<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-huang-savnet-sav-table-06" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="General SAV Capabilities">General Source Address Validation Capabilities</title>
    <seriesInfo name="Internet-Draft" value="draft-huang-savnet-sav-table-06"/>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization/>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@vip.sina.com</email>
      </address>
    </author>
    <author initials="W." surname="Cheng" fullname="Weiqiang Cheng">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>chengweiqiang@chinamobile.com</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Liu" fullname="Mingxing Liu">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liumingxing7@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Chen" fullname="Li Chen">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lichen@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>Routing</area>
    <workgroup>savnet</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 79?>
<t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies.</t>
      <t>To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
    </abstract>
  </front>
  <middle>
    <?line 84?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source address validation (SAV) can detect and prevent source address spoofing on the SAV-enabled routers. When a packet arrives at an interface of the router, the source address of the packet will be validated. The packets with unwanted source addresses or arriving at unwanted interfaces, will be considered invalid and usually be conducted elimination actions on. Only validated packets will continue to be handled or forwarded.</t>
      <t>From the perspective of data plane validation, the SAV capabilities of existing mechanisms have two main limitations. One of them is the deployable scenario limitation. ACL rules can be configured for filtering unwanted source addresses at specific interfaces (<xref target="RFC3704"/>). However, ACL is not dedicatedly designed for source prefix filtering. There exist performance and scalability issues due to long-key based searching, and usually expert maintenance efforts are required. Strict uRPF and loose uRPF are two typical FIB-based SAV mechanisms (<xref target="RFC3704"/>) and are supported by most commercial routers/switches. FIB-based validation brings many benefits compared to ACL-based filtering but also induces some limitations. Strict uRPF is not applicable for asymmetric routing (<xref target="RFC8704"/>), which exists in various scenarios such as intra-domain multi-homing access, inter-domain interconnection, etc. Under asymmetric routing, a source prefix may have a different incoming interface from the next-hop interface of the matched entry, or the source prefix does not exist in the FIB at all. Loose mode can only block unannounced prefix, which results in massive false negatives. Overall, existing ACL-based or FIB-based SAVs can only be applied to specific scenarios and cannot be adaptive to various scenarios (e.g., symmetric vs asymmetric).</t>
      <t>The other limitation is inflexible traffic handling policy. The current common practice is just to silently drop the spoofed packets. We don’t know who benefits from this and who is the source. Further more, the clues of attacks are ignored, which could be very helpful for dealing with DDoS etc.</t>
      <t>The root cause of the above two limitations is that there is no tool specifically designed for source address filtering. That is, the capabilities of current tools are derived from other functions, e.g., FIB or ACL.</t>
      <t>This document describes the general SAV capabilities that the data plane of SAV-enabled devices should have. Two kinds of capabilities will be introduced: validation mode and traffic handling policy. Validation modes describe how to apply validation in different scenarios. Traffic handling policies are the policies applied on the validated packets. By implementing the general SAV capabilities, the above two limitations of existing mechanisms can be overcome.</t>
      <t>To achieve accurate and scalable source address validation, a dedicated SAV table for SAV rules is needed instead of using those derived from other functions, e.g., FIB or ACL. 
Note that the general SAV capabilities described in this document is decoupled with real implementation. Conforming implementations of this specification may differ, but the SAV outcomes <bcp14>SHOULD</bcp14> be equivalent to the described SAV capabilities. How to generate SAV rules is not the focus of this document.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>SAV rule: The entry specifying the valid incoming interfaces of specific source addresses or source prefixes.</t>
        <t>Validation mode: The mode that describes the typical applications of SAV in a specific kind of scenarios. Different modes take effect in different scales and treat the default prefix differently.</t>
        <t>Traffic handling policy: The policy taken on the packets validated by SAV.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sav-mode">
      <name>Validation Modes</name>
      <t>This section describes three validation modes (Mode1 in <xref target="mode1"/>, Mode2 in <xref target="mode2"/>, Mode3 in <xref target="mode3"/>). These modes take effect in different scales and treat the default prefix differently. By choosing modes in different scenarios appropriately, the network can be protected as much as possible while not impacting the forwarding of legitimate packets. Validation modes also describe the goal of SAV rule generation. The modes can be set before generating the rules. By specifying validation modes, operators can take appropriate SAV mechanisms matching the modes, and engineers can design new SAV mechanisms to achieve the goal in challenging scenarios.</t>
      <t>There are typically two logical procedure of source address validation.</t>
      <ol spacing="normal" type="1"><li>
          <t>Boolen lookup(src, ifindex). Maintain a source prefix list for an interface. Do validation by checking whether the source address is included by a source prefix in the list. Validation Mode 1 and Mode 2 belong to this model.</t>
        </li>
        <li>
          <t>Enum {valid, invalid} lookup(src, ifindex). Maintain a table which includes entries of &lt;srouce prefix, incoming-interfaces&gt;. Do validation by checking whether the source address and its incoming interface matches some entry in the table. Validation Mode 3 belongs to this model.</t>
        </li>
      </ol>
      <section anchor="mode1">
        <name>Mode 1: Interface-based prefix allowlist</name>
        <t>Mode 1 is an interface-scale mode, i.e., it takes effect on a specific interface. The interface enabling Mode 1 is maintaining an interface-based prefix allowlist. Only the source prefixes recorded in the list will be considered valid, otherwise invalid.</t>
        <t>Applying Mode 1 on an interface requires the complete knowledge of legitimate prefixes connected to the interface. Mode 1 is suitable to the closed-connected interfaces such as those connecting to a subnet, a stub AS, or a customer cone. Such a mode can efficiently prevent the connected network from spoofing source prefixes of other networks.</t>
        <t>Strict uRPF based on FIB belongs to this mode. However, to overcome the limitation of asymmetric routing, native source prefix-based SAV table is suggested. This is essential for new SAV mechanisms/architectures such as EFP-uRPF <xref target="RFC8704"/>, BAR-SAV <xref target="I-D.ietf-sidrops-bar-sav"/>, Intra-domain/Inter-domain SAVNET (<xref target="I-D.li-savnet-intra-domain-architecture"/>, <xref target="I-D.wu-savnet-inter-domain-architecture"/>), etc.</t>
        <t>In some cases, it may be difficult for an interface getting all the legitimate source prefixes. If not all legitimate prefixes are included in the allowlist, packets with legitimate source addresses arriving at the interface may be improperly blocked. For example, the interface with a default route or the interface connecting to the Internet through a provider AS can hardly promise to know all the legitimate source prefixes.</t>
      </section>
      <section anchor="mode2">
        <name>Mode 2: Interface-based prefix blocklist</name>
        <t>Mode 2 is also an interface-scale mode, i.e., it takes effect on a configured interface. An interface cannot enable Mode 1 and Mode 2 at the same time. The interface enabling Mode 2 is maintaining an interface-based prefix blocklist. The source prefixes recorded in the list will be considered invalid, otherwise valid.</t>
        <t>This mode does not require the complete blocklist. If the packets with the specific source addresses need to be discarded, Mode 2 can be taken. Mode 2 is suitable for proactive filtering and reactive filtering. Usually the source prefixes that are sure to be invalid will be put into the blocklist, which is proactive filtering. Reactive filtering rules are usually installed in DDoS elimination for dropping packets with specific source addresses.</t>
        <t>The prefix blocklist can be generated automatically, e.g., one of Intra-domain SAVNET architecture cases, blocking the incoming traffic with internal source prefixes. Or operators can configure the specific source prefixes to block from the interface. This is similar to ACL-based filtering, but more native SAV rule expression with better performance and scalability is needed.</t>
      </section>
      <section anchor="mode3">
        <name>Mode 3: Prefix-based interface list</name>
        <t>Mode 3 is a router-scale mode, i.e., it can validate traffic arriving at the router from all directions. The router enabling Mode 3 will record the protected source prefixes and maintain an interface list for each source prefix. The interface list of each source prefix may be an allowlist or a blocklist.</t>
        <t>If a source prefix has an interface allowlist, the packet whose source address matches the source prefix is considered valid, only when its incoming interface is in the allowlist. Otherwise, the packet is considered invalid.</t>
        <t>If a source prefix has an interface blocklist, the packet whose source address matches the source prefix is considered invalid, only when its incoming interface is in the blocklist. Otherwise, the packet is considered valid.</t>
        <t>If its source address does not match any recorded source prefix, the packet is valid by default.</t>
        <!-- Mode 3 focuses on validating/protecting the interested source prefixes. If some source prefixes are important but there is no condition to enable Mode 1, Mode 3 can be enabled to provide some extent of protection.  -->

<t>Mode 3 focuses on validating/protecting the interested source prefixes. Mode 3 is applicable to the scenario where valid incoming interfaces of a source prefix change dynamically. If some source prefixes are important, Mode 3 can also provide stricter and more efficient protection than Mode 1 and Mode 2 for these source prefixes.</t>
        <t>Operators can configure the interface list for a specific source prefix, to prevent DDoS attack related to this source prefix. Or the interface list for specific prefixes can be generated automatically, e.g., one capability defined by Intra-domain and Inter-domain SAVNET architectures.</t>
      </section>
      <section anchor="validation-procedure">
        <name>Validation Procedure</name>
        <t>Mode 1 and Mode 2 are working on interface-level, while Mode 3 is for the router-level. Thus, there can be multiple modes configured on the same router. Mode 1 are most preferred if applicable (with best pretection effect) and mutual exclusive with the other two modes, which means while an interface enabled Mode 1, the traffic for this interface don't need go through Mode 2 or Mode 3 -- while an interface enabled Mode 2, the traffic still need go through Mode 3. <xref target="modes"/> shows a comparison of different validation modes for dealing with default prefix.</t>
        <figure anchor="modes">
          <name>A comparison of different validation modes</name>
          <artwork><![CDATA[
  +-----------------------------------------------------+
  + Mode | Scale     | Treatment of the default prefix  +
  +-----------------------------------------------------+
  + 1    | interface | invalid                          +
  + 2    | interface | valid                            +
  + 3    | router    | check its incoming interface     +
  +-----------------------------------------------------+
]]></artwork>
        </figure>
        <t>The validation procedure is shown in <xref target="SAV-procedure"/>. Suppose the router has learned the SAV rules by SAV mechanisms and implemented them in the data plane. When a packet arrives at the router, the router will take the source address and the incoming interface of the packet as the input and look up the SAV rules. The final validity state that is either "valid" or "invalid" will be returned after the procedure.</t>
        <t>Firstly, the packet is validated by the enabled interface-scale mode, i.e., Mode 1 or Mode 2. If the validity state1 or validity state2 is "invalid", the final validity state is "invalid" and the packet does not have to be validated by Mode 3. If the validity state1 or validity state2 is "valid", the packet still needs to be validated by the enabled Mode 3 and the validity state3 is the final validity state.</t>
        <t>If a mode is not enabled, then the corresponding list should not be queried. If Mode 3 is not enabled, either the validity state1 or the validity state2 is the final validity state.</t>
        <figure anchor="SAV-procedure">
          <name>Validation procedure</name>
          <artwork><![CDATA[
                        SAV-enabled router
             +--------------------------------------------+
             |                                            |
packet1--->Mode1---> validity ----+                       |
             |        state1      |                       |
             |                    | if the validity state |
packet2--->Mode2---> validity ----|  is "valid" and       |
             |        state2      |  Mode 3 is enabled    |
             |                    |                       |
             |                    \/                      |
packet3----->|---------------->Mode3---> validity         |
             |                            state3          |
             +--------------------------------------------+
]]></artwork>
        </figure>
        <t>To achieve accurate and scalable source address validation, a dedicated SAV table for SAV rules is needed rather than using those derived from other functions, e.g., FIB or ACL.</t>
      </section>
    </section>
    <section anchor="sec-policy">
      <name>Traffic Handling Policies</name>
      <t>After doing validation, the router gets the validity state of the incoming packet. For the packet with invalid state, traffic handling policies should be taken on the packet. Simply forwarding or silently dropping may not well satisfy the requirements of operators in different scenarios. This section suggests to provide flexible traffic handling policies to validated packets just like FlowSpec (<xref target="RFC8955"/>, <xref target="RFC8956"/>).</t>
      <t>The followings are the traffic control policies that can be taken. One and only one of the policies will be chosen for an "invalid" validation result.</t>
      <ul spacing="normal">
        <li>
          <t>"Permit": Forward packets normally though the packets are considered invalid. This policy is useful when operators only want to monitor the status of source address spoofing in the network. The "Permit" policy can be taken together with the "Sample" policy.</t>
        </li>
        <li>
          <t>"Discard": Drop packets directly, which is the common choose of existing SAV mechanisms.</t>
        </li>
        <li>
          <t>"Rate limit": Enforce an upper bound of traffic rate (e.g., bps or pps) for mitigation of source address spoofing attacks. This policy is helpful while operators want do tentative filtering.</t>
        </li>
        <li>
          <t>"Traffic redirect": Redirect the packets to the specified points (e.g., scrubbing centers) in the network for attack elimination.</t>
        </li>
      </ul>
      <t>There are also traffic monitor policies that are optional. One of the useful traffic monitor policies is:</t>
      <ul spacing="normal">
        <li>
          <t>"Sample": Capture the packets with a configurable sampling rate and reports them to remote servers (e.g., security analysis center). The sampled packets can be used for threat awareness and further analysis <xref target="I-D.cheng-savnet-proactive-defense-network"/>. "Sample" can be taken together with any one of the above policies. Note that, existing techniques like NetStream or NetFlow can be used for "Sample".</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document focuses on the general SAV capabilities. The generation of SAV rules is not discussed. There may be some security considerations for SAV generation, but it is not in the scope of this document.</t>
      <t>The "Sample" policy pushes data to remote servers. This function can be achieved by existing techniques like NetStream or NetFlow. The "Sample" policy may induce same security considerations as these techniques, and the corresponding documents have discussed them.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC8955" target="https://www.rfc-editor.org/info/rfc8955" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8955.xml">
          <front>
            <title>Dissemination of Flow Specification Rules</title>
            <author fullname="C. Loibl" initials="C." surname="Loibl"/>
            <author fullname="S. Hares" initials="S." surname="Hares"/>
            <author fullname="R. Raszuk" initials="R." surname="Raszuk"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="M. Bacher" initials="M." surname="Bacher"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document defines a Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic Flow Specifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
              <t>It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the Flow Specification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.</t>
              <t>This document obsoletes both RFC 5575 and RFC 7674.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8955"/>
          <seriesInfo name="DOI" value="10.17487/RFC8955"/>
        </reference>
        <reference anchor="RFC8956" target="https://www.rfc-editor.org/info/rfc8956" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8956.xml">
          <front>
            <title>Dissemination of Flow Specification Rules for IPv6</title>
            <author fullname="C. Loibl" initials="C." role="editor" surname="Loibl"/>
            <author fullname="R. Raszuk" initials="R." role="editor" surname="Raszuk"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>"Dissemination of Flow Specification Rules" (RFC 8955) provides a Border Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.</t>
              <t>This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8956"/>
          <seriesInfo name="DOI" value="10.17487/RFC8956"/>
        </reference>
        <reference anchor="I-D.cheng-savnet-proactive-defense-network" target="https://datatracker.ietf.org/doc/html/draft-cheng-savnet-proactive-defense-network-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.cheng-savnet-proactive-defense-network.xml">
          <front>
            <title>Network Proactive Defense based on Source Address Validation</title>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Shengnan Yue" initials="" surname="Yue">
              <organization>China Mobile</organization>
            </author>
            <date day="14" month="April" year="2024"/>
            <abstract>
              <t>Source address validation (SAV) helps routers check the validity of packets. Networks can use the SAV capability to enhance threat awareness. This document proposes proactive defense network where routers can directly identify threats through SAV. The proactive threat awareness feature is helpful for satisfying the threat awareness requirement of ISPs.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-cheng-savnet-proactive-defense-network-02"/>
        </reference>
        <reference anchor="I-D.ietf-sidrops-bar-sav" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-bar-sav-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-bar-sav.xml">
          <front>
            <title>Source Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-SAV)</title>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <author fullname="Igor Lubashev" initials="I." surname="Lubashev">
              <organization>Akamai Technologies</organization>
            </author>
            <author fullname="Doug Montgomery" initials="D." surname="Montgomery">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>Designing an efficient source address validation (SAV) filter requires minimizing false positives (i.e., avoiding blocking legitimate traffic) while maintaining directionality (see RFC8704). This document advances the technology for SAV filter design through a method that makes use of BGP UPDATE messages, Autonomous System Provider Authorization (ASPA), and Route Origin Authorization (ROA). The proposed method's name is abbreviated as BAR-SAV. BAR-SAV can be used by network operators to derive more robust SAV filters and thus improve network resilience. This document updates RFC8704.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-bar-sav-03"/>
        </reference>
        <reference anchor="I-D.li-savnet-intra-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-intra-domain-architecture-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-intra-domain-architecture.xml">
          <front>
            <title>Intra-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Fang Gao" initials="F." surname="Gao">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="16" month="March" year="2024"/>
            <abstract>
              <t>This document proposes the intra-domain SAVNET architecture, which achieves accurate source address validation (SAV) in an intra-domain network by an automatic way. Compared with uRPF-like SAV mechanisms that only depend on routers' local routing information, SAVNET routers generate SAV rules by using both local routing information and SAV-specific information exchanged among routers, resulting in more accurate SAV validation in asymmetric routing scenarios. Compared with ACL rules that require manual efforts to accommodate to network dynamics, SAVNET routers learn the SAV rules automatically in a distributed way.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-intra-domain-architecture-07"/>
        </reference>
        <reference anchor="I-D.wu-savnet-inter-domain-architecture" target="https://datatracker.ietf.org/doc/html/draft-wu-savnet-inter-domain-architecture-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.wu-savnet-inter-domain-architecture.xml">
          <front>
            <title>Inter-domain Source Address Validation (SAVNET) Architecture</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Jianping Wu" initials="J." surname="Wu">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Tsinghua University</organization>
            </author>
            <date day="26" month="May" year="2024"/>
            <abstract>
              <t>This document introduces an inter-domain SAVNET architecture for performing AS-level SAV and provides a comprehensive framework for guiding the design of inter-domain SAV mechanisms. The proposed architecture empowers ASes to generate SAV rules by sharing SAV- specific information between themselves, which can be used to generate more accurate and trustworthy SAV rules in a timely manner compared to the general information. During the incremental or partial deployment of SAV-specific information, it can utilize general information to generate SAV rules, if an AS's SAV-specific information is unavailable. Rather than delving into protocol extensions or implementations, this document primarily concentrates on proposing SAV-specific and general information and guiding how to utilize them to generate SAV rules. To this end, it also defines some architectural components and their relations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-architecture-08"/>
        </reference>
      </references>
    </references>
    <?line 242?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
