<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.31 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wu-savnet-inter-domain-problem-statement-08" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="Inter-domain SAVNET Problem Statement">Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-problem-statement-08"/>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="K." surname="Sriram" fullname="Kotikalapudi Sriram">
      <organization abbrev="USA NIST">USA National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <city>Gaithersburg</city>
          <region>MD</region>
          <country>United States of America</country>
        </postal>
        <email>ksriram@nist.gov</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2023" month="June" day="01"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <t>This document provides the gap analysis of existing inter-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Source address validation (SAV) is crucial for protecting networks from source address spoofing attacks. The MANRS initiative advocates deploying SAV as close to the source as possible <xref target="manrs"/>, and access networks are the first line of defense against source address spoofing. However, access networks face various challenges in deploying SAV mechanisms due to different network environments, router vendors, and operational preferences. Hence, it is not feasible to deploy SAV at every network edge. Additional SAV mechanisms are needed at other levels of the network to prevent source address spoofing along the forwarding paths of the spoofed packets. The Source Address Validation Architecture (SAVA) <xref target="RFC5210"/> proposes a multi-fence approach that implements SAV at three levels of the network: access, intra-domain, and inter-domain.</t>
      <t>If a spoofing packet is not blocked at the originating access network, intra-domain and inter-domain SAV mechanisms can help block the packet along the forwarding path of the packet. As analyzed in <xref target="intra-domain-ps"/>, intra-domain SAV for an AS can prevent a subnet of the AS from spoofing the addresses of other subnets as well as prevent incoming traffic to the AS from spoofing the addresses of the AS, without relying on the collaboration of other ASes. As complementrary, in scenarios where intra-domain SAV cannot work, inter-domain SAV leverages the collaboration among ASes to help block incoming spoofing packets in an AS which spoof the source addresses of other ASes.</t>
      <t>This document provides an analysis of inter-domain SAV. <xref target="exp-inter-sav"/> illustrates an example for inter-domain SAV. P1 is the source prefix of AS 1, and AS 4 sends spoofing packets with P1 as source addresses to AS 3 through AS 2. Assume AS 4 does not deploy intra-domain SAV, these spoofing packets cannot be blocked by AS 4. Although AS 1 can deploy intra-domain SAV to block incoming packets which spoof the addresses of AS 1, these spoofing traffic from AS 4 to AS 3 do not go through AS 1, so they cannot be blocked by AS 1. Inter-domain SAV can help in this scenario. If AS 1 and AS 2 deploy inter-domain SAV, AS 2 knows the correct incoming interface of packets with P1 as source addresses, and the spoofing packets can thus be blocked by AS 2 since they come from the incorrect interface.</t>
      <figure anchor="exp-inter-sav">
        <name>An example for illustrating inter-domain SAV.</name>
        <artwork><![CDATA[
+------------+
|  AS 1(P1)  #
+------------+ \
                \            Spoofed Packets
              +-+#+--------+ with Source Addresses in P1 +------------+
              |    AS 2    #-----------------------------#    AS 4    |
              +-+#+--------+                             +------------+
                / 
+------------+ /
|    AS 3    #
+------------+
AS 4 sends spoofed packets with source addresses in P1 to AS 3 
through AS 2.
If AS 1 and AS 2 deploy inter-domain SAV, the spoofed packets 
can be blocked at AS 2.
]]></artwork>
      </figure>
      <t>There are many existing mechanisms for inter-domain SAV. This document analyzes them and attempts to answer: i) what are the technical gaps (<xref target="gap"/>), ii) what are the fundamental problems (<xref target="problem"/>), and iii) what are the practical requirements for the solution of these problems (<xref target="req"/>).</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV Rule:</dt>
        <dd>
          <t>The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        </dd>
        <dt>Improper Block:</dt>
        <dd>
          <t>The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Improper Permit:</dt>
        <dd>
          <t>The validation results that the packets with spoofed source addresses  are permitted improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Real forwading paths:</dt>
        <dd>
          <t>The paths that the legitimate traffic goes through in the data plane.</t>
        </dd>
      </dl>
    </section>
    <section anchor="existing-inter-domain-sav-mechanisms">
      <name>Existing Inter-domain SAV Mechanisms</name>
      <t>Inter-domain SAV is typically performed at the AS level and can be deployed at AS border routers (ASBRs) to prevent source address spoofing. There are various mechanisms available to implement inter-domain SAV for anti-spoofing ingress filtering <xref target="manrs"/> <xref target="isoc"/>, which are reviewed in this section.</t>
      <ul spacing="normal">
        <li>ACL-based ingress filtering <xref target="RFC2827"/> <xref target="RFC3704"/>: ACL-based ingress filtering is a technique that relies on ACL rules to filter packets based on their source addresses. It can be applied at provider interfaces, peer interfaces, or customer interfaces of an AS, and is recommended to deploy at provider interfaces or customer interfaces <xref target="manrs"/> <xref target="nist"/>. At the provider interfaces, ACL-based ingress filtering can block source prefixes that are clearly invalid in the inter-domain routing context, such as suballocated or internal-only prefixes of customer ASes <xref target="nist"/>. At the customer interfaces, ACL-based ingress filtering can prevent customer ASes from spoofing source addresses of other ASes that are not reachable via the provider AS. It can be implemented at border routers or aggregation routers if border ACLs are not feasible <xref target="manrs"/>. However, ACL-based ingress filtering introduces significant operational overhead, as ACL rules need to be updated in a timely manner to reflect prefix or routing changes in the inter-domain routing system, which requires manual configuration to avoid improper block or improper permit.</li>
        <li>
          <t>uRPF-based machanisms: A class of SAV mechanisms are based on Unicast Reverse Path Forwarding (uRPF) <xref target="RFC3704"/>. The core idea of uRPF for SAV is to exploit the symmetry of inter-domain routing: in many cases, the best next hop for a destination is also the best previous hop for the source. In other words, if a packet arrives from a certain interface, the source address of that packet should be reachable via the same interface, according to the FIB. However, symmetry in routing does not always holds in practice, and to address cases where it does not hold, many enhancements and modes of uRPF are proposed. Different modes of uRPF have different levels of strictness and flexibility, and network operators can choose from them to suit particular network scenarios. We describe these modes as follows:
          </t>
          <ul spacing="normal">
            <li>Strict uRPF <xref target="RFC3704"/>: Strict uRPF is the most stringent mode, and it only permits packets that have a source address that is covered by a prefix in the FIB, and that the next hop for that prefix is the same as the incoming interface. This mode is recommended for deployment at customer interfaces that directly connect to an AS with suballocated address space, as it can prevent spoofing attacks from that AS or its downstream ASes <xref target="nist"/>.</li>
            <li>Loose uRPF <xref target="RFC3704"/>: Loose uRPF verifies that the source address of the packet is routable in the Internet by matching it with one or more prefixes in the FIB, regardless of which interface the packet arrives at. If the source address is not routable, Loose uRPF discards the packet. Loose uRPF is typically deployed at the provider interfaces of an AS to block packets with source addresses that are obviously disallowed, such as non-global prefixes (e.g., private addresses, multicast addresses, etc.) or the prefixes that belong to the customer AS itself <xref target="nist"/>.</li>
            <li>FP-uRPF <xref target="RFC3704"/>: FP-uRPF maintains a reverse path forwarding (RPF) list, which contains the prefixes and all their permissible routes including the optimal and alternative ones. It permits an incoming packet only if the packet's source address is encompassed in the prefixes of the RPF list and its incoming interface is included in the permissible routes of the corresponding prefix. FP-uRPF is recommended to be deployed at customer interfaces or peer interfaces, especially those that are connected to multi-homed customer ASes <xref target="nist"/>.</li>
            <li>Virtual routing and forwarding (VRF) uRPF <xref target="RFC4364"/> <xref target="urpf"/>: VRF uRPF uses a separate VRF table for each external BGP peer. A VRF table is a table that contains the prefixes and the routes that are advertised by a specific peer. VRF uRPF checks the source address of an incoming packet from an external BGP peer against the VRF table for that peer. If the source address matches one of the prefixes in the VRF table, VRF uRPF allows the packet to pass. Otherwise, it drops the packet. VRF uRPF can also be used as a way to implement BCP38 <xref target="RFC2827"/>, which is a set of recommendations to prevent IP spoofing. However, the operational feasibility of VRF uRPF as BCP38 has not been proven <xref target="manrs"/>.</li>
            <li>EFP-uRPF <xref target="RFC8704"/>: EFP-uRPF consists of two algorithms, algorithm A and algorithm B. EFP-uRPF is based on the idea that an AS can receive BGP updates for multiple prefixes that have the same origin AS at different interfaces. For example, this can happen when the origin AS is multi-homed and advertises the same prefixes to different providers. In this case, EFP-uRPF allows an incoming packet with a source address in any of those prefixes to pass on any of those interfaces. This way, EFP-uRPF can handle asymmetric routing scenarios where the incoming and outgoing interfaces for a packet are different. EFP-uRPF has not been implemented in practical networks yet, but BCP84 <xref target="RFC3704"/> <xref target="RFC8704"/> suggests using EFP-uRPF with algorithm B at customer interfaces of an AS. EFP-uRPF can also be used at peer interfaces of an AS.</li>
          </ul>
        </li>
        <li>Source-based remote triggered black hole (RTBH) filtering <xref target="RFC5635"/>: Source-based RTBH filtering enables the targeted dropping of traffic by specifying particular source addresses or address ranges. Source-based RTBH filtering uses uRPF, usually Loose uRPF, to check the source address of an incoming packet against the FIB. If the source address of the packet does not match or is not covered by any prefix in the FIB, or if the route for that prefix points to a black hole (i.e., Null0), Loose uRPF discards the packet. This way, source-based RTBH filtering can filter out attack traffic at specific devices (e.g., ASBR) in an AS based on source addresses, and improve the security of the network.</li>
        <li>Carrier Grade NAT (CGN): CGN is a network technology used by service providers to translate between private and public IPv4 addresses within their network. CGN enables service providers to assign private IPv4 addresses to their customer ASes instead of public, globally unique IPv4 addresses. The private side of the CGN faces the customer ASes, and when an incoming packet is received from a customer AS, CGN checks its source address. If the source address is included in the address list of the CGN's private side, CGN performs address translation. Otherwise, it forwards the packet without translation. However, since CGN cannot determine whether the source address of an incoming packet is spoofed or not, additional SAV mechanisms need to be implemented to prevent source address spoofing <xref target="manrs"/>.</li>
        <li>BGP origin validation (BGP-OV) <xref target="RFC6811"/>: Attackers can bypass uRPF-based SAV mechanisms by using prefix hijacking in combination with source address spoofing. By announcing a less-specific prefix that does not have a legitimate announcement, the attacker can deceive existing uRPF-based SAV mechanisms and successfully perform address spoofing. To protect against this type of attack, a combination of BGP-OV and uRPF-based mechanisms like FP-uRPF or EFP-uRPF is recommended <xref target="nist"/>. BGP routers can use ROA information, which is a validated list of {prefix, maximum length, origin AS}, to mitigate the risk of prefix hijacks in advertised routes.</li>
      </ul>
    </section>
    <section anchor="gap">
      <name>Gap Analysis</name>
      <t>Inter-domain SAV is essential in preventing source address spoofing attacks across all AS interfaces, including those of providers, peers, and customers. An ideal inter-domain SAV mechanism <bcp14>SHOULD</bcp14> block all spoofing traffic while permitting legitimate traffic in all scenarios. However, in some cases, existing SAV mechanisms may unintentionally block legitimate traffic or permit spoofing traffic. This section aims to conduct a gap analysis of existing SAV mechanisms used in the corresponding interfaces of these scenarios to identify their technical limitations.</t>
      <section anchor="sav-at-providerpeer-interfaces">
        <name>SAV at Provider/Peer Interfaces</name>
        <t>SAV is used at provider/peer interfaces to validate traffic entering the customer cone, including both legitimate and spoofing traffic. To prevent spoofed source addresses from the provider/peer AS, ACL-based ingress filtering and/or Loose uRPF can be deployed <xref target="nist"/>. In addition, source-based RTBH filtering can be used to remotely configure SAV rules.</t>
        <figure anchor="provider_peer_gap">
          <name>The gaps of ACL-based ingress filtering, Source-based RTBH filtering, and Loose uRPF in the corresponding scenarios.</name>
          <artwork><![CDATA[
+--------------------+------------+---------------+
|      Scenarios     |ACL & S/RTBH|   Loose uRPF  |
+----------+---------+------------+---------------+
|Legitimate|   All   |            |     Normal    |
|Traffic   |Scenarios|    High    |               |
+----------+---------+Operational +---------------+
|Spoofing  |   RA    |  Overhead  |               |
|Traffic   +---------+            |Improper Permit|
|          |   DA    |            |               |
+----------+---------+------------+---------------+
S/RTBH: Source-based RTBH filtering.
"RA" represents a scenario of the reflection attacks from 
provider/peer AS. 
"DA" represents a scenario of the direct spoofing attacks from 
provider/peer AS.
"Normal" represents the inter-domain SAV mechanism does not cause 
improper block for legitimate traffic or improper permit for spoofing 
traffic in the corresponding scenarios, and has low operational 
overhead.
]]></artwork>
        </figure>
        <t><xref target="provider_peer_gap"/> summarizes the gaps of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF for SAV at provider/peer interfaces in the corresponding scenarios. ACL-based ingress filtering and source-based RTBH filtering effectively block spoofing traffic from the reflection attacks or direct spoofing attacks originating from provider/peer AS, while appropriately allowing legitimate traffic. However, these methods may come with a high operational overhead. On the other hand, Loose uRPF correctly permits legitimate traffic, but it can also mistakenly allow spoofing traffic to pass through.</t>
        <t>In the following, we expose the limitations of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF for SAV at provider/peer interfaces in scenarios involving the reflection attacks or direct spoofing atacks.</t>
        <figure anchor="reflection-attack">
          <name>A scenario of the reflection attacks from provider/peer AS.</name>
          <artwork><![CDATA[
                                  +----------------+
                   Attacker(P1')+-+    AS 3(P3)    |
                                  +-+/\----+/\+----+
                                     /       \
                                    /         \ 
                                   /           \
                                  / (C2P/P2P)   \
                         +----------------+      \
                         |    AS 4(P4)    |       \
                         ++/\+--+/\+--+/\++        \
            P6[AS 1, AS 2] /     |      \           \
                 P2[AS 2] /      |       \           \
                         /       |        \           \
                        / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
        +----------------+       |          \           \    
Server+-+    AS 2(P2)    |       | P1[AS 1]  \           \
        +----------+/\+--+       | P6[AS 1]   \           \
            P6[AS 1] \           | NO_EXPORT   \           \
             P1[AS 1] \          |              \           \
             NO_EXPORT \         |               \           \
                        \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                      +----------------+        +----------------+
              Victim+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                      +----------------+        +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
        </figure>
        <figure anchor="direct-attack">
          <name>A scenario of the direct spoofing attacks from provider/peer AS.</name>
          <artwork><![CDATA[
                          +----------------+
           Attacker(P2')+-+    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P/P2P)   \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
    P6[AS 1, AS 2] /     |      \           \
         P2[AS 2] /      |       \           \
                 /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
    P6[AS 1] \           | NO_EXPORT   \           \
     P1[AS 1] \          |              \           \
     NO_EXPORT \         |               \           \
                \ (C2P)  | (C2P)    (C2P) \     (C2P) \
              +----------------+        +----------------+
      Victim+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
              +----------------+        +----------------+
P2' is the spoofed source prefix P2 by the attacker which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
        </figure>
        <t>The scenarios of source address spoofing attacks from the provider/peer AS are depicted in <xref target="reflection-attack"/> and <xref target="direct-attack"/>. In the case of <xref target="reflection-attack"/>, the attacker spoofs the victim's IP address (P1) and sends requests to servers' IP address (P2) that respond to such requests. The servers then send overwhelming responses back to the victim, exhausting its network resources. Conversely, <xref target="direct-attack"/> showcases a direct spoofing attack, where the attacker spoofs another source address (P2) and directly targets the victim's IP address (P1), overwhelming its network resources. The arrows in <xref target="reflection-attack"/> and <xref target="direct-attack"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
        <t>By applying ACL-based ingress filtering at the provider/peer interface of AS 4, the ACL rules can block any packets with spoofed source addresses from AS 3 in P1 and P2, effectively preventing reflection or direct spoofing attacks. However, this approach incurs heavy operational overhead, as it requires network operators to update the ACL rules promptly based on changes in prefixes or topology of AS 1 and AS 2. Otherwise, it may cause improper block or improper permit of legitimate traffic.</t>
        <t>Source-based RTBH filtering allows for the deployment of SAV rules on AS 1 and AS 4 remotely. However, in order to avoid improper block or improper permit, the specified source addresses need to be updated in a timely manner, which incurs additional operational overhead.</t>
        <t>Loose uRPF can greatly reduce the operational overhead because it uses the local FIB as information source, and can adapt to changes in the network. However, it can improperly permit spoofed packets. In <xref target="reflection-attack"/> and <xref target="direct-attack"/>, Loose uRPF is enabled at AS 4's provider/peer interface, while EFP-uRPF is enabled at AS 4's customer interfaces, following <xref target="RFC3704"/>. An attacker inside AS 3 or connected to it through other ASes may send packets with source addresses spoofing P1 to a server in AS 2 to attack the victim in AS 1 or send packets with source addresses spoofing P2 and destimation addresses in P1 to directly attack the victim in AS 1. As AS 3 lacks deployment of inter-domain SAV, the attack packets will reach AS 4's provider/peer interface. With Loose uRPF, AS 4 cannot block the attack packets at its provider/peer interface, and thus resulting in improper permit.</t>
      </section>
      <section anchor="sav-at-customer-interfaces">
        <name>SAV at Customer Interfaces</name>
        <t>To prevent the spoofing of source addresses within a customer cone, operators can enable ACL-based ingress filtering, source-based RTBH filtering, and/or uRPF-based mechanisms at the customer interface, namely Strict uRPF, FP-uRPF, VRF uRPF, or EFP-uRPF. However, ACL-based ingress filtering and source-based RTBH filtering need to update SAV rules in a timely manner and have the same operational overhead as performing SAV at provider/peer interfaces, while uRPF-based mechanisms may cause improper block problems in two inter-domain scenarios: limited propagation of prefixes and hidden prefixes. In the following, we show how uRPF-based mechanisms may block legitimate traffic or permit spoofing traffic in the corresponding scenarios.</t>
        <figure anchor="customer_gap">
          <name>The gaps of ACL-based ingress filtering, Source-based RTBH filtering, Strict uRPF, FP-uRPF, VRF uRPF, and EFP-uRPF in the corrresponding scenarios.</name>
          <artwork><![CDATA[
+------------------+------------+-----------+-------+--------+--------+
|    Scenarios     |ACL & S/RTBH|Strict uRPF|FP-uRPF|VRF uRPF|EFP-uRPF|
+----------+-------+------------+-----------+-------+--------+--------+
|Legitimate|  LPP  |            |                                     |
|Traffic   +-------+            |            Improper Block           |
|          |  HP   |    High    |                                     |
+----------+-------+Operational +----------------------------+--------+
|Spoofing  |  RA   |  Overhead  |                            |Improper|
|Traffic   +-------+            |          Normal            |Permit  |
|          |  DA   |            |                            |        |
+----------+-------+------------+----------------------------+--------+
S/RTBH: Source-based RTBH filtering.
"LPP" represents a scenario of limited propagation of prefixes. 
"HP" represents a scenario of hidden prefixes.
"RA" represents a scenario of the reflection attacks within 
a customer cone.
"DA" represents a scenario of the direct spoofing attacks within 
a customer cone. 
"Normal" represents the inter-domain SAV mechanism does not cause 
improper block for legitimate traffic or improper permit for spoofing 
traffic in the corresponding scenarios, and has low operational 
overhead.
]]></artwork>
        </figure>
        <t><xref target="customer_gap"/> provides an overview of the gaps associated with ACL-based ingress filtering, source-based RTBH filtering, Strict uRPF, FP-uRPF, VRF uRPF, and EFP-uRPF for SAV at customer interfaces in the corresponding scenarios. Both ACL-based ingress filtering and source-based RTBH filtering have high operational overhead as performing SAV at provider/peer interfaces. Strict uRPF, FP-uRPF, VRF uRPF, and EFP-uRPF, on the other hand, may incorrectly block legitimate traffic in the scenarios of limited propagation of prefixes or hidden prefixes. Furthermore, in scenarios involving reflection or direct spoofing attacks, EFP-uRPF may inadvertently permit spoofing traffic.</t>
        <t>In the following, we illustrate the limitations of Strict uRPF, FP-uRPF, VRF uRPF, and EFP-uRPF for SAV at customer interfaces in scenarios of limited propagation of prefixes or hidden prefixes.</t>
        <section anchor="limited-propagation-of-prefixes">
          <name>Limited Propagation of Prefixes</name>
          <t>In inter-domain networks, some prefixes may not be propagated to all domains due to various factors, such as NO_EXPORT or NO_ADVERTISE communities or other route filtering policies. This may cause asymmetric routing in the inter-domain context, which may lead to false positives when performing SAV with existing mechanisms. These mechanisms include EFP-uRPF, which we focus on in the following analysis, as well as Strict uRPF, FP-uRPF, and VRF uRPF. All these mechanisms suffer from the same problem of improper block in this scenario.</t>
          <figure anchor="no-export">
            <name>Limited propagation of prefixes caused by NO_EXPORT.</name>
            <artwork><![CDATA[
                          +----------------+
                          |    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P)       \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
    P6[AS 1, AS 2] /     |      \           \
         P2[AS 2] /      |       \           \
                 /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
    P6[AS 1] \           | NO_EXPORT   \           \
     P1[AS 1] \          |              \           \
     NO_EXPORT \         |               \           \
                \ (C2P)  | (C2P/P2P)(C2P) \     (C2P) \
              +----------------+        +----------------+
              |  AS 1(P1, P6)  |        |    AS 5(P5)    |
              +----------------+        +----------------+
]]></artwork>
          </figure>
          <t><xref target="no-export"/> presents a scenario where the limited propagation of prefixes occurs due to the NO_EXPORT community attribute. In this scenario, AS 1 is a customer of AS 2, AS 2 is a customer of AS 4, AS 4 is a customer of AS 3, and AS 5 is a customer of both AS 3 and AS 4. The relationship between AS 1 and AS 4 can be either customer-to-provider (C2P) or peer-to-peer (P2P). AS 1 advertises prefixes P1 and P6 to AS 2, while AS 2 propagates P6 to AS 4. AS 1 adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 2, preventing AS 2 from further propagating the route for prefix P1 to AS 4. Similarly, AS 1 adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 4, resulting in AS 4 not propagating the route for prefix P6 to AS 3. Consequently, AS 4 only learns the route for prefix P1 from AS 1 in this scenario. Suppose AS 1 and AS 4 have deployed inter-domain SAV while other ASes have not, and AS 4 has deployed EFP-uRPF at its customer interfaces.</t>
          <t>Assuming that AS 1 is the customer of AS 4, if AS 4 deploys EFP-uRPF with algorithm A at customer interfaces, it will require packets with source addresses in P1 to only arrive from AS 1. When AS 1 sends legitimate packets with source addresses in P1 to AS 4 through AS 2, AS 4 improperly blocks these packets. The same problem applies to Strict uRPF, FP-uRPF, and VRF uRPF. Although EFP-uRPF with algorithm B can avoid improper block in this case, network operators need to first determine whether limited prefix propagation exists before choosing the suitable EFP-uRPF algorithms, which adds more complexity and overhead to network operators. Furthermore, EFP-uRPF with algorithm B is not without its problems. For example, if AS 1 is the peer of AS 4, AS 4 will not learn the route of P1 from its customer interfaces. In such case, both EFP-uRPF with algorithm A and algorithm B have improper block problems.</t>
        </section>
        <section anchor="hidden-prefixes">
          <name>Hidden Prefixes</name>
          <t>Some servers' source addresses are not advertised through BGP to other ASes. These addresses are unknown to the inter-domain routing system and are called hidden prefixes. Legitimate traffic with these hidden prefixes may be dropped by existing inter-domain SAV mechanisms, such as Strict uRPF, FP-uRPF, VRF uRPF, or EFP-uRPF, because they do not match any known prefix.</t>
          <t>For example, Content Delivery Networks (CDN) use anycast <xref target="RFC4786"/> <xref target="RFC7094"/> to improve the quality of service by bringing content closer to users. An anycast IP address is assigned to devices in different locations, and incoming requests are routed to the closest location. Usually, only locations with multiple connectivity announce the anycast IP address through BGP. The CDN server receives requests from users and creates tunnels to the edge locations, where content is sent directly to users using direct server return (DSR). DSR requires servers in the edge locations to use the anycast IP address as the source address in response packets. However, these edge locations do not announce the anycast prefixes through BGP, so an intermediate AS with existing inter-domain SAV mechanisms may improperly block these response packets.</t>
          <figure anchor="dsr">
            <name>A Direct Server Return (DSR) scenario.</name>
            <artwork><![CDATA[
                                +----------------+
                Anycast Server+-+    AS 3(P3)    |
                                +-+/\----+/\+----+
                                   /       \
                         P3[AS 3] /         \ P3[AS 3]
                                 /           \
                                / (C2P)       \
                       +----------------+      \
                       |    AS 4(P4)    |       \
                       ++/\+--+/\+--+/\++        \
          P6[AS 1, AS 2] /     |      \           \
               P2[AS 2] /      |       \           \
                       /       |        \           \
                      / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
      +----------------+       |          \           \    
User+-+    AS 2(P2)    |       | P1[AS 1]  \           \
      +----------+/\+--+       | P6[AS 1]   \           \
          P6[AS 1] \           | NO_EXPORT   \           \
           P1[AS 1] \          |              \           \
           NO_EXPORT \         |               \           \
                      \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                    +----------------+        +----------------+
       Edge Server+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                    +----------------+        +----------------+
P3 is the anycast prefix and is only advertised by AS 3 through BGP.
]]></artwork>
          </figure>
          <t><xref target="dsr"/> illustrates a DSR scenario where the anycast IP prefix P3 is only advertised by AS 3 through BGP. In this example, AS 3 is the provider of AS 4 and AS 5, AS 4 is the provider of AS 1, AS 2, and AS 5, and AS 2 is the provider of AS 1. AS 1 and AS 4 have deployed inter-domain SAV, while other ASes have not. When users in AS 2 send requests to the anycast destination IP, the forwarding path is AS 2-&gt;AS 4-&gt;AS 3. The anycast servers in AS 3 receive the requests and tunnel them to the edge servers in AS 1. Finally, the edge servers send the content to the users with source addresses in prefix P3. The reverse forwarding path is AS 1-&gt;AS 4-&gt;AS 2. Since AS 4 does not receive routing information for prefix P3 from AS 1, EFP-uRPF with algorithm A/B, and all other existing uRPF-based mechanisms at the customer interface of AS 4 facing AS 1 will improperly block the legitimate response packets from AS 1.</t>
          <t>Moreover, it is worth mentioning that EFP-uRPF with algorithm A/B may also permit spoofing traffic improperly in scenarios where reflection or direct spoofing attacks occur. We provide illustrations of these scenarios below.</t>
          <figure anchor="customer-reflection-attack">
            <name>A scenario of the reflection attacks within a customer cone.</name>
            <artwork><![CDATA[
                                        +----------------+
                                        |    AS 3(P3)    |
                                        +-+/\----+/\+----+
                                           /       \
                                          /         \ 
                                         /           \
                                        / (C2P)       \
                               +----------------+      \
                               |    AS 4(P4)    |       \
                               ++/\+--+/\+--+/\++        \
                  P6[AS 1, AS 2] /     |      \           \
                       P2[AS 2] /      |       \           \
                               /       |        \           \
                              / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
              +----------------+       |          \           \    
Attacker(P1')-+    AS 2(P2)    |       | P1[AS 1]  \           \
              +----------+/\+--+       | P6[AS 1]   \           \
                  P6[AS 1] \           | NO_EXPORT   \           \
                   P1[AS 1] \          |              \           \
                   NO_EXPORT \         |               \           \
                              \ (C2P)  | (C2P)    (C2P) \     (C2P) \ 
                          +----------------+          +----------------+
                  Victim+-+  AS 1(P1, P6)  |  Server+-+    AS 5(P5)    |
                          +----------------+          +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <figure anchor="customer-direct-attack">
            <name>A scenario of the direct spoofing attacks within a customer cone.</name>
            <artwork><![CDATA[
                                        +----------------+
                                        |    AS 3(P3)    |
                                        +-+/\----+/\+----+
                                           /       \
                                          /         \ 
                                         /           \
                                        / (C2P)       \
                               +----------------+      \
                               |    AS 4(P4)    |       \
                               ++/\+--+/\+--+/\++        \
                  P6[AS 1, AS 2] /     |      \           \
                       P2[AS 2] /      |       \           \
                               /       |        \           \
                              / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
              +----------------+       |          \           \    
Attacker(P5')-+    AS 2(P2)    |       | P1[AS 1]  \           \
              +----------+/\+--+       | P6[AS 1]   \           \
                  P6[AS 1] \           | NO_EXPORT   \           \
                   P1[AS 1] \          |              \           \
                   NO_EXPORT \         |               \           \
                              \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                            +----------------+        +----------------+
                    Victim+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                            +----------------+        +----------------+
P5' is the spoofed source prefix P5 by the attacker which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t>The scenarios depicted in <xref target="customer-reflection-attack"/> and <xref target="customer-direct-attack"/> involve spoofing attacks occurring within a customer cone. In <xref target="customer-reflection-attack"/>, the attack takes place within AS 4's customer cone, where the attacker spoofs the victim's IP address (P1) and sends requests to servers' IP address (P5) that are designed to respond to such requests. As a result, the server sends overwhelming responses back to the victim, thereby exhausting its network resources. On the other hand, <xref target="customer-direct-attack"/> portrays a direct spoofing attack, where the attacker spoofs a different source address (P5) and directly targets the victim's IP address (P1), overwhelming its network resources. The arrows in both <xref target="customer-reflection-attack"/> and <xref target="customer-direct-attack"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>If AS 4 deploys EFP-uRPF with algorithm A/B at its customer interfaces, it will allow packets with source addresses in P1 or P5 to originate from AS 1, AS 2, and AS 5. Consequently, when AS 2 sends spoofing packets with source addresses in P1 or P5 to AS 4, AS 4 will improperly permit these packets, thus enabling the spoofing attacks to propagate.</t>
          <t>In scenarios like these, Strict uRPF, FP-uRPF, and VRF uRPF do not suffer from improper permit problems. This is because these mechanisms enforce strict filtering rules that ensure packets with source addresses in P1 are only allowed to arrive from AS 1, and packets with source addresses in P5 are only permitted to arrive from AS 5.</t>
        </section>
      </section>
    </section>
    <section anchor="problem">
      <name>Problem Statement</name>
      <figure anchor="problem_sum">
        <name>The scenarios where existing inter-domain SAV mechanisms may have improper block for legitimate traffic, improper permit for spoofing traffic, or high operational overhead.</name>
        <artwork><![CDATA[
+--------+------------+-----------+----------+-------+--------+--------+
|Problems|ACL & S/RTBH|Strict uRPF|Loose uRPF|FP-uRPF|VRF uRPF|EFP-uRPF|
+--------+------------+-----------+----------+-------+--------+--------+
|Improper|     -      |    LPP,   |    -     |  LPP, |  LPP,  |  LPP,  |
|Block   |     -      |    HP     |          |  HP   |  HP    |  HP    |
+--------+------------+-----------+----------+-------+--------+--------+
|Improper|     -      |     -     |   DAP,   |   -   |   -    |  DAC,  |
|Permit  |            |           |   RAP    |       |   -    |  RAC   |
+--------+------------+-----------+----------+-------+--------+--------+
|        |  Dynamic   |           |          |       |        |        |
|  HOO   |  Networks  |     -     |     -    |   -   |   -    |   -    |
|        |            |           |          |       |        |        |
+--------+------------+-----------+----------+-------+--------+--------+
S/RTBH: Source-based RTBH filtering, HOO: High Operational Overhead.
"LPP" represents a scenario of limited propagation of prefixes. 
"HP" represents a scenario of hidden prefixes.
"RAP" represents a scenario of the reflection attacks from 
provider/peer AS. 
"DAP" represents a scenario of the direct spoofing attacks from 
provider/peer AS.
"RAC" represents a scenario of the reflection attacks within 
a customer cone.
"DAC" represents a scenario of the direct spoofing attacks within 
a customer cone.
"Dynamic Networks" represents the networks that may have frequent 
topology changes, route changes, or prefix changes.
"-" represents that the inter-domain SAV mechanism does not have 
the corresponding problem.
]]></artwork>
      </figure>
      <t>Based on the analysis above, we conclude that existing inter-domain SAV mechanisms exhibit limitations in asymmetric routing scenarios, leading to potential issues of improper block or improper permit. Additionally, these mechanisms can result in high operational overhead, especially when network routing undergoes dynamic changes. <xref target="problem_sum"/> provides a comprehensive summary of scenarios where existing inter-domain SAV mechanisms may encounter issues, including instances of improper blocking of legitimate traffic, improper permitting of spoofing traffic, or high operational overhead.</t>
      <t>For ACL-based ingress filtering, network operators need to manually update ACL rules to adapt to network changes. Otherwise, they may cause improper block or improper permit issues. Manual updates induce high operational overhead, especially in networks with frequent policy and route changes. Source-based RTBH filtering has the similar problem as ACL-based ingress filtering.</t>
      <t>Strict uRPF and Loose uRPF are automatic SAV mechanisms, thus they do not need any manual effort to adapt to network changes. However, they have issues in scenarios with asymmetric routing. Strict uRPF may cause improper block problems when an AS is multi-homed and routes are not symmetrically announced to all its providers. This is because the local FIB may not include the asymmetric routes of the legitimate packets, and Strict uRPF only uses the local FIB to check the source addresses and incoming interfaces of packets. Loose uRPF may cause improper permit problems and fail to prevent source address spoofing. This is because it is oblivious to the incoming interfaces of packets.</t>
      <t>FP-uRPF and VRF uRPF improve Strict uRPF in multi-homing scenarios. However, they still have improper block issues in asymmetric routing scenarios. For example, they may not handle the cases of limited propagation of prefixes. These mechanisms use the local RIB to learn the source prefixes and their valid incoming interfaces. But the RIB may not have all the prefixes with limited propagation and their permissible incoming interfaces.</t>
      <t>EFP-uRPF allows the prefixes from the same customer cone at all customer interfaces. This solves the improper block problems of FP-uRPF and VRF uRPF in multi-homing scenarios. However, this approach also compromises partial protection against spoofing from the customer cone. EFP-uRPF may still have improper block problems when it does not learn legitimate source prefixes. For example, hidden prefixes are not learned by EFP-uRPF.</t>
      <t>Finally, existing inter-domain SAV mechanisms cannot work in all directions (i.e. interfaces) of ASes to achieve effective SAV. Network operators need to carefully analyze the network environment and choose approapriate SAV mechansim for each interface. This leads to additional operational and cognitive overhead, which can hinder the rate of adoption of inter-domain SAV.</t>
    </section>
    <section anchor="req">
      <name>Requirements for New Inter-domain SAV Mechanisms</name>
      <t>This section lists the requirements which can help bridge the technical gaps of existing inter-domain SAV mechanisms. These requirements serve as practical guidelines that can be met, in part or in full, by proposing new techniques.</t>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new inter-domain SAV mechanism <bcp14>MUST</bcp14> be able to adapt to dynamic networks and asymmetric routing scenarios automatically, instead of relying on manual update.</t>
      </section>
      <section anchor="req-accurate-val">
        <name>Accurate Validation</name>
        <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> improve the validation accuracy in all directions of ASes over existing inter-domain SAV mechanisms. It <bcp14>SHOULD</bcp14> avoid improper block and minimize improper permit so that the legitimate traffic from an AS will not be blocked and the spoofed traffic will be reduced as much as possible. To avoid improper block, ASes that deploy the new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> be able to acquire all the real data-plane forwarding paths, which the paths that the legitimate traffic goes through in the data plane.</t>
        <t>However, it may be hard to learn the real forwarding paths of prefixes exactly under some scenarios, such as asymmetric routing and DSR. For such scenarios, it is essential to obtain a minimal set of acceptable paths that cover the real forwarding paths to avoid improper block and minimize improper permit. Note that the acceptable paths are all the possible paths that the legitimate traffic may go through in the data plane, cover all the links at each level of customer-provider hierarchy, and <bcp14>MUST</bcp14> include all the real forwarding paths. Reducing the set of acceptable paths means eliminating the paths that are not the real forwarding paths of the prefixes from the set.</t>
      </section>
      <section anchor="working-in-incrementalpartial-deployment">
        <name>Working in Incremental/Partial Deployment</name>
        <t>The new inter-domain SAV mechanism <bcp14>SHOULD NOT</bcp14> assume pervasive adoption and <bcp14>SHOULD</bcp14> provide effective protection for source addresses when it is partially deployed in the Internet. Not all AS border routers can support the new SAV mechanism at once, due to various constraints such as capabilities, versions, or vendors. The new SAV mechanism should not be less effective in protecting all directions of ASes under partial deployment than existing mechanisms.</t>
      </section>
      <section anchor="developing-a-sav-tailored-protocol">
        <name>Developing a SAV-tailored Protocol</name>
        <t>In order to learn the real forwarding paths of prefixes from ASes, a unified SAV-tailored protocol <bcp14>SHOULD</bcp14> be developed by the new inter-domain SAV mechanism for exchanging the SAV-related information such as prefixes, their incoming interfaces, and topological information of ASes. The unified SAV-tailored protocol will define the specific information to be communicated, the communication format, and the operations for originating, processing, propagating, and terminating the messages which carry the predefined information.</t>
        <t>The need for a unified SAV-tailored protocol arises from the fact that different ASes are managed by different network operators, who require a mutually recognized and supported protocol to send their own source prefixes that need to be protected by other ASes. Additionally, based on the protocol, an AS can receive, propagate, and process the messages carrying the source prefixes from other ASes.</t>
        <t>Moreover, the unified SAV-tailored protocol <bcp14>SHOULD</bcp14> perform security authentication to secure the communicated information and prevent malicious ASes from generating incorrect or forged information. The protocol <bcp14>SHOULD</bcp14> also be scalable independently from the growth of the deployed ASes.</t>
      </section>
    </section>
    <section anchor="feasibility-analysis-for-satisfying-the-requirements">
      <name>Feasibility Analysis for Satisfying the Requirements</name>
      <t>This section conducts a feasibility analysis of meeting the requirements by proposing new techniques. As analyzed in <xref target="req-accurate-val"/>, learning a minimal set of acceptable paths that cover the real forwarding paths of prefixes can avoid improper block and minimize improper permit, particularly when the real forwarding paths cannot be accurately learned. Multiple sources of SAV-related information, such as RPKI ROA objects, ASPA objects, and SAV-tailored information from other ASes, can assist in reducing the set of acceptable paths. Furthermore, when an AS desires other ASes to assist in protecting its prefixes, it <bcp14>SHOULD</bcp14> inform other ASes of its prefixes with a SAV-tailored protocol and collaborate with them in creating SAV rules. The SAV-tailored protocol can be implemented based on multiprotocol extentions for BGP <xref target="RFC4760"/>.</t>
      <section anchor="integrating-multiple-sav-information-sources">
        <name>Integrating Multiple SAV Information Sources</name>
        <figure anchor="accurate_validation">
          <name>An example to illustrate accurate validation in all directions of an AS.</name>
          <artwork><![CDATA[
                          +----------------+
                          |    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P)       \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
    P6[AS 1, AS 2] /     |      \           \
         P2[AS 2] /      |       \           \
                 /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
    P6[AS 1] \           | NO_EXPORT   \           \
     P1[AS 1] \          |              \           \
     NO_EXPORT \         |               \           \
                \ (C2P)  | (C2P)    (C2P) \     (C2P) \
              +----------------+        +----------------+
              |  AS 1(P1, P6)  |        |    AS 5(P5)    |
              +----------------+        +----------------+
]]></artwork>
        </figure>
        <t><xref target="accurate_validation"/> is used as an example to illustrate how to avoid improper block and minimize improper permit in all directions of an AS based on different SAV information sources. AS 3 is the provider of AS 4 and AS 5, while AS 4 is the provider of AS 1, AS 2, and AS 5, and AS 2 is the provider of AS 1. Assuming prefixes P1, P2, P3, P4, P5, and P6 are all the prefixes in the network. Inter-domain SAV has been deployed by AS 1 and AS 4, but not by other ASes. Here, the focus is on how to conduct SAV in all directions of AS 4 when different SAV information sources are used. Note that since the source prefix ranges of the traffic from outside the customer cone of AS 4 are not fully learned in the partial deployment scenario, SAV at the provider/peer interfaces for traffic from outside the customer cone can use a block list. For example, as shown in <xref target="accurate_validation"/>, the traffic with source addresses in P5 may come from AS 5 or AS 3. In contrast, SAV at the customer interfaces for traffic from inside the customer cone can use a permit list to allow the known prefixes of the customer cone at the corresponding customer interfaces and other unknown prefixes at all the customer interfaces. The followings show how to generate SAV rules based on the SAV-related information from different SAV information sources to avoid improper block and reduce as much improper permit as possible.</t>
        <ul spacing="normal">
          <li>If only the RIB is available, AS 4 can conduct SAV towards its neighboring ASes as follows: SAV towards AS 1 permits the prefixes P1 and P6, SAV towards AS 2 permits the prefixes P1, P2, and P6, SAV towards AS 5 permits the prefix P5, and SAV towards AS 3 does not block any prefix.</li>
          <li>When both RPKI ROA and ASPA are deployed by AS 1 and AS 4, AS 4 can conduct SAV towards its neighboring ASes as follows: SAV towards AS 1 permits the prefixes P1 and P6, SAV towards AS 2 permits the prefixes P1, P2, and P6, SAV towards AS 5 permits the prefix P5, and SAV towards AS 3 blocks the prefixes P1, P2, and P6.</li>
          <li>Moreover, if SAV-tailored information that contains real data-plane forwarding paths of prefixes is accessible, SAV rules can be refined based on more accurate information. AS 4 can conduct SAV towards its neighboring ASes as follows: SAV towards AS 1 permits only P1. SAV towards AS 2 permits the prefixes P2 and P6, while SAV towards AS 5 permits the prefix P5 and SAV towards AS 3 blocks the prefixes P1, P2, and P6.</li>
        </ul>
        <t>It is evident that, in a partial deployment scenario, more accurate SAV-related information can effectively achieve 0% improper block and significantly minimize improper permit.</t>
      </section>
      <section anchor="implementing-a-sav-tailored-protocol">
        <name>Implementing a SAV-tailored Protocol</name>
        <t>The SAV-tailored protocol serves as a means of exchanging SAV-tailored information, such as prefixes, between ASes, and can be implemented by extending the BGP <xref target="RFC4760"/>. To distinguish the SAV-tailored protocol, a new Address Family Identifier (AFI) and subsequent Address Family Identifier (SAFI) can be defined, and the relevant information for SAV can be encapsulated within Multiprotocol Reachable NLRI.</t>
        <t>However, it is important to note that the processing and communication of SAV-tailored information with extensions for BGP may impose significant overhead. As an alternative approach, the SAV-tailored protocol can be implemented as a dedicated data-plane protocol, separate from the control plane. This design choice helps mitigate processing overhead by offloading it to the data plane, ensuring more efficient operation.</t>
      </section>
    </section>
    <section anchor="inter-domain-sav-scope">
      <name>Inter-domain SAV Scope</name>
      <t>The new inter-domain SAV mechanism should work in the same scenarios as existing inter-domain SAV mechanisms. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>Native IP forwarding: This includes both global routing table forwarding and CE site forwarding of VPN.</li>
        <li>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): In this scenario, we focus on the validation of the outer layer IP address.</li>
        <li>Both IPv4 and IPv6 addresses.</li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>Non-IP packets: This includes MPLS label-based forwarding and other non-IP-based forwarding.</li>
      </ul>
      <t>In addition, the new inter-domain SAV mechanism should not modify data-plane packets. Existing architectures or protocols or mechanisms can be inherited by the new SAV mechanism to achieve better SAV effectiveness.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>SAV rules can be generated based on route information (FIB/RIB) or non-route information. If the information is poisoned by attackers, the SAV rules will be false. Legitimate packets may be dropped improperly or malicious traffic with spoofed source addresses may be permitted improperly. Route security should be considered by routing protocols. Non-route information, such as ASPA, should also be protected by corresponding mechanisms or infrastructure. If SAV mechanisms or protocols require information exchange, there should be some considerations on the avoidance of message alteration or message injection.</t>
      <t>The SAV procedure referred in this document modifies no field of packets. So, security considerations on data-plane are not in the scope of this document.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker">
              <organization/>
            </author>
            <author fullname="P. Savola" initials="P." surname="Savola">
              <organization/>
            </author>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network.  As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment.  There are cases when this may create problems, e.g., with multihoming.  This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular.  This memo updates RFC 2827.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram">
              <organization/>
            </author>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery">
              <organization/>
            </author>
            <author fullname="J. Haas" initials="J." surname="Haas">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson">
              <organization/>
            </author>
            <author fullname="D. Senie" initials="D." surname="Senie">
              <organization/>
            </author>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC5210">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu">
              <organization/>
            </author>
            <author fullname="J. Bi" initials="J." surname="Bi">
              <organization/>
            </author>
            <author fullname="X. Li" initials="X." surname="Li">
              <organization/>
            </author>
            <author fullname="G. Ren" initials="G." surname="Ren">
              <organization/>
            </author>
            <author fullname="K. Xu" initials="K." surname="Xu">
              <organization/>
            </author>
            <author fullname="M. Williams" initials="M." surname="Williams">
              <organization/>
            </author>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses.  In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network.  This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation.  This memo defines an  Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen">
              <organization/>
            </author>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter">
              <organization/>
            </author>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers.  This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other.  Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC5635">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari">
              <organization/>
            </author>
            <author fullname="D. McPherson" initials="D." surname="McPherson">
              <organization/>
            </author>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks. This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well.  This  memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC6811">
          <front>
            <title>BGP Prefix Origin Validation</title>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra">
              <organization/>
            </author>
            <author fullname="J. Scudder" initials="J." surname="Scudder">
              <organization/>
            </author>
            <author fullname="D. Ward" initials="D." surname="Ward">
              <organization/>
            </author>
            <author fullname="R. Bush" initials="R." surname="Bush">
              <organization/>
            </author>
            <author fullname="R. Austein" initials="R." surname="Austein">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes.  More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so.  This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6811"/>
          <seriesInfo name="DOI" value="10.17487/RFC6811"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley">
              <organization/>
            </author>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist">
              <organization/>
            </author>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged.  These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet.  This document presents commentary and recommendations for distribution of services using anycast.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="RFC7094">
          <front>
            <title>Architectural Considerations of IP Anycast</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson">
              <organization/>
            </author>
            <author fullname="D. Oran" initials="D." surname="Oran">
              <organization/>
            </author>
            <author fullname="D. Thaler" initials="D." surname="Thaler">
              <organization/>
            </author>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil">
              <organization/>
            </author>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo discusses architectural implications of IP anycast and provides some historical analysis of anycast use by various IETF protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7094"/>
          <seriesInfo name="DOI" value="10.17487/RFC7094"/>
        </reference>
        <reference anchor="RFC4760">
          <front>
            <title>Multiprotocol Extensions for BGP-4</title>
            <author fullname="T. Bates" initials="T." surname="Bates">
              <organization/>
            </author>
            <author fullname="R. Chandra" initials="R." surname="Chandra">
              <organization/>
            </author>
            <author fullname="D. Katz" initials="D." surname="Katz">
              <organization/>
            </author>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter">
              <organization/>
            </author>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, L3VPN, etc.).  The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4760"/>
          <seriesInfo name="DOI" value="10.17487/RFC4760"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="intra-domain-ps" target="https://datatracker.ietf.org/doc/draft-li-savnet-intra-domain-problem-statement/">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="manrs" target="https://www.manrs.org/netops/guide/antispoofing/">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="isoc" target="https://www.internetsociety.org/resources/doc/2015/addressing-the-challenge-of-ip-spoofing/">
          <front>
            <title>Addressing the challenge of IP spoofing</title>
            <author>
              <organization>Internet Society</organization>
            </author>
            <date year="2015"/>
          </front>
        </reference>
        <reference anchor="nist" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation">
          <front>
            <title>Resilient Interdomain Traffic Exchange: BGP Security and DDos Mitigation</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="urpf" target="https://www.cisco.com/c/dam/en_us/about/security/intelligence/urpf.pdf">
          <front>
            <title>Unicast Reverse Path Forwarding Enhancements for the Internet Service Provider-Internet Service Provider Network Edge</title>
            <author>
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Jared Mauch, Barry Greene, Fang Gao, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, John O'Brien, Roland Dobbins, etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
