfaces. This section performs a gap analysis of existing SAV mechanisms at these interfaces to identify their technical shortcomings.</t>
      <section anchor="sav-at-provider-interface">
        <name>SAV at Provider Interface</name>
        <t>SAV at provider interface is recommended to deploy ACL-based ingress filtering and/or Loose uRPF to prevent spoofing source addresses from provider AS <xref target="nist"/> <xref target="RFC3704"/>, and can utilize source-based RTBH filtering to configure SAV rules remotely. In the following, we expose the problems with existing inter-domain SAV mechanisms at the provider interface with a reflection attack scenario.</t>
        <figure anchor="reflection-attack">
          <name>A scenario of the reflection attack from provider AS</name>
          <artwork><![CDATA[
                  +-----------+
  Attacker(P1') +-+  AS 3(P3) |
                  +---+/\+----+
                        |
                        |
                        | (C2P)
                  +-----------+
                  |  AS 4(P4) |
                  +/\+-----+/\+
                   /         \
                  /           \
           (C2P) /             \ (C2P)
         +-----------+      +-----------+
 Victim+-+  AS 1(P1) |      |  AS 2(P2) +-+Server
         +-----------+      +-----------+
  
 P1' is the spoofed source prefix P1 by the attacker 
 which is inside of AS 3 or connected to AS 3 through other ASes
]]></artwork>
        </figure>
        <t>As depicted in <xref target="reflection-attack"/>, a reflection attack is a type of cyber attack in which the attacker spoofs the victim's IP address (P1) and sends requests to server's IP address (P2) that respond to that type of request. The servers then send responses back to the victim, overwhelming its network resources. The arrows represent the commercial relationship between ASes. AS 3 is the provider of AS 4, and AS 4 is the provider of AS 1 and AS 2. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
        <t>By applying ACL-based ingress filtering at the provider interface of AS 4, the ACL rules can block any packets with spoofed source addresses from AS 3 in P1 and P2, thus stopping the attack. However, this approach incurs heavy operational overhead, as it requires network operators to update the ACL rules promptly based on changes in prefixes or topology of AS 1 and AS 2. Otherwise, it may cause improper block or improper permit of legitimate traffic.</t>
        <t>Source-based RTBH filtering allows for the deployment of SAV rules on AS 1 and AS 4 remotely. However, in order to avoid improper block or improper permit, the specified source addresses need to be updated in a timely manner, which incurs additional operational overhead.</t>
        <t>Loose uRPF can greatly reduce the operational overhead because it uses the local FIB as information source, and can adapt to changes in the network. However, it can improperly permit spoofed packets. In <xref target="reflection-attack"/>, Loose uRPF is enabled at AS 4's provider interface, while EFP-uRPF is enabled at AS 4's customer interfaces, following <xref target="RFC3704"/>. An attacker inside AS 3 or connected to it through other ASes may send packets with source addresses spoofing P1 to a server in AS 2 to attack the victim in AS 1. As AS 3 lacks deployment of inter-domain SAV, the attack packets will reach AS 4's provider interface. With Loose uRPF, AS 4 cannot block the attack packets at its provider interface, and thus resulting in improper permit.</t>
      </section>
      <section anchor="sav-at-customer-interface">
        <name>SAV at Customer Interface</name>
        <t>To prevent the spoofing of source addresses within a customer cone, operators can enable ACL-based ingress filtering, source-based RTBH filtering, and/or uRPF-based mechanisms at the customer interface, namely Strict uRPF, FP-uRPF, VRF uRPF, or EFP-uRPF. However, ACL-based ingress filtering and source-based RTBH filtering need to update SAV rules in a timely manner and have the same operational overhead as performing SAV at provider interfaces, while uRPF-based mechanisms may cause improper block problems in two inter-domain scenarios: limited propagation of prefixes and hidden prefixes. In the following, we show how uRPF-based mechanisms may block legitimate traffic.</t>
        <section anchor="limited-propagation-of-prefixes">
          <name>Limited Propagation of Prefixes</name>
          <t>In inter-domain networks, some prefixes may not be propagated to all domains due to various factors, such as NO_EXPORT or NO_ADVERTISE communities or other route filtering policies. This may cause asymmetric routing in the inter-domain context, which may lead to false positives when performing SAV with existing mechanisms. These mechanisms include EFP-uRPF, which we focus on in the following analysis, as well as trict uRPF, FP-uRPF, and VRF uRPF. All these mechanisms suffer from the same problem of improper block in this scenario.</t>
          <figure anchor="no-export">
            <name>Limited propagation of prefixes caused by NO_EXPORT</name>
            <artwork><![CDATA[
            +-----------------+
            |       AS 4      |
            +-+/\+-------+/\+-+
               /           \
              /             \  
    P1[AS 1] /               \ 
            /                 \
           / (C2P/P2P)   (C2P) \
  +----------------+     +----------------+
  |      AS 3      |     |      AS 2      |
  +-------+/\+-----+     +------+/\+------+
            \                    /
    P1[AS 1] \                  / P1[AS 1]
              \ (C2P)    (C2P) / NO_EXPORT
             +------------------+
             |     AS 1(P1)     +---P1
             +------------------+
]]></artwork>
          </figure>
          <t><xref target="no-export"/> presents a scenario where the limited propagation of prefixes occurs due to the NO_EXPORT community attribute. AS 1 is the customer of both AS 2 and AS 3, and AS 4 is the provider of AS 2. The relationship between AS 3 and AS 4 can be either customer-to-provider (C2P) or peer-to-peer (P2P). AS 1 advertises prefix P1 to its provider, AS 2 and AS 3. Upon receiving the route for prefix P1 from AS 1, AS 3 propagates it to AS 4. However, AS 2 does not propagate the route for prefix P1 to AS 4 because AS 1 adds the NO_EXPORT community attribute in the BGP advertisement sent to AS 2. In this scenario, AS 4 learns the route for prefix P1 only from AS 3. Suppose AS 1 and AS 4 have deployed inter-domain SAV while other ASes have not, and AS 4 have deployed EFP-uRPF at the customer interface.</t>
          <t>Assuming that AS 3 is the customer of AS 4, if AS 4 deploys EFP-uRPF with algorithm A at customer interfaces, it will require packets with source addresses in P1 to only arrive from AS 3. When AS 1 sends legitimate packets with source addresses in P1 to AS 4 through AS 2, AS 4 improperly blocks these packets. The same problem applies to Strict uRPF, FP-uRPF, and VRF uRPF. Although EFP-uRPF with algorithm B can avoid improper block in this case, network operators need to first determine whether limited prefix propagation exists before choosing the suitable EFP-uRPF algorithms, which adds more complexity and overhead to network operators. Furthermore, EFP-uRPF with algorithm B is not without its problems. For example, if AS 3 is the peer of AS 4, AS 4 will not learn the route of P1 from its customer interfaces. In such case, both EFP-uRPF with algorithm A and algorithm B have improper block problems.</t>
        </section>
        <section anchor="hidden-prefixes">
          <name>Hidden Prefixes</name>
          <t>Some servers' source addresses are not advertised through BGP to other ASes. These addresses are unknown to the inter-domain routing system and are called hidden prefixes. Legitimate traffic with these hidden prefixes may be dropped by existing inter-domain SAV mechanisms, such as Strict uRPF, FP-uRPF, VRF uRPF, or EFP-uRPF, because they do not match any known prefix.</t>
          <t>For example, Content Delivery Networks (CDN) use anycast <xref target="RFC4786"/> <xref target="RFC7094"/> to improve the quality of service by bringing content closer to users. An anycast IP address is assigned to devices in different locations, and incoming requests are routed to the closest location. Usually, only locations with multiple connectivity announce the anycast IP address through BGP. The CDN server receives requests from users and creates tunnels to the edge locations, where content is sent directly to users using direct server return (DSR). DSR requires servers in the edge locations to use the anycast IP address as the source address in response packets. However, these edge locations do not announce the anycast prefixes through BGP, so an intermediate AS with existing inter-domain SAV mechanisms may improperly block these response packets.</t>
          <figure anchor="dsr">
            <name>A Direct Server Return (DSR) scenario</name>
            <artwork><![CDATA[
                  +----------+
  Anycast Server+-+ AS 3(P3) |
                  +--+/\+----+
                       |
                       |
                       | (C2P)
                  +----------+
                  |   AS 4   |
                  +/\+----+/\+
                   /        \
                  /          \ 
           (C2P) /            \ (C2P)
      +-----------+          +-----------+
User+-+    AS 1   |          |    AS 2   +-+Edge Server
      +-----------+          +-----------+
    
  P3 is the anycast prefix and is only advertised by AS 3 through BGP
]]></artwork>
          </figure>
          <t><xref target="dsr"/> illustrates a DSR scenario where the anycast IP prefix P3 is only advertised by AS 3 through BGP. In this example, AS 3 is the provider of AS 4, and AS 4 is the provider of AS 1 and AS 2. AS 1 and AS 4 have deployed inter-domain SAV, while other ASes have not. When users in AS 1 send requests to the anycast destination IP, the forwarding path is AS 1-&gt;AS 4-&gt;AS 3. The anycast servers in AS 3 receive the requests and tunnel them to the edge servers in AS 2. Finally, the edge servers send the content to the users with source addresses in prefix P3. The reverse forwarding path is AS 2-&gt;AS 4-&gt;AS 1. Since AS 4 does not receive routing information for prefix P3 from AS 2, EFP-uRPF with algorithm A/B, and all other existing uRPF-based mechanisms at the customer interface of AS 4 facing AS 2 will improperly block the legitimate response packets from AS 2.</t>
        </section>
      </section>
      <section anchor="sav-at-peer-interface">
        <name>SAV at Peer Interface</name>
        <t>To prevent spoofing traffic from peer ASes, SAV at peer interfaces can enable ACL-based ingress filtering, source-based RTBH filtering, and/or employ one of the following uRPF-based SAV mechanisms: FP-uRPF, VRF uRPF, or EFP-uRPF. ACL-based ingress filtering and source-based RTBH filtering have high operational overhead and uRPF-based SAV mechanisms share the same improper block problems with the inter-domain SAV mechanisms when applied at provider interfaces or customer interfaces. The improper block problems occur in cases of limited propagation of prefixes and hidden prefixes. For brevity, we do not analyze these problems again here. Moreover, if we apply EFP-uRPF with algorithm B at peer or customer interfaces, we may encounter improper permit problems, as explained below.</t>
        <figure anchor="rfc-attack-peer">
          <name>A scenario of the reflection attack from peer AS</name>
          <artwork><![CDATA[
+-----------+    (P2P)    +-----------+     
|  AS 3(P3) +-------------+  AS 4(P4) |
+-----+-----+             +/\+-----+/\+
      |                    /         \
      +                   /           \
 Attacker(P1')     (C2P) /             \ (C2P)
                 +-----------+      +-----------+
         Victim+-+  AS 1(P1) |      |  AS 2(P2) +-+Server
                 +-----------+      +-----------+
  
P1' is the spoofed source prefix P1 by the attacker 
which is inside of AS 3 or connected to AS 3 through other ASes
]]></artwork>
        </figure>
        <t><xref target="rfc-attack-peer"/> depicts a scenario of a reflection attack originating from a peer AS. The direction of the commercial relationship between ASes is indicated by arrows. AS 3 is the lateral peer of AS 4, which is the provider of AS 1 and AS 2. Assuming that AS 1 and AS 4 have deployed inter-domain SAV and that EFP-uRPF with algorithm B is enabled at AS 4's peer and customer interfaces, a reflection attacker located in AS 3 or connected to it through other ASes can launch an attack on a victim in AS 1 by sending packets with spoofed source addresses in P1 to a server in AS 2. Since AS 3 does not perform SAV, the spoofed attack packets will arrive at the peer interface of AS 4, EFP-uRPF with algorithm B cannot block them since it allows packets with source addresses in prefix P1 on any of AS 4's peer interfaces.</t>
      </section>
    </section>
    <section anchor="problem">
      <name>Problem Statement</name>
      <t>Based on the above analysis, we conclude that existing inter-domain SAV mechanisms have limitations in asymmetric routing scenarios, and they may cause improper block or improper permit issues. They also incur high operational overhead when network routing changes dynamically.</t>
      <t>For ACL-based ingress filtering, network operators need to manually update ACL rules to adapt to network changes. Otherwise, they may cause improper block or improper permit issues. Manual updates induce high operational overhead, especially in networks with frequent policy and route changes. Source-based RTBH filtering has the similar problem as ACL-based ingress filtering.</t>
      <t>Strict uRPF and Loose uRPF are automatic SAV mechanisms, thus they do not need any manual effort to adapt to network changes. However, they have issues in scenarios with asymmetric routing. Strict uRPF may cause improper block problems when an AS is multi-homed and routes are not symmetrically announced to all its providers. This is because the local FIB may not include the asymmetric routes of the legitimate packets, and Strict uRPF only uses the local FIB to check the source addresses and incoming interfaces of packets. Loose uRPF may cause improper permit problems and fail to prevent source address spoofing. This is because it is oblivious to the incoming interfaces of packets.</t>
      <t>FP-uRPF and VRF uRPF improve Strict uRPF in multi-homing scenarios. However, they still have improper block issues in asymmetric routing scenarios. For example, they may not handle the cases of limited propagation of prefixes. These mechanisms use the local RIB to learn the source prefixes and their valid incoming interfaces. But the RIB may not have all the prefixes with limited propagation and their permissible incoming interfaces.</t>
      <t>EFP-uRPF allows the prefixes from the same customer cone at all customer interfaces. This solves the improper block problems of FP-uRPF and VRF uRPF in multi-homing scenarios. However, this approach also compromises partial protection against spoofing from the customer cone. EFP-uRPF may still have improper block problems when it does not learn legitimate source prefixes. For example, hidden prefixes are not learned by EFP-uRPF.</t>
      <t>Finally, existing inter-domain SAV mechanisms cannot work in all directions (i.e. interfaces) of ASes to achieve effective SAV. Network operators need to carefully analyze the network environment and choose approapriate SAV mechansim for each interface. This leads to additional operational and cognitive overhead, which can hinder the rate of adoption of inter-domain SAV.</t>
    </section>
    <section anchor="req">
      <name>Requirements for New Inter-domain SAV Mechanisms</name>
      <t>This section lists the requirements which can help bridge the technical gaps of existing inter-domain SAV mechanisms. These requirements serve as practical guidelines that can be met, in part or in full, by proposing new techniques.</t>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new inter-domain SAV mechanism <bcp14>MUST</bcp14> be able to adapt to dynamic networks and asymmetric routing scenarios automatically, instead of relying on manual update.</t>
      </section>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> improve the validation accuracy in all directions of ASes over existing inter-domain SAV mechanisms. It <bcp14>SHOULD</bcp14> avoid improper block and minimize improper permit so that the legitimate traffic from an AS will not be blocked and the spoofed traffic will be reduced as much as possible. To avoid improper block, ASes that deploy the new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> be able to acquire all the real data-plane forwarding paths.</t>
        <t>In cases where it is difficult to acquire all the real forwarding paths exactly, it is essential to obtain a minimal set of acceptable paths that cover the real forwarding paths to avoid improper block and minimize improper permit. Additionally, multiple sources of SAV-related information, such as RPKI ROA objects, ASPA objects, and collaborative advertisements of other ASes, can help reduce the set of acceptable paths and improve the validation accuracy.</t>
      </section>
      <section anchor="working-in-incrementalpartial-deployment">
        <name>Working in Incremental/Partial Deployment</name>
        <t>The new inter-domain SAV mechanism <bcp14>SHOULD NOT</bcp14> assume pervasive adoption and <bcp14>SHOULD</bcp14> provide effective protection for source addresses when it is partially deployed in the Internet. Not all AS border routers can support the new SAV mechanism at once, due to various constraints such as capabilities, versions, or vendors. The new SAV mechanism should not be less effective in protecting all directions of ASes under partial deployment than existing mechanisms.</t>
      </section>
    </section>
    <section anchor="inter-domain-sav-scope">
      <name>Inter-domain SAV Scope</name>
      <t>The new inter-domain SAV mechanism should work in the same scenarios as existing inter-domain SAV mechanisms. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>Native IP forwarding: This includes both global routing table forwarding and CE site forwarding of VPN.</li>
        <li>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): In this scenario, we focus on the validation of the outer layer IP address.</li>
        <li>Both IPv4 and IPv6 addresses.</li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>Non-IP packets: This includes MPLS label-based forwarding and other non-IP-based forwarding.</li>
      </ul>
      <t>In addition, the new inter-domain SAV mechanism should not modify data-plane packets. Existing architectures or protocols or mechanisms can be inherited by the new SAV mechanism to achieve better SAV effectiveness.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>SAV rules can be generated based on route information (FIB/RIB) or non-route information. If the information is poisoned by attackers, the SAV rules will be false. Legitimate packets may be dropped improperly or malicious traffic with spoofed source addresses may be permitted improperly. Route security should be considered by routing protocols. Non-route information, such as ASPA, should also be protected by corresponding mechanisms or infrastructure. If SAV mechanisms or protocols require information exchange, there should be some considerations on the avoidance of message alteration or message injection.</t>
      <t>The SAV procedure referred in this document modifies no field of packets. So, security considerations on data-plane are not in the scope of this document.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network.  As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment.  There are cases when this may create problems, e.g., with multihoming.  This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular.  This memo updates RFC 2827.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram">
              <organization/>
            </author>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery">
              <organization/>
            </author>
            <author fullname="J. Haas" initials="J." surname="Haas">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson">
              <organization/>
            </author>
            <author fullname="D. Senie" initials="D." surname="Senie">
              <organization/>
            </author>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC5210">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu">
              <organization/>
            </author>
            <author fullname="J. Bi" initials="J." surname="Bi">
              <organization/>
            </author>
            <author fullname="X. Li" initials="X." surname="Li">
              <organization/>
            </author>
            <author fullname="G. Ren" initials="G." surname="Ren">
              <organization/>
            </author>
            <author fullname="K. Xu" initials="K." surname="Xu">
              <organization/>
            </author>
            <author fullname="M. Williams" initials="M." surname="Williams">
              <organization/>
            </author>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses.  In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network.  This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation.  This memo defines an  Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen">
              <organization/>
            </author>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter">
              <organization/>
            </author>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers.  This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other.  Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC5635">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari">
              <organization/>
            </author>
            <author fullname="D. McPherson" initials="D." surname="McPherson">
              <organization/>
            </author>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well.  This  memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC6811">
          <front>
            <title>BGP Prefix Origin Validation</title>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra">
              <organization/>
            </author>
            <author fullname="J. Scudder" initials="J." surname="Scudder">
              <organization/>
            </author>
            <author fullname="D. Ward" initials="D." surname="Ward">
              <organization/>
            </author>
            <author fullname="R. Bush" initials="R." surname="Bush">
              <organization/>
            </author>
            <author fullname="R. Austein" initials="R." surname="Austein">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes.  More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so.  This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6811"/>
          <seriesInfo name="DOI" value="10.17487/RFC6811"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley">
              <organization/>
            </author>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist">
              <organization/>
            </author>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged.  These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet.  This document presents commentary and recommendations for distribution of services using anycast.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="RFC7094">
          <front>
            <title>Architectural Considerations of IP Anycast</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson">
              <organization/>
            </author>
            <author fullname="D. Oran" initials="D." surname="Oran">
              <organization/>
            </author>
            <author fullname="D. Thaler" initials="D." surname="Thaler">
              <organization/>
            </author>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil">
              <organization/>
            </author>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo discusses architectural implications of IP anycast and provides some historical analysis of anycast use by various IETF protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7094"/>
          <seriesInfo name="DOI" value="10.17487/RFC7094"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="intra-domain" target="https://datatracker.ietf.org/doc/draft-li-savnet-intra-domain-problem-statement/">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="manrs" target="https://www.manrs.org/netops/guide/antispoofing/">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="isoc" target="https://www.internetsociety.org/resources/doc/2015/addressing-the-challenge-of-ip-spoofing/">
          <front>
            <title>Addressing the challenge of IP spoofing</title>
            <author>
              <organization>Internet Society</organization>
            </author>
            <date year="2015"/>
          </front>
        </reference>
        <reference anchor="nist" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation">
          <front>
            <title>Resilient Interdomain Traffic Exchange: BGP Security and DDos Mitigation</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="urpf" target="https://www.cisco.com/c/dam/en_us/about/security/intelligence/urpf.pdf">
          <front>
            <title>Unicast Reverse Path Forwarding Enhancements for the Internet Service Provider-Internet Service Provider Network Edge</title>
            <author>
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Jared Mauch, Barry Greene, Fang Gao, Anthony Somerset, Kotikalapudi Sriram, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, John O'Brien, Roland Dobbins, etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
