<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-inter-domain-problem-statement-11" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.1 -->
  <front>
    <title abbrev="Inter-domain SAVNET Problem Statement">Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-11"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="K." surname="Sriram" fullname="Kotikalapudi Sriram">
      <organization abbrev="USA NIST">USA National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <city>Gaithersburg</city>
          <region>MD</region>
          <country>United States of America</country>
        </postal>
        <email>ksriram@nist.gov</email>
      </address>
    </author>
    <date year="2025" month="August" day="28"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 93?>

<t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 97?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Source address validation (SAV) is crucial for protecting networks from source address (SA) spoofing attacks <xref target="RFC2827"/> <xref target="RFC3704"/> <xref target="RFC8704"/>. The MANRS initiative advocates deploying SAV as close to the source as possible <xref target="manrs"/>, and access networks are the first line of defense against source address spoofing. However, access networks face various challenges in deploying SAV mechanisms due to different network environments, router vendors, and operational preferences. Hence, SAV may not be deployed ubiquitously in access networks. In addition, SA spoofing may also originate in ISP networks at higher levels of hierarchy in the Internet. So, deployment of SAV mechanisms in the edge routers of enterprises as well as the ISP networks (at different hierarchal levels or tiers) is needed to prevent source address spoofing along the data forwarding paths. <xref target="RFC5210"/> highlights the importance of  SAV at various network locations: access, intra-domain (intra-AS), and inter-domain (inter-AS). This document focuses on providing gap analysis and describing the problem space of existing inter-domain SAV solutions, and defining the requirements for a new solution of these problems. Access Control List (ACL) and unicast Reverse Path Forwarding (uRPF) techniques are currently utilized for inter-domain SAV <xref target="RFC3704"/> <xref target="RFC8704"/>. Here only existing IETF RFCs are considered as the state of the art (BCP 38 <xref target="RFC2827"/> and BCP 84 <xref target="RFC3704"/> <xref target="RFC8704"/>); IETF works-in-progress are not included in that.</t>
      <t>There are several existing mechanisms for inter-domain SAV. This document analyzes them and attempts to answer: i) what are the technical gaps (<xref target="gap"/>), ii) what are the fundamental problems (<xref target="problem"/>), and iii) what are the practical requirements for the solution of these problems (<xref target="req"/>).</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV Rule:</dt>
        <dd>
          <t>The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        </dd>
        <dt>Improper Block:</dt>
        <dd>
          <t>The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Improper Permit:</dt>
        <dd>
          <t>The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        </dd>
      </dl>
    </section>
    <section anchor="existing-inter-domain-sav-mechanisms">
      <name>Existing Inter-domain SAV Mechanisms</name>
      <t>Inter-domain SAV is typically performed at the AS level (on a per neighbor-AS-interface basis) and can be deployed at AS border routers (ASBRs) to prevent source address spoofing. There are various mechanisms available to implement inter-domain SAV for anti-spoofing ingress filtering <xref target="nist"/> <xref target="manrs"/> <xref target="isoc"/>, which are reviewed in this section.</t>
      <ul spacing="normal">
        <li>
          <t>ACL-based ingress filtering <xref target="RFC3704"/>: ACL-based ingress SAV filtering is a technique that relies on ACL rules to filter packets based on their source addresses. It can be applied at provider interfaces, peer interfaces, or customer interfaces of an AS, and is recommended for deployment at provider interfaces <xref target="manrs"/>. At the provider interfaces, ACL-based ingress SAV filtering can block source prefixes that are clearly invalid in the inter-domain routing context, such as IANA special purpose or unallocated IPv4/IPv6 prefixes and the AS's internal-only prefixes. However, ACL-based ingress SAV filtering introduces significant operational overhead, as ACL rules need to be updated in a timely manner to reflect prefix or routing changes in the inter-domain routing system. It is also impractical to store a very large and dynamically varying unallocated IPv6 prefixes.  At the customer interfaces, ACL-based ingress filtering is less desirable. Other techniques (as described below) are more effective for ingress SAV filtering on customer interfaces. ACL-based ingress SAV filtering has applicability for broadband cable or digital subscriber access loop (DSL) access networks where the service provider has clear knowledge of IP address prefixes it has allocated to manage those services.</t>
        </li>
        <li>
          <t>uRPF-based mechanisms: A class of SAV mechanisms are based on Unicast Reverse Path Forwarding (uRPF) <xref target="RFC3704"/>. The core idea of uRPF for SAV is to exploit the symmetry of inter-domain routing: in many cases, the best next hop for a destination is also the best previous hop for the source. In other words, if a packet arrives from a certain interface, the source address of that packet should be reachable via the same interface, according to the FIB. However, symmetry in routing does not always holds in practice, and to address cases where it does not hold, many enhancements and modes of uRPF are proposed. Different modes of uRPF have different levels of strictness and flexibility, and network operators can choose from them to suit particular network scenarios. We describe these modes as follows:
          </t>
          <ul spacing="normal">
            <li>
              <t>Strict uRPF <xref target="RFC3704"/>: Strict uRPF is the most stringent mode, and it only permits packets that have a source address that is covered by a prefix in the FIB, and that the next hop for that prefix is the same as the incoming interface. This mode is recommended for deployment at customer interfaces that directly connect to an AS with suballocated address space, as it can prevent spoofing attacks from that AS or its downstream ASes <xref target="nist"/>.</t>
            </li>
            <li>
              <t>Loose uRPF <xref target="RFC3704"/>: Loose uRPF verifies that the source address of the packet is routable in the Internet by matching it with one or more prefixes in the FIB, regardless of which interface the packet arrives at. If the source address is not routable, Loose uRPF discards the packet. Loose uRPF is typically deployed at the provider interfaces of an AS to block packets with source addresses that are non-global routable prefixes (e.g., private addresses, multicast addresses, etc.) <xref target="nist"/>.</t>
            </li>
            <li>
              <t>Feasible Path uRPF (FP-uRPF) <xref target="RFC3704"/>: maintains a reverse path forwarding (RPF) list, which contains the prefixes and all their permissible routes including the optimal and alternative ones. It permits an incoming packet only if the packet's source address is encompassed in the prefixes of the RPF list and its incoming interface is included in the permissible routes of the corresponding prefix. FP-uRPF is recommended to be deployed at customer interfaces or peer interfaces, especially those that are connected to multi-homed customer ASes <xref target="nist"/>.</t>
            </li>
            <li>
              <t>Virtual routing and forwarding (VRF) uRPF <xref target="RFC4364"/> <xref target="urpf"/> <xref target="manrs"/>: VRF uRPF uses a separate VRF table for each external BGP peer and is only a way of implementation for a SAV table.</t>
            </li>
            <li>
              <t>Enhanced Feasible Path uRPF (EFP-uRPF) <xref target="RFC8704"/>: EFP-uRPF is based on the principle that if BGP updates for multiple prefixes with the same origin AS were received on different interfaces (at border routers), then incoming data packets with source addresses in any of those prefixes should be accepted on any of those interfaces. The EFP-uRPF specification provides two alternate algorithms: Algorithm A which is stricter with a greater sense of directionality and Algorithm B which is more permissive with a lesser sense of directionality. EFP-uRPF can more effectively accommodate asymmetric routing scenarios than FP-uRPF. EFP-uRPF is a part of BCP84. EFP-uRPF can be used at customer as well as lateral peer interfaces of an AS. It is not deployed yet in the Internet.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Carrier Grade NAT (CGN): CGN is a network technology used by service providers to translate between private and public IPv4 addresses within their network. CGN enables service providers to assign private IPv4 addresses to their customer ASes instead of public, globally unique IPv4 addresses. The private side of the CGN faces the customer ASes, and when an incoming packet is received from a customer AS, CGN checks its source address. If the source address is included in the address list of the CGN's private side, CGN performs address translation. Otherwise, it forwards the packet without translation. However, since CGN cannot determine whether the source address of an incoming packet is spoofed or not, additional SAV mechanisms need to be implemented to prevent source address spoofing <xref target="manrs"/>.</t>
        </li>
        <li>
          <t>BGP origin validation (BGP-OV) <xref target="RFC6811"/>: Attackers can bypass uRPF-based SAV mechanisms by using prefix hijacking in combination with source address spoofing. By falsely announcing a prefix, the attacker can deceive existing uRPF-based SAV mechanisms and successfully perform address spoofing. To protect against this type of attack, a combination of BGP-OV and uRPF-based mechanisms like FP-uRPF or EFP-uRPF is recommended <xref target="nist"/>. BGP routers can use ROA information, which is a validated list of {prefix, maximum length, origin AS}, to mitigate the risk of prefix hijacks in advertised routes.</t>
        </li>
      </ul>
    </section>
    <section anchor="gap">
      <name>Gap Analysis</name>
      <t>Inter-domain SAV is essential in preventing source address spoofing traffic across all AS interfaces, including those of customers, providers, and peers. An ideal inter-domain SAV mechanism <bcp14>MUST</bcp14> block all spoofing traffic while permitting legitimate traffic in all scenarios. However, in some cases, existing SAV mechanisms may unintentionally block legitimate traffic or permit spoofing traffic. This section aims to conduct a gap analysis of existing SAV mechanisms used in the corresponding interfaces of these scenarios to identify their technical limitations.</t>
      <section anchor="sav-at-customer-interfaces">
        <name>SAV at Customer Interfaces</name>
        <t>SAV is used at customer interfaces to validate traffic from the customer cone, including both legitimate traffic and spoofing traffic. To prevent the source address spoofing, operators can enable ACL-based ingress filtering and/or uRPF-based mechanisms at customer interfaces, namely Strict uRPF, FP-uRPF, or EFP-uRPF. However, uRPF-based mechanisms may cause improper block problems in two inter-domain scenarios: limited propagation of prefixes and hidden prefixes, or may cause improper permit problems in the scenarios of source address spoofing within a customer cone, while ACL-based SAV ingress filtering needs to update SAV rules in a timely manner and lead to high operational overhead.</t>
        <figure anchor="customer_gap">
          <name>The gaps of ACL-based ingress filtering, Strict uRPF, FP-uRPF, and EFP-uRPF in the corresponding scenarios.</name>
          <artwork><![CDATA[
+--------------------+------------+-----------+-------+--------+
|Traffic & Scenarios |     ACL    |Strict uRPF|FP-uRPF|EFP-uRPF|
+----------+---------+------------+-----------+-------+--------+
|Legitimate|   LPP   |            |                            |
|Traffic   +---------+            |       Improper Block       |
|          |   HP    |    High    |                            |
+----------+---------+Operational +-------------------+--------+
|Spoofing  |Spoofing |  Overhead  |                   |Improper|
|Traffic   | within  |            |   Functioning as  |Permit  |
|          |  a CC   |            |     Expected      |        |
+----------+---------+------------+-------------------+--------+
"LPP" represents a class of scenario called limited propagation of 
prefixes. 
"HP" represents a class of scenario called hidden prefixes.
"Spoofing within a CC" represents a class of scenario where 
spoofing traffic occurs within a customer cone (CC) and the spoofed 
source addresses belong to this customer cone.
"Functioning as Expected" represents the inter-domain SAV mechanism 
does not cause improper block for legitimate traffic or improper 
permit for spoofing traffic in the corresponding scenarios except
when legitimate and spoofing traffic arrive at the same interface, 
and has low operational overhead.
]]></artwork>
        </figure>
        <t><xref target="customer_gap"/> provides an overview of the gaps associated with ACL-based ingress filtering, Strict uRPF, FP-uRPF, and EFP-uRPF for SAV at customer interfaces in the corresponding scenarios. ACL-based ingress filtering has high operational overhead as performing SAV at customer interfaces. Strict uRPF, FP-uRPF, and EFP-uRPF, on the other hand, may incorrectly block legitimate traffic in the scenarios of limited propagation of prefixes or hidden prefixes. Furthermore, in the scenarios of source address spoofing within a customer cone, EFP-uRPF with algorithm B may inadvertently permit the spoofing traffic.</t>
        <t>In the following, we analyze the gaps of Strict uRPF, FP-uRPF, and EFP-uRPF for SAV at customer interfaces in scenarios of limited propagation of prefixes, hidden prefixes, and source address spoofing within a customer cone, respectively.</t>
        <section anchor="limited-propagation-of-prefixes">
          <name>Limited Propagation of Prefixes</name>
          <t>In inter-domain networks, some prefixes may not be propagated to all domains due to various factors, such as NO_EXPORT or NO_ADVERTISE communities or other route filtering policies. This may cause asymmetric routing in the inter-domain context, which may lead to improper block when performing SAV with existing mechanisms. These mechanisms include EFP-uRPF, which we focus on in the following analysis, as well as Strict uRPF and FP-uRPF. All these mechanisms suffer from the same problem of improper block in this scenario.</t>
          <figure anchor="no-export">
            <name>Limited propagation of prefixes caused by NO_EXPORT.</name>
            <artwork><![CDATA[
                          +----------------+
                          |    AS 3(P3)    |
                          +-+/\------+/\+--+
                             /         \
                            /           \ 
                           /             \
                          / (C2P)         \
                 +------------------+      \
                 |     AS 4(P4)     |       \
                 ++/\+--+/\+----+/\++        \
                   /     |        \           \
         P2[AS 2] /      |         \           \
                 /       |          \           \
                / (C2P)  |           \ P5[AS 5]  \ P5[AS 5]
+----------------+       |            \           \    
|    AS 2(P2)    |       | P1[AS 1]    \           \
+----------+/\+--+       | P6[AS 1]     \           \
             \           |               \           \
     P1[AS 1] \          |                \           \
     NO_EXPORT \         |                 \           \
                \ (C2P)  | (C2P/P2P)  (C2P) \     (C2P) \
              +----------------+          +----------------+
              |  AS 1(P1, P6)  |          |    AS 5(P5)    |
              +----------------+          +----------------+
]]></artwork>
          </figure>
          <t><xref target="no-export"/> presents a scenario where the limited propagation of prefixes occurs due to the NO_EXPORT community attribute. In this scenario, AS 1 is a customer of AS 2, AS 2 is a customer of AS 4, AS 4 is a customer of AS 3, and AS 5 is a customer of both AS 3 and AS 4. The relationship between AS 1 and AS 4 can be either customer-to-provider (C2P) or peer-to-peer (P2P). AS 1 advertises prefixes P1 to AS 2 and adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 2, preventing AS 2 from further propagating the route for prefix P1 to AS 4. Consequently, AS 4 only learns the route for prefix P1 from AS 1 in this scenario. Suppose AS 1 and AS 4 have deployed inter-domain SAV while other ASes have not, and AS 4 has deployed EFP-uRPF at its customer interfaces.</t>
          <t>Assuming that AS 1 is the customer of AS 4, if AS 4 deploys EFP-uRPF with algorithm A at customer interfaces, it will require packets with source addresses in P1 or P6 to only arrive from AS 1. When AS 1 sends legitimate packets with source addresses in P1 or P6 to AS 4 through AS 2, AS 4 improperly blocks these packets. The same problem applies to Strict uRPF and FP-uRPF. Although EFP-uRPF with algorithm B can avoid improper block in this case, network operators need to first determine whether limited prefix propagation exists before choosing the suitable EFP-uRPF algorithms, which adds more complexity and overhead to network operators. Furthermore, EFP-uRPF with algorithm B is not without its problems. For example, if AS 1 is the peer of AS 4, AS 4 will not learn the route of P1 and P6 from its customer interfaces. In such case, both EFP-uRPF with algorithm A and algorithm B have improper block problems.</t>
        </section>
        <section anchor="hidden-prefixes">
          <name>Hidden Prefixes</name>
          <t>Some servers' source addresses are not advertised through BGP to other ASes. These addresses are unknown to the inter-domain routing system and are called hidden prefixes. Legitimate traffic using these hidden prefixes as source addresses would be dropped by existing inter-domain SAV mechanisms, such as Strict uRPF, FP-uRPF, or EFP-uRPF, because they do not match any known prefix.</t>
          <t>For example, Content Delivery Networks (CDN) use anycast <xref target="RFC4786"/> <xref target="RFC7094"/> to improve the quality of service by bringing content closer to users. An anycast IP address is assigned to devices in different locations, and incoming requests are routed to the closest location. Usually, only locations with multiple connectivity announce the anycast IP address through BGP. The CDN server receives requests from users and creates tunnels to the edge locations, where content is sent directly to users using direct server return (DSR). DSR requires servers in the edge locations to use the anycast IP address as the source address in response packets. However, these edge locations do not announce the anycast prefixes through BGP, so an intermediate AS with existing inter-domain SAV mechanisms may improperly block these response packets.</t>
          <figure anchor="dsr">
            <name>A Direct Server Return (DSR) scenario.</name>
            <artwork><![CDATA[
                                +----------------+
                Anycast Server+-+    AS 3(P3)    |
                                +-+/\----+/\+----+
                                   /       \
                         P3[AS 3] /         \ 
                                 /           \
                                / (C2P)       \
                       +----------------+      \
                       |    AS 4(P4)    |       \
                       ++/\+--+/\+--+/\++        \
          P6[AS 2, AS 1] /     |      \           \
         P1[AS 2, AS 1] /      |       \           \
              P2[AS 2] /       |        \           \
                      / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
      +----------------+       |          \           \    
User+-+    AS 2(P2)    |       | P1[AS 1]  \           \
      +----------+/\+--+       | P6[AS 1]   \           \
                   \           |             \           \
           P6[AS 1] \          |              \           \
            P1[AS 1] \         |               \           \
                      \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                    +----------------+        +----------------+
       Edge Server+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                    +----------------+        +----------------+
P3 is the anycast prefix and is only advertised by AS 3 through BGP.
]]></artwork>
          </figure>
          <t><xref target="dsr"/> illustrates a DSR scenario where the anycast IP prefix P3 is only advertised by AS 3 through BGP. In this example, AS 3 is the provider of AS 4 and AS 5, AS 4 is the provider of AS 1, AS 2, and AS 5, and AS 2 is the provider of AS 1. AS 4 has deployed inter-domain SAV, while other ASes have not. When users in AS 2 send requests to the anycast destination IP, the forwarding path is AS 2-&gt;AS 4-&gt;AS 3. The anycast servers in AS 3 receive the requests and tunnel them to the edge servers in AS 1. Finally, the edge servers send the content to the users with source addresses in prefix P3. The reverse forwarding path is AS 1-&gt;AS 4-&gt;AS 2. Since AS 4 does not receive routing information for prefix P3 from AS 1, EFP-uRPF with algorithm A/B, and all other existing uRPF-based mechanisms at the customer interface of AS 4 facing AS 1 will improperly block the legitimate response packets from AS 1.
Also, if the legitimate response packets uses AS 1-&gt;AS 2 as the reverse forwarding path, AS 2 will improperly block these response packets, when it deploys existing uRPF-based mechanisms.</t>
          <t>Besides, in some network scenarios, such as multicast and satellite networks, specific prefixes may be exclusively used as source addresses without being advertised via BGP by any AS. While different from DSR scenarios, these cases similarly result in existing inter-domain SAV mechanisms improperly blocking legitimate traffic originating from such prefixes.</t>
        </section>
        <section anchor="spoofing_within_cc">
          <name>Source Address Spoofing within a Customer Cone</name>
          <t>Moreover, EFP-uRPF with algorithm B may also permit spoofing traffic improperly in scenarios where source address spoofing within a customer cone occur. We provide illustrations of these scenarios using an example in the following. The source address spoofing within a customer cone represents a class of scenario where spoofing traffic comes from a customer AS within a customer cone and the spoofed source addresses belong to this customer cone.
<xref target="customer-spoofing"/> portrays a scenario of source address spoofing within a customer cone and is used to analyze the gaps of uRPF-based mechanisms.</t>
          <figure anchor="customer-spoofing">
            <name>A scenario of source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                       +----------------+
                                       |    AS 3(P3)    |
                                       +-+/\----+/\+----+
                                          /       \
                                         /         \ 
                                        /           \
                                       / (C2P)       \
                              +----------------+      \
                              |    AS 4(P4)    |       \
                              ++/\+--+/\+--+/\++        \
                 P6[AS 2, AS 1] /     |      \           \
                P1[AS 2, AS 1] /      |       \           \
                     P2[AS 2] /       |        \           \
                             / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
             +----------------+       |          \           \    
Spoofer(P5')-+    AS 2(P2)    |       | P1[AS 1]  \           \
             +----------+/\+--+       | P6[AS 1]   \           \
                          \           |             \           \
                  P6[AS 1] \          |              \           \
                   P1[AS 1] \         |               \           \
                             \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                           +----------------+        +----------------+
                           |  AS 1(P1, P6)  |        |    AS 5(P5)    |
                           +----------------+        +----------------+
P5' is the spoofed source prefix P5 by the spoofer which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t>In <xref target="customer-spoofing"/>, the source address spoofing takes place within AS 4's customer cone, where the spoofer, which is inside of AS 2 or connected to AS 2 through other ASes, sends spoofing traffic with spoofed source addresses in P5 to AS 3 along the path AS 2-&gt;AS 4-&gt; AS 3. The arrows in <xref target="customer-spoofing"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>If AS 4 deploys EFP-uRPF with algorithm B at its customer interfaces, it will allow packets with source addresses in P5 to originate from AS 1, AS 2, and AS 5. Consequently, when the spoofer which is inside of AS 2 or connected to AS 2 through other ASes sends spoofing packets with spoofed source addresses in P5 to AS 3, AS 4 will improperly permit these packets, thus enabling the spoofing traffic to propagate.</t>
          <t>In scenarios like these, Strict uRPF, FP-uRPF, VRF uRPF, and EFP-uRPF with algorithm A do not suffer from improper permit problems. This is because these mechanisms enforce strict filtering rules that ensure packets with source addresses in P5 are only permitted to arrive at AS 4's customer interfaces facing AS 5.</t>
        </section>
      </section>
      <section anchor="sav_at_p">
        <name>SAV at Provider/Peer Interfaces</name>
        <t>SAV is used at provider/peer interfaces to validate traffic entering the customer cone, including both legitimate and spoofing traffic. To prevent packets with spoofed source addresses from the provider/peer AS, ACL-based ingress filtering and/or Loose uRPF can be deployed <xref target="nist"/>.</t>
        <figure anchor="provider_peer_gap">
          <name>The gaps of ACL-based ingress filtering and Loose uRPF in the corresponding scenarios.</name>
          <artwork><![CDATA[
+------------------------+------------+---------------+
|   Traffic & Scenarios  |     ACL    |   Loose uRPF  |
+----------+-------------+------------+---------------+
|Legitimate|      Any    |            |  Functioning  |
|Traffic   |  Scenarios  |    High    |  as Expected  |
+----------+-------------+Operational +---------------+
|Spoofing  |   Spoofing  |  Overhead  |               |
|Traffic   |     from    |            |Improper Permit|
|          |Provider/Peer|            |               |
|          |      AS     |            |               |
+----------+-------------+------------+---------------+
"Spoofing from provider/peer AS" represents a class of scenario where 
source address spoofing traffic from provider/peer AS occurs and the 
spoofed source addresses belong to the customer cone which the 
spoofing traffic enters.
"Functioning as Expected" represents the inter-domain SAV mechanism 
does not cause improper block for legitimate traffic or improper 
permit for spoofing traffic in the corresponding scenarios except
when legitimate and spoofing traffic arrive at the same interface, 
and has low operational overhead.
]]></artwork>
        </figure>
        <t><xref target="provider_peer_gap"/> summarizes the gaps of ACL-based ingress filtering and Loose uRPF for SAV at provider/peer interfaces in the corresponding scenarios. ACL-based ingress filtering effectively blocks spoofing traffic from provider/peer AS, while appropriately allowing legitimate traffic. However, these methods may come with high operational overhead. On the other hand, Loose uRPF correctly permits legitimate traffic, but it can also mistakenly allow spoofing traffic to pass through.</t>
        <t>In the following, we expose the limitations of ACL-based ingress filtering and Loose uRPF for SAV at provider/peer interfaces in scenarios of source address spoofing from provider/peer AS. The source address spoofing from provider/peer AS represents a class of scenario where spoofing traffic comes from a provider/peer AS and the spoofed source addresses belong to the customer cone which the spoofing traffic enters.</t>
        <t><xref target="provider-spoofing"/> depicts the scenario of source address spoofing from provider/peer AS and is used to analyze the gaps of ACL-based ingress filtering and Loose uRPF below.</t>
        <figure anchor="provider-spoofing">
          <name>A scenario of source address spoofing from provider/peer AS.</name>
          <artwork><![CDATA[
                          +----------------+
            Spoofer(P1')+-+    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P/P2P)   \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
    P6[AS 2, AS 1] /     |      \           \
   P1[AS 2, AS 1] /      |       \           \
        P2[AS 2] /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
             \           |             \           \
     P6[AS 1] \          |              \           \
      P1[AS 1] \         |               \           \
                \ (C2P)  | (C2P)    (C2P) \     (C2P) \
               +----------------+        +----------------+
               |  AS 1(P1, P6)  |        |    AS 5(P5)    |
               +----------------+        +----------------+
P1' is the spoofed source prefix P1 by the spoofer which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
        </figure>
        <t>In the case of <xref target="provider-spoofing"/>, the spoofer which is inside of AS 3 or connected to AS 3 through other ASes forges the source addresses in P1 and sends the spoofing traffic to the destination addresses in P2. The arrows in <xref target="provider-spoofing"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
        <t>By applying ACL-based ingress filtering at the provider/peer interface of AS 4, the ACL rules can block any packets with spoofed source addresses from AS 3 in P1. However, this approach incurs heavy operational overhead, as it requires network operators to update the ACL rules promptly based on changes in prefixes or topology of AS 4's customer cone. Otherwise, it may cause improper block of legitimate traffic or improper permit of spoofing traffic.</t>
        <t>Loose uRPF can greatly reduce the operational overhead because it uses the local FIB as information source, and can adapt to changes in the network. However, it would improperly permit spoofed packets. In <xref target="provider-spoofing"/>, Loose uRPF is enabled at AS 4's provider/peer interface, while EFP-uRPF is enabled at AS 4's customer interfaces. A spoofer inside AS 3 or connected to it through other ASes may send packets with source addresses spoofing P1 to AS 2. As AS 3 lacks deployment of inter-domain SAV, the spoofing packets will reach AS 4's provider/peer interface. With Loose uRPF, AS 4 cannot block them at its provider/peer interface facing AS 3, and thus resulting in improper permit.</t>
      </section>
    </section>
    <section anchor="problem">
      <name>Problem Statement</name>
      <figure anchor="problem_sum">
        <name>The scenarios where existing inter-domain SAV mechanisms may have improper block problem for legitimate traffic, improper permit problem for spoofing traffic, or high operational overhead.</name>
        <artwork><![CDATA[
+--------+----------+---------+----------+-------+----------+
|Problems|    ACL   |  Strict |  Loose   |FP-uRPF|EFP-uRPF  |
|        |          |  uRPF   |  uRPF    |       |          |
+--------+----------+---------+----------+-------+----------+
|Improper|Not Exist |  Exist  |Not Exist |      Exist       |
|Block   |          |(LPP, HP)|          |    (LPP, HP)     |
+--------+----------+---------+----------+-------+----------+
|Improper|      Not Exist     |  Exist   |Not    |  Exist   |
|Permit  |                    |  (SPP)   |Exist  |  (SCC)   |
+--------+----------+---------+----------+-------+----------+
|        |   Exist  |                                       |
|  HOO   |   (Any   |              Not Exist                |
|        |Scenarios)|                                       |
+--------+----------+---------------------------------------+
HOO: High Operational Overhead.
"LPP" represents a class of scenario called limited propagation of 
prefixes. 
"HP" represents a class of scenario called hidden prefixes.
"SPP" represents a class of scenario called source address spoofing 
from provider/peer AS. 
"SCC" represents a class of scenario called source address spoofing 
within a customer cone.
]]></artwork>
      </figure>
      <t>Based on the analysis above, we conclude that existing inter-domain SAV mechanisms exhibit limitations in asymmetric routing scenarios, leading to potential issues of improper block or improper permit. Additionally, these mechanisms can result in high operational overhead, especially when network routing undergoes dynamic changes. <xref target="problem_sum"/> provides a comprehensive summary of scenarios where existing inter-domain SAV mechanisms may encounter issues, including instances of improper blocking of legitimate traffic, improper permitting of spoofing traffic, or high operational overhead.</t>
      <t>For ACL-based ingress filtering, network operators need to manually update ACL rules to adapt to network changes. Otherwise, they may cause improper block or improper permit issues. Manual updates induce high operational overhead, especially in networks with frequent policy and route changes.</t>
      <t>Strict uRPF and Loose uRPF are automatic SAV mechanisms, thus they do not need any manual effort to adapt to network changes. However, they have issues in scenarios with asymmetric routing. Strict uRPF may cause improper block problems when an AS is multi-homed and routes are not symmetrically announced to all its providers. This is because the local FIB may not include the asymmetric routes of the legitimate packets, and Strict uRPF only uses the local FIB to check the source addresses and incoming interfaces of packets. Loose uRPF may cause improper permit problems and fail to prevent source address spoofing. This is because it is oblivious to the incoming interfaces of packets.</t>
      <t>FP-uRPF improves Strict uRPF in multi-homing scenarios. However, they still have improper block issues in asymmetric routing scenarios. For example, they may not handle the cases of limited propagation of prefixes. These mechanisms use the local RIB to learn the source prefixes and their valid incoming interfaces. But the RIB may not have all the prefixes with limited propagation and their permissible incoming interfaces.</t>
      <t>EFP-uRPF allows the prefixes from the same customer cone at all customer interfaces. This solves the improper block problems of FP-uRPF in multi-homing scenarios. However, this approach also compromises partial protection against spoofing from the customer cone. EFP-uRPF may still have improper block problems when it does not learn legitimate source prefixes. For example, hidden prefixes are not learned by EFP-uRPF.</t>
      <t>Finally, existing inter-domain SAV mechanisms cannot work in all directions (i.e., interfaces) of ASes to achieve effective SAV. Network operators need to carefully analyze the network environment and choose appropriate SAV mechanism for each interface. This leads to additional operational and cognitive overhead, which hinders the rate of adoption of inter-domain SAV.</t>
    </section>
    <section anchor="req">
      <name>Requirements for New Inter-domain SAV Mechanisms</name>
      <t>This section lists the requirements which can help bridge the technical gaps of existing inter-domain SAV mechanisms. These requirements serve as the practical guidelines that can be met, in part or in full, by proposing new techniques.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new inter-domain SAV mechanism <bcp14>MUST</bcp14> improve the validation accuracy in all directions of ASes over existing inter-domain SAV mechanisms, while working in incremental/partial deployment and providing necessary security guarantee.</t>
        <section anchor="improving-validation-accuracy-over-existing-mechanisms">
          <name>Improving Validation Accuracy over Existing Mechanisms</name>
          <t>The new inter-domain SAV mechanism <bcp14>MUST</bcp14> avoid improper blocking and reject more spoofed traffic than existing inter-domain SAV mechanisms.
To achieve this, for an AS performing inter-domain SAV on an interface connected to a neighboring AS, it <bcp14>MUST</bcp14> permit all prefixes whose legitimate traffic (using them as source addresses) can reach that interface, while blocking all other prefixes that cannot.
This general principle applies to customer, lateral peer, and provider interfaces.
Multiple sources of SAV-related information, such as ROA and ASPA objects, BGP Update data, SAV-specific information, and management information can be leveraged to meet this requirement.</t>
          <figure anchor="wider-deployment">
            <name>An example where both spoofing and legitimate traffic arrive from the same direction.</name>
            <artwork><![CDATA[
                      +-----------------+
                      |       AS 4      |
                      +------+/\+-------+
              Spoofing traffic | Legitimate traffic
              with SA in P1'   | with SA in P1
                               | (C2P)
                      +-----------------+
                      |       AS 3      |
                      +--+/\+-----+/\+--+
        Spoofing traffic  /         \ Legitimate traffic
        with SA in P1'   /           \ with SA in P1
                        / (C2P) (C2P) \
             +----------------+   +----------------+
Spoofer(P1')-+    AS 2(P2)    |   |    AS 1(P1)    |    
             +----------------+   +----------------+
P1' is the spoofed source prefix P1 by the spoofer which is inside of 
AS 2 or connected to AS 2 through other ASes.
AS 4 performs SAV at its interface facing AS 3.
The legitimate traffic with SA in P1 arrives at AS 4 along the path
AS 1->AS 3->AS 4.
The spoofing traffic with SA in P1' arrives at AS 4 along the path
AS 2->AS 3->AS 4.
]]></artwork>
          </figure>
          <t>The path taken by the traffic with spoofed source address (i.e., spoofed traffic) may overlap with a path for the legitimate traffic. Such scenarios could result in improper permit of the spoofed traffic at the AS doing SAV unless an AS located at or prior to the merging point of the overlap is also performing inter-domain SAV.
As illustrated in <xref target="wider-deployment"/>, both spoofed and legitimate traffic traverse the same link between AS 3 and AS 4. In this case, SAV filtering at AS 4's interface facing AS 3 cannot differentiate between the two.
The spoofed traffic in such scenarios is incrementally mitigated (i.e., blocked) with the wider deployment of SAV. For example, AS 3 can deploy SAV on its interfaces facing AS 1 and AS 2 to facilitate blocking of the spoofed traffic while admitting and propagating the legitimate traffic.</t>
        </section>
        <section anchor="working-in-incrementalpartial-deployment">
          <name>Working in Incremental/Partial Deployment</name>
          <t>The new inter-domain SAV mechanism <bcp14>MUST NOT</bcp14> assume pervasive adoption (including the adoption of both SAV and SAV-related information) and <bcp14>SHOULD</bcp14> benefit early adopters by providing effective protection from spoofing of source addresses even when it is partially deployed in the Internet. Not all AS border routers can support the new SAV mechanism at once, due to various constraints such as capabilities, versions, or vendors. The new SAV mechanism <bcp14>SHOULD NOT</bcp14> be less effective than existing mechanisms in its capability of protection from source address spoofing for any type of peering interface (customer, lateral peer, and provider) even under partial deployment.</t>
        </section>
        <section anchor="providing-necessary-security-guarantee">
          <name>Providing Necessary Security Guarantee</name>
          <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> secure the communicated SAV-related information between ASes. It <bcp14>SHOULD</bcp14> prevent malicious ASes from generating forged information or detect and filter the forged information from malicious ASes.</t>
        </section>
      </section>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> update SAV rules and detect the changes of SAV-specific information automatically while guaranteeing convergence.</t>
        <section anchor="reducing-operational-overhead">
          <name>Reducing Operational Overhead</name>
          <t>The new inter-domain SAV mechanism <bcp14>MUST</bcp14> be able to adapt to dynamic networks and asymmetric routing scenarios automatically, instead of relying on manual update. At least, it <bcp14>MUST</bcp14> have less operational overhead than ACL-based ingress filtering.</t>
        </section>
        <section anchor="guaranteeing-convergence">
          <name>Guaranteeing Convergence</name>
          <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> promptly detect the network changes and finish the convergence process quickly. It is essential that the new inter-domain SAV mechanism converges towards accurate SAV rules in a proper manner, effectively reducing improper block and improper permit throughout the whole convergence process.</t>
        </section>
      </section>
    </section>
    <section anchor="inter-domain-sav-scope">
      <name>Inter-domain SAV Scope</name>
      <t>The new inter-domain SAV mechanisms should work in the same scenarios as existing ones. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>
          <t>Native IP forwarding: This includes both global routing table forwarding and CE site forwarding of VPN.</t>
        </li>
        <li>
          <t>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): In this scenario, we focus on the validation of the outer layer IP address.</t>
        </li>
        <li>
          <t>Both IPv4 and IPv6 addresses.</t>
        </li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>
          <t>Non-IP packets: This includes MPLS label-based forwarding and other non-IP-based forwarding.</t>
        </li>
      </ul>
      <t>In addition, the new inter-domain SAV mechanisms should not modify data plane packets. Existing architectures or protocols or mechanisms can be inherited by the new SAV mechanism to achieve better SAV effectiveness.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>SAV rules can be generated based on route information (FIB/RIB) or non-route information. If the information is poisoned by attackers, the SAV rules will be false. Legitimate packets may be dropped improperly or malicious traffic with spoofed source addresses may be permitted improperly. Route security should be considered by routing protocols. Non-route information, such as RPKI ASPA objects, should also be protected by corresponding mechanisms or infrastructure. If SAV mechanisms or protocols require exchanging specific information between ASes, some considerations on the avoidance of message alteration or message injection are needed to propose.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="contributors">
      <name>Contributors</name>
      <t>Nan Geng<br/>
  Huawei<br/>
  Beijing,
  China <br/>
  Email: gengnan@huawei.com</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC6811">
          <front>
            <title>BGP Prefix Origin Validation</title>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="D. Ward" initials="D." surname="Ward"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes. More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so. This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6811"/>
          <seriesInfo name="DOI" value="10.17487/RFC6811"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="RFC7094">
          <front>
            <title>Architectural Considerations of IP Anycast</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="D. Oran" initials="D." surname="Oran"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo discusses architectural implications of IP anycast and provides some historical analysis of anycast use by various IETF protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7094"/>
          <seriesInfo name="DOI" value="10.17487/RFC7094"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5210">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="manrs" target="https://www.manrs.org/netops/guide/antispoofing/">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="isoc" target="https://www.internetsociety.org/resources/doc/2015/addressing-the-challenge-of-ip-spoofing/">
          <front>
            <title>Addressing the challenge of IP spoofing</title>
            <author>
              <organization>Internet Society</organization>
            </author>
            <date year="2015"/>
          </front>
        </reference>
        <reference anchor="nist" target="https://doi.org/10.6028/NIST.SP.800-189r1.ipd">
          <front>
            <title>Border Gateway Protocol Security and Resilience</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="urpf" target="https://www.cisco.com/c/dam/en_us/about/security/intelligence/urpf.pdf">
          <front>
            <title>Unicast Reverse Path Forwarding Enhancements for the Internet Service Provider-Internet Service Provider Network Edge</title>
            <author>
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
        <reference anchor="bar-sav" target="https://datatracker.ietf.org/doc/draft-ietf-sidrops-bar-sav/">
          <front>
            <title>Source Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-SAV)</title>
            <author>
              <organization>NIST, Akamai</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 517?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Jared Mauch, Barry Greene, Fang Gao, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, John O'Brien, Roland Dobbins, etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
