<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wu-savnet-inter-domain-problem-statement-09" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="Inter-domain SAVNET Problem Statement">Source Address Validation in Inter-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-wu-savnet-inter-domain-problem-statement-09"/>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Liu" fullname="Libin Liu">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liulb@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmingqing@huawei.com</email>
      </address>
    </author>
    <author initials="K." surname="Sriram" fullname="Kotikalapudi Sriram">
      <organization abbrev="USA NIST">USA National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <city>Gaithersburg</city>
          <region>MD</region>
          <country>United States of America</country>
        </postal>
        <email>ksriram@nist.gov</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qlc19@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2023" month="June" day="27"/>
    <area>General [REPLACE]</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <abstract>
      <?line 110?>

<t>This document provides the gap analysis of existing inter-domain source address validation mechanisms, describes the fundamental problems, and defines the requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 114?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Source address validation (SAV) is crucial for protecting networks from source address spoofing attacks. The MANRS initiative advocates deploying SAV as close to the source as possible <xref target="manrs"/>, and access networks are the first line of defense against source address spoofing. However, access networks face various challenges in deploying SAV mechanisms due to different network environments, router vendors, and operational preferences. Hence, it is not feasible to deploy SAV at every network edge. Additional SAV mechanisms are needed at other levels of the network to prevent source address spoofing along the forwarding paths of the spoofed packets. The Source Address Validation Architecture (SAVA) <xref target="RFC5210"/> proposes a multi-fence approach that implements SAV at three levels of the network: access, intra-domain, and inter-domain.</t>
      <t>If a spoofing packet is not blocked at the originating access network, intra-domain and inter-domain SAV mechanisms can help block the packet along the forwarding path of the packet. As analyzed in <xref target="intra-domain-ps"/>, intra-domain SAV for an AS can prevent a subnet of the AS from spoofing the addresses of other subnets as well as prevent incoming traffic to the AS from spoofing the addresses of the AS, without relying on the collaboration of other ASes. As complementrary, in scenarios where intra-domain SAV cannot work, inter-domain SAV leverages the collaboration among ASes to help block incoming spoofing packets in an AS which spoof the source addresses of other ASes.</t>
      <t>This document provides an analysis of inter-domain SAV. <xref target="exp-inter-sav"/> illustrates an example for inter-domain SAV. P1 is the source prefix of AS 1, and AS 4 sends spoofing packets with P1 as source addresses to AS 3 through AS 2. Assume AS 4 does not deploy intra-domain SAV, these spoofing packets cannot be blocked by AS 4. Although AS 1 can deploy intra-domain SAV to block incoming packets which spoof the addresses of AS 1, these spoofing traffic from AS 4 to AS 3 do not go through AS 1, so they cannot be blocked by AS 1. Inter-domain SAV can help in this scenario. If AS 1 and AS 2 deploy inter-domain SAV, AS 2 knows the correct incoming interface of packets with P1 as source addresses, and the spoofing packets can thus be blocked by AS 2 since they come from the incorrect interface.</t>
      <figure anchor="exp-inter-sav">
        <name>An example for illustrating inter-domain SAV.</name>
        <artwork><![CDATA[
+------------+
|  AS 1(P1)  #
+------------+ \
                \            Spoofed Packets
              +-+#+--------+ with Source Addresses in P1 +------------+
              |    AS 2    #-----------------------------#    AS 4    |
              +-+#+--------+                             +------------+
                / 
+------------+ /
|    AS 3    #
+------------+
AS 4 sends spoofed packets with source addresses in P1 to AS 3 
through AS 2.
If AS 1 and AS 2 deploy inter-domain SAV, the spoofed packets 
can be blocked at AS 2.
]]></artwork>
      </figure>
      <t>There are many existing mechanisms for inter-domain SAV. This document analyzes them and attempts to answer: i) what are the technical gaps (<xref target="gap"/>), ii) what are the fundamental problems (<xref target="problem"/>), and iii) what are the practical requirements for the solution of these problems (<xref target="req"/>).</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl newline="true">
        <dt>SAV Rule:</dt>
        <dd>
          <t>The rule that indicates the validity of a specific source IP address or source IP prefix.</t>
        </dd>
        <dt>Improper Block:</dt>
        <dd>
          <t>The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Improper Permit:</dt>
        <dd>
          <t>The validation results that the packets with spoofed source addresses  are permitted improperly due to inaccurate SAV rules.</t>
        </dd>
        <dt>Real forwading paths:</dt>
        <dd>
          <t>The paths that the legitimate traffic goes through in the data plane.</t>
        </dd>
      </dl>
    </section>
    <section anchor="existing-inter-domain-sav-mechanisms">
      <name>Existing Inter-domain SAV Mechanisms</name>
      <t>Inter-domain SAV is typically performed at the AS level and can be deployed at AS border routers (ASBRs) to prevent source address spoofing. There are various mechanisms available to implement inter-domain SAV for anti-spoofing ingress filtering <xref target="manrs"/> <xref target="isoc"/>, which are reviewed in this section.</t>
      <ul spacing="normal">
        <li>ACL-based ingress filtering <xref target="RFC2827"/> <xref target="RFC3704"/>: ACL-based ingress filtering is a technique that relies on ACL rules to filter packets based on their source addresses. It can be applied at provider interfaces, peer interfaces, or customer interfaces of an AS, and is recommended to deploy at provider interfaces or customer interfaces <xref target="manrs"/> <xref target="nist"/>. At the provider interfaces, ACL-based ingress filtering can block source prefixes that are clearly invalid in the inter-domain routing context, such as suballocated or internal-only prefixes of customer ASes <xref target="nist"/>. At the customer interfaces, ACL-based ingress filtering can prevent customer ASes from spoofing source addresses of other ASes that are not reachable via the provider AS. It can be implemented at border routers or aggregation routers if border ACLs are not feasible <xref target="manrs"/>. However, ACL-based ingress filtering introduces significant operational overhead, as ACL rules need to be updated in a timely manner to reflect prefix or routing changes in the inter-domain routing system, which requires manual configuration to avoid improper block or improper permit.</li>
        <li>
          <t>uRPF-based machanisms: A class of SAV mechanisms are based on Unicast Reverse Path Forwarding (uRPF) <xref target="RFC3704"/>. The core idea of uRPF for SAV is to exploit the symmetry of inter-domain routing: in many cases, the best next hop for a destination is also the best previous hop for the source. In other words, if a packet arrives from a certain interface, the source address of that packet should be reachable via the same interface, according to the FIB. However, symmetry in routing does not always holds in practice, and to address cases where it does not hold, many enhancements and modes of uRPF are proposed. Different modes of uRPF have different levels of strictness and flexibility, and network operators can choose from them to suit particular network scenarios. We describe these modes as follows:
          </t>
          <ul spacing="normal">
            <li>Strict uRPF <xref target="RFC3704"/>: Strict uRPF is the most stringent mode, and it only permits packets that have a source address that is covered by a prefix in the FIB, and that the next hop for that prefix is the same as the incoming interface. This mode is recommended for deployment at customer interfaces that directly connect to an AS with suballocated address space, as it can prevent spoofing attacks from that AS or its downstream ASes <xref target="nist"/>.</li>
            <li>Loose uRPF <xref target="RFC3704"/>: Loose uRPF verifies that the source address of the packet is routable in the Internet by matching it with one or more prefixes in the FIB, regardless of which interface the packet arrives at. If the source address is not routable, Loose uRPF discards the packet. Loose uRPF is typically deployed at the provider interfaces of an AS to block packets with source addresses that are obviously disallowed, such as non-global prefixes (e.g., private addresses, multicast addresses, etc.) or the prefixes that belong to the customer AS itself <xref target="nist"/>.</li>
            <li>FP-uRPF <xref target="RFC3704"/>: FP-uRPF maintains a reverse path forwarding (RPF) list, which contains the prefixes and all their permissible routes including the optimal and alternative ones. It permits an incoming packet only if the packet's source address is encompassed in the prefixes of the RPF list and its incoming interface is included in the permissible routes of the corresponding prefix. FP-uRPF is recommended to be deployed at customer interfaces or peer interfaces, especially those that are connected to multi-homed customer ASes <xref target="nist"/>.</li>
            <li>Virtual routing and forwarding (VRF) uRPF <xref target="RFC4364"/> <xref target="urpf"/>: VRF uRPF uses a separate VRF table for each external BGP peer. A VRF table is a table that contains the prefixes and the routes that are advertised by a specific peer. VRF uRPF checks the source address of an incoming packet from an external BGP peer against the VRF table for that peer. If the source address matches one of the prefixes in the VRF table, VRF uRPF allows the packet to pass. Otherwise, it drops the packet. VRF uRPF can also be used as a way to implement BCP38 <xref target="RFC2827"/>, which is a set of recommendations to prevent IP spoofing. However, the operational feasibility of VRF uRPF as BCP38 has not been proven <xref target="manrs"/>.</li>
            <li>EFP-uRPF <xref target="RFC8704"/>: EFP-uRPF consists of two algorithms, algorithm A and algorithm B. EFP-uRPF is based on the idea that an AS can receive BGP updates for multiple prefixes that have the same origin AS at different interfaces. For example, this can happen when the origin AS is multi-homed and advertises the same prefixes to different providers. In this case, EFP-uRPF allows an incoming packet with a source address in any of those prefixes to pass on any of those interfaces. This way, EFP-uRPF can handle asymmetric routing scenarios where the incoming and outgoing interfaces for a packet are different. EFP-uRPF has not been implemented in practical networks yet, but BCP84 <xref target="RFC3704"/> <xref target="RFC8704"/> suggests using EFP-uRPF with algorithm B at customer interfaces of an AS. EFP-uRPF can also be used at peer interfaces of an AS.</li>
          </ul>
        </li>
        <li>Source-based remote triggered black hole (RTBH) filtering <xref target="RFC5635"/>: Source-based RTBH filtering enables the targeted dropping of traffic by specifying particular source addresses or address ranges. Source-based RTBH filtering uses uRPF, usually Loose uRPF, to check the source address of an incoming packet against the FIB. If the source address of the packet does not match or is not covered by any prefix in the FIB, or if the route for that prefix points to a black hole (i.e., Null0), Loose uRPF discards the packet. This way, source-based RTBH filtering can filter out attack traffic at specific devices (e.g., ASBR) in an AS based on source addresses, and improve the security of the network.</li>
        <li>Carrier Grade NAT (CGN): CGN is a network technology used by service providers to translate between private and public IPv4 addresses within their network. CGN enables service providers to assign private IPv4 addresses to their customer ASes instead of public, globally unique IPv4 addresses. The private side of the CGN faces the customer ASes, and when an incoming packet is received from a customer AS, CGN checks its source address. If the source address is included in the address list of the CGN's private side, CGN performs address translation. Otherwise, it forwards the packet without translation. However, since CGN cannot determine whether the source address of an incoming packet is spoofed or not, additional SAV mechanisms need to be implemented to prevent source address spoofing <xref target="manrs"/>.</li>
        <li>BGP origin validation (BGP-OV) <xref target="RFC6811"/>: Attackers can bypass uRPF-based SAV mechanisms by using prefix hijacking in combination with source address spoofing. By announcing a less-specific prefix that does not have a legitimate announcement, the attacker can deceive existing uRPF-based SAV mechanisms and successfully perform address spoofing. To protect against this type of attack, a combination of BGP-OV and uRPF-based mechanisms like FP-uRPF or EFP-uRPF is recommended <xref target="nist"/>. BGP routers can use ROA information, which is a validated list of {prefix, maximum length, origin AS}, to mitigate the risk of prefix hijacks in advertised routes.</li>
      </ul>
    </section>
    <section anchor="gap">
      <name>Gap Analysis</name>
      <t>Inter-domain SAV is essential in preventing source address spoofing attacks across all AS interfaces, including those of customers, providers, and peers. An ideal inter-domain SAV mechanism <bcp14>SHOULD</bcp14> block all spoofing traffic while permitting legitimate traffic in all scenarios. However, in some cases, existing SAV mechanisms may unintentionally block legitimate traffic or permit spoofing traffic. This section aims to conduct a gap analysis of existing SAV mechanisms used in the corresponding interfaces of these scenarios to identify their technical limitations.</t>
      <section anchor="sav-at-customer-interfaces">
        <name>SAV at Customer Interfaces</name>
        <t>SAV is used at customer interfaces to validate traffic from the customer cone, including both legitimate traffic and spoofing traffic. To prevent the source address spoofing, operators can enable ACL-based ingress filtering, source-based RTBH filtering, and/or uRPF-based mechanisms at customer interfaces, namely Strict uRPF, FP-uRPF, VRF uRPF, or EFP-uRPF. However, uRPF-based mechanisms may cause improper block problems in two inter-domain scenarios: limited propagation of prefixes and hidden prefixes, or may cause improper permit problems in the scenarios of source address spoofing attacks within a customer cone, while ACL-based ingress filtering and source-based RTBH filtering need to update SAV rules in a timely manner and lead to high operational overhead. For brevity, we will analyze ACL-based ingress filtering and source-based RTBH filtering in detail using the concrete cases in <xref target="sav_at_p"/>.</t>
        <figure anchor="customer_gap">
          <name>The gaps of ACL-based ingress filtering, source-based RTBH filtering, Strict uRPF, FP-uRPF, VRF uRPF, and EFP-uRPF in the corrresponding scenarios.</name>
          <artwork><![CDATA[
+-------------------+------------+-----------+-------+--------+--------+
|Traffic & Scenarios|ACL & S/RTBH|Strict uRPF|FP-uRPF|VRF uRPF|EFP-uRPF|
+----------+--------+------------+-----------+-------+--------+--------+
|Legitimate|  LPP   |            |                                     |
|Traffic   +--------+            |            Improper Block           |
|          |   HP   |    High    |                                     |
+----------+--------+Operational +----------------------------+--------+
|Spoofing  |  RAC   |  Overhead  |                            |Improper|
|Traffic   +--------+            |   Functioning as Expected  |Permit  |
|          |  DAC   |            |                            |        |
+----------+--------+------------+----------------------------+--------+
S/RTBH: Source-based RTBH filtering.
"LPP" represents a class of scenario called limited propagation of prefixes. 
"HP" represents a calss of scenario called hidden prefixes.
"RAC" represents a class of scenario called reflection attacks by source 
address spoofing within a customer cone.
"DAC" represents a class of scenario called direct attacks by source 
address spoofing within a customer cone. 
"Functioning as Expected" represents the inter-domain SAV mechanism 
does not cause improper block for legitimate traffic or improper 
permit for spoofing traffic in the corresponding scenarios, and has 
low operational overhead.
]]></artwork>
        </figure>
        <t><xref target="customer_gap"/> provides an overview of the gaps associated with ACL-based ingress filtering, source-based RTBH filtering, Strict uRPF, FP-uRPF, VRF uRPF, and EFP-uRPF for SAV at customer interfaces in the corresponding scenarios. Both ACL-based ingress filtering and source-based RTBH filtering have high operational overhead as performing SAV at provider/peer interfaces. Strict uRPF, FP-uRPF, VRF uRPF, and EFP-uRPF, on the other hand, may incorrectly block legitimate traffic in the scenarios of limited propagation of prefixes or hidden prefixes. Furthermore, in scenarios of source address spoofing attacks within a customer cone, EFP-uRPF may inadvertently permit spoofing traffic.</t>
        <t>In the following, we analyze the gaps of Strict uRPF, FP-uRPF, VRF uRPF, and EFP-uRPF for SAV at customer interfaces in scenarios of limited propagation of prefixes and hidden prefixes, respectively.</t>
        <section anchor="limited-propagation-of-prefixes">
          <name>Limited Propagation of Prefixes</name>
          <t>In inter-domain networks, some prefixes may not be propagated to all domains due to various factors, such as NO_EXPORT or NO_ADVERTISE communities or other route filtering policies. This may cause asymmetric routing in the inter-domain context, which may lead to false positives when performing SAV with existing mechanisms. These mechanisms include EFP-uRPF, which we focus on in the following analysis, as well as Strict uRPF, FP-uRPF, and VRF uRPF. All these mechanisms suffer from the same problem of improper block in this scenario.</t>
          <figure anchor="no-export">
            <name>Limited propagation of prefixes caused by NO_EXPORT.</name>
            <artwork><![CDATA[
                          +----------------+
                          |    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P)       \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
    P6[AS 1, AS 2] /     |      \           \
         P2[AS 2] /      |       \           \
                 /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
    P6[AS 1] \           | NO_EXPORT   \           \
     P1[AS 1] \          |              \           \
     NO_EXPORT \         |               \           \
                \ (C2P)  | (C2P/P2P)(C2P) \     (C2P) \
              +----------------+        +----------------+
              |  AS 1(P1, P6)  |        |    AS 5(P5)    |
              +----------------+        +----------------+
]]></artwork>
          </figure>
          <t><xref target="no-export"/> presents a scenario where the limited propagation of prefixes occurs due to the NO_EXPORT community attribute. In this scenario, AS 1 is a customer of AS 2, AS 2 is a customer of AS 4, AS 4 is a customer of AS 3, and AS 5 is a customer of both AS 3 and AS 4. The relationship between AS 1 and AS 4 can be either customer-to-provider (C2P) or peer-to-peer (P2P). AS 1 advertises prefixes P1 and P6 to AS 2, while AS 2 propagates P6 to AS 4. AS 1 adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 2, preventing AS 2 from further propagating the route for prefix P1 to AS 4. Similarly, AS 1 adds the NO_EXPORT community attribute to the BGP advertisement sent to AS 4, resulting in AS 4 not propagating the route for prefix P6 to AS 3. Consequently, AS 4 only learns the route for prefix P1 from AS 1 in this scenario. Suppose AS 1 and AS 4 have deployed inter-domain SAV while other ASes have not, and AS 4 has deployed EFP-uRPF at its customer interfaces.</t>
          <t>Assuming that AS 1 is the customer of AS 4, if AS 4 deploys EFP-uRPF with algorithm A at customer interfaces, it will require packets with source addresses in P1 to only arrive from AS 1. When AS 1 sends legitimate packets with source addresses in P1 to AS 4 through AS 2, AS 4 improperly blocks these packets. The same problem applies to Strict uRPF, FP-uRPF, and VRF uRPF. Although EFP-uRPF with algorithm B can avoid improper block in this case, network operators need to first determine whether limited prefix propagation exists before choosing the suitable EFP-uRPF algorithms, which adds more complexity and overhead to network operators. Furthermore, EFP-uRPF with algorithm B is not without its problems. For example, if AS 1 is the peer of AS 4, AS 4 will not learn the route of P1 from its customer interfaces. In such case, both EFP-uRPF with algorithm A and algorithm B have improper block problems.</t>
        </section>
        <section anchor="hidden-prefixes">
          <name>Hidden Prefixes</name>
          <t>Some servers' source addresses are not advertised through BGP to other ASes. These addresses are unknown to the inter-domain routing system and are called hidden prefixes. Legitimate traffic with these hidden prefixes may be dropped by existing inter-domain SAV mechanisms, such as Strict uRPF, FP-uRPF, VRF uRPF, or EFP-uRPF, because they do not match any known prefix.</t>
          <t>For example, Content Delivery Networks (CDN) use anycast <xref target="RFC4786"/> <xref target="RFC7094"/> to improve the quality of service by bringing content closer to users. An anycast IP address is assigned to devices in different locations, and incoming requests are routed to the closest location. Usually, only locations with multiple connectivity announce the anycast IP address through BGP. The CDN server receives requests from users and creates tunnels to the edge locations, where content is sent directly to users using direct server return (DSR). DSR requires servers in the edge locations to use the anycast IP address as the source address in response packets. However, these edge locations do not announce the anycast prefixes through BGP, so an intermediate AS with existing inter-domain SAV mechanisms may improperly block these response packets.</t>
          <figure anchor="dsr">
            <name>A Direct Server Return (DSR) scenario.</name>
            <artwork><![CDATA[
                                +----------------+
                Anycast Server+-+    AS 3(P3)    |
                                +-+/\----+/\+----+
                                   /       \
                         P3[AS 3] /         \ P3[AS 3]
                                 /           \
                                / (C2P)       \
                       +----------------+      \
                       |    AS 4(P4)    |       \
                       ++/\+--+/\+--+/\++        \
          P6[AS 1, AS 2] /     |      \           \
               P2[AS 2] /      |       \           \
                       /       |        \           \
                      / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
      +----------------+       |          \           \    
User+-+    AS 2(P2)    |       | P1[AS 1]  \           \
      +----------+/\+--+       | P6[AS 1]   \           \
          P6[AS 1] \           | NO_EXPORT   \           \
           P1[AS 1] \          |              \           \
           NO_EXPORT \         |               \           \
                      \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                    +----------------+        +----------------+
       Edge Server+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                    +----------------+        +----------------+
P3 is the anycast prefix and is only advertised by AS 3 through BGP.
]]></artwork>
          </figure>
          <t><xref target="dsr"/> illustrates a DSR scenario where the anycast IP prefix P3 is only advertised by AS 3 through BGP. In this example, AS 3 is the provider of AS 4 and AS 5, AS 4 is the provider of AS 1, AS 2, and AS 5, and AS 2 is the provider of AS 1. AS 1 and AS 4 have deployed inter-domain SAV, while other ASes have not. When users in AS 2 send requests to the anycast destination IP, the forwarding path is AS 2-&gt;AS 4-&gt;AS 3. The anycast servers in AS 3 receive the requests and tunnel them to the edge servers in AS 1. Finally, the edge servers send the content to the users with source addresses in prefix P3. The reverse forwarding path is AS 1-&gt;AS 4-&gt;AS 2. Since AS 4 does not receive routing information for prefix P3 from AS 1, EFP-uRPF with algorithm A/B, and all other existing uRPF-based mechanisms at the customer interface of AS 4 facing AS 1 will improperly block the legitimate response packets from AS 1.</t>
          <t>Moreover, it is worth mentioning that EFP-uRPF with algorithm A/B may also permit spoofing traffic improperly in scenarios where source address spoofing attacks within a customer cone occur. We provide illustrations of these scenarios in the following. The source address spoofing attacks within a customer cone include reflection attacks within a customer cone (<xref target="reflection_attack_customer"/>) and direct attacks within a customer cone (<xref target="direct_attack_customer"/>).</t>
        </section>
        <section anchor="reflection_attack_customer">
          <name>Reflection Attacks</name>
          <t><xref target="customer-reflection-attack"/> depicts the scenario of reflection attacks by source address spoofing within a customer cone and is used to analyze the gaps of uRPF-based mechanisms below.</t>
          <figure anchor="customer-reflection-attack">
            <name>A scenario of reflection attacks by source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                        +----------------+
                                        |    AS 3(P3)    |
                                        +-+/\----+/\+----+
                                           /       \
                                          /         \ 
                                         /           \
                                        / (C2P)       \
                               +----------------+      \
                               |    AS 4(P4)    |       \
                               ++/\+--+/\+--+/\++        \
                  P6[AS 1, AS 2] /     |      \           \
                       P2[AS 2] /      |       \           \
                               /       |        \           \
                              / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
              +----------------+       |          \           \    
Attacker(P1')-+    AS 2(P2)    |       | P1[AS 1]  \           \
              +----------+/\+--+       | P6[AS 1]   \           \
                  P6[AS 1] \           | NO_EXPORT   \           \
                   P1[AS 1] \          |              \           \
                   NO_EXPORT \         |               \           \
                              \ (C2P)  | (C2P)    (C2P) \     (C2P) \ 
                          +----------------+          +----------------+
                  Victim+-+  AS 1(P1, P6)  |  Server+-+    AS 5(P5)    |
                          +----------------+          +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t>In <xref target="customer-reflection-attack"/>, the reflection attack by source address spoofing takes place within AS 4's customer cone, where the attacker spoofs the victim's IP address (P1) and sends requests to servers' IP address (P5) that are designed to respond to such requests. As a result, the server sends overwhelming responses back to the victim, thereby exhausting its network resources. The arrows in <xref target="customer-reflection-attack"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>If AS 4 deploys EFP-uRPF with algorithm A/B at its customer interfaces, it will allow packets with source addresses in P1 to originate from AS 1 and AS 2. Consequently, when AS 2 sends spoofing packets with source addresses in P1 to AS 4, AS 4 will improperly permit these packets, thus enabling the spoofing attacks to propagate.</t>
          <t>In scenarios like these, Strict uRPF, FP-uRPF, and VRF uRPF do not suffer from improper permit problems. This is because these mechanisms enforce strict filtering rules that ensure packets with source addresses in P1 are only allowed to arrive from AS 1.</t>
        </section>
        <section anchor="direct_attack_customer">
          <name>Direct Attacks</name>
          <t><xref target="customer-direct-attack"/> portrays a scenario of direct attacks by source address spoofing within a customer cone and is used to analyze the gaps of uRPF-based mechanisms below.</t>
          <figure anchor="customer-direct-attack">
            <name>A scenario of the direct attacks by source address spoofing within a customer cone.</name>
            <artwork><![CDATA[
                                        +----------------+
                                        |    AS 3(P3)    |
                                        +-+/\----+/\+----+
                                           /       \
                                          /         \ 
                                         /           \
                                        / (C2P)       \
                               +----------------+      \
                               |    AS 4(P4)    |       \
                               ++/\+--+/\+--+/\++        \
                  P6[AS 1, AS 2] /     |      \           \
                       P2[AS 2] /      |       \           \
                               /       |        \           \
                              / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
              +----------------+       |          \           \    
Attacker(P5')-+    AS 2(P2)    |       | P1[AS 1]  \           \
              +----------+/\+--+       | P6[AS 1]   \           \
                  P6[AS 1] \           | NO_EXPORT   \           \
                   P1[AS 1] \          |              \           \
                   NO_EXPORT \         |               \           \
                              \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                            +----------------+        +----------------+
                    Victim+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                            +----------------+        +----------------+
P5' is the spoofed source prefix P5 by the attacker which is inside of 
AS 2 or connected to AS 2 through other ASes.
]]></artwork>
          </figure>
          <t>In <xref target="customer-direct-attack"/>, the direct attack by source address spoofing takes place within AS 4's customer cone, where the attacker spoofs a source address (P5) and directly targets the victim's IP address (P1), overwhelming its network resources. The arrows in <xref target="customer-direct-attack"/> illustrate the commercial relationships between ASes. AS 3 serves as the provider for AS 4 and AS 5, while AS 4 acts as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>If AS 4 deploys EFP-uRPF with algorithm A/B at its customer interfaces, it will allow packets with source addresses in P5 to originate from AS 1, AS 2, and AS 5. Consequently, when AS 2 sends spoofing packets with source addresses in P5 to AS 4, AS 4 will improperly permit these packets, thus enabling the spoofing attacks to propagate.</t>
          <t>In scenarios like these, Strict uRPF, FP-uRPF, and VRF uRPF do not suffer from improper permit problems. This is because these mechanisms enforce strict filtering rules that ensure packets with source addresses in P5 are only permitted to arrive from AS 5.</t>
        </section>
      </section>
      <section anchor="sav_at_p">
        <name>SAV at Provider/Peer Interfaces</name>
        <t>SAV is used at provider/peer interfaces to validate traffic entering the customer cone, including both legitimate and spoofing traffic. To prevent packets with spoofed source addresses from the provider/peer AS, ACL-based ingress filtering and/or Loose uRPF can be deployed <xref target="nist"/>. In addition, source-based RTBH filtering can be used to remotely configure SAV rules.</t>
        <figure anchor="provider_peer_gap">
          <name>The gaps of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF in the corresponding scenarios.</name>
          <artwork><![CDATA[
+--------------------+------------+---------------+
|Traffic & Scenarios |ACL & S/RTBH|   Loose uRPF  |
+----------+---------+------------+---------------+
|Legitimate|   Any   |            |  Functioning  |
|Traffic   |Scenarios|    High    |  as Expected  |
+----------+---------+Operational +---------------+
|Spoofing  |   RAP   |  Overhead  |               |
|Traffic   +---------+            |Improper Permit|
|          |   DAP   |            |               |
+----------+---------+------------+---------------+
S/RTBH: Source-based RTBH filtering.
"RAP" represents a class of scenario called reflection attacks by 
source address spoofing from provider/peer AS. 
"DAP" represents a class of scenario called direct attacks by source 
address spoofing from provider/peer AS.
"Functioning as Expected" represents the inter-domain SAV mechanism 
does not cause improper block for legitimate traffic or improper 
permit for spoofing traffic in the corresponding scenarios, and has 
low operational overhead.
]]></artwork>
        </figure>
        <t><xref target="provider_peer_gap"/> summarizes the gaps of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF for SAV at provider/peer interfaces in the corresponding scenarios. ACL-based ingress filtering and source-based RTBH filtering effectively block spoofing traffic from the reflection attacks or direct attacks originating from provider/peer AS, while appropriately allowing legitimate traffic. However, these methods may come with a high operational overhead. On the other hand, Loose uRPF correctly permits legitimate traffic, but it can also mistakenly allow spoofing traffic to pass through.</t>
        <t>In the following, we expose the limitations of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF for SAV at provider/peer interfaces in scenarios of source address spoofing attacks from provider/peer AS. The source address spoofing attacks from provider/peer AS include reflection attacks from provider/peer AS (<xref target="reflect_attack_p"/>) and direct attacks from provider/peer AS (<xref target="direct_attack_p"/>).</t>
        <section anchor="reflect_attack_p">
          <name>Reflection Attacks</name>
          <t><xref target="reflection-attack-p"/> depicts the scenario of reflection attacks by source address spoofing from provider/peer AS and is used to analyze the gaps of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF below.</t>
          <figure anchor="reflection-attack-p">
            <name>A scenario of reflection attacks by source address spoofing from provider/peer AS.</name>
            <artwork><![CDATA[
                                  +----------------+
                   Attacker(P1')+-+    AS 3(P3)    |
                                  +-+/\----+/\+----+
                                     /       \
                                    /         \ 
                                   /           \
                                  / (C2P/P2P)   \
                         +----------------+      \
                         |    AS 4(P4)    |       \
                         ++/\+--+/\+--+/\++        \
            P6[AS 1, AS 2] /     |      \           \
                 P2[AS 2] /      |       \           \
                         /       |        \           \
                        / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
        +----------------+       |          \           \    
Server+-+    AS 2(P2)    |       | P1[AS 1]  \           \
        +----------+/\+--+       | P6[AS 1]   \           \
            P6[AS 1] \           | NO_EXPORT   \           \
             P1[AS 1] \          |              \           \
             NO_EXPORT \         |               \           \
                        \ (C2P)  | (C2P)    (C2P) \     (C2P) \
                      +----------------+        +----------------+
              Victim+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
                      +----------------+        +----------------+
P1' is the spoofed source prefix P1 by the attacker which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
          </figure>
          <t>In the case of <xref target="reflection-attack-p"/>, the attacker spoofs the victim's IP address (P1) and sends requests to servers' IP address (P2) that respond to such requests. The servers then send overwhelming responses back to the victim, exhausting its network resources. The arrows in <xref target="reflection-attack-p"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>By applying ACL-based ingress filtering at the provider/peer interface of AS 4, the ACL rules can block any packets with spoofed source addresses from AS 3 in P1, effectively preventing reflection attacks. However, this approach incurs heavy operational overhead, as it requires network operators to update the ACL rules promptly based on changes in prefixes or topology of AS 1 and AS 2. Otherwise, it may cause improper block of legitimate traffic or improper permit of spoofing traffic.</t>
          <t>Source-based RTBH filtering allows for the deployment of SAV rules on AS 1 and AS 4 remotely. However, in order to avoid improper block or improper permit, the specified source addresses need to be updated in a timely manner, which incurs additional operational overhead.</t>
          <t>Loose uRPF can greatly reduce the operational overhead because it uses the local FIB as information source, and can adapt to changes in the network. However, it can improperly permit spoofed packets. In <xref target="reflection-attack-p"/>, Loose uRPF is enabled at AS 4's provider/peer interface, while EFP-uRPF is enabled at AS 4's customer interfaces, following <xref target="RFC3704"/>. An attacker inside AS 3 or connected to it through other ASes may send packets with source addresses spoofing P1 to a server in AS 2 to attack the victim in AS 1. As AS 3 lacks deployment of inter-domain SAV, the attack packets will reach AS 4's provider/peer interface. With Loose uRPF, AS 4 cannot block the reflection attack packets at its provider/peer interface, and thus resulting in improper permit.</t>
        </section>
        <section anchor="direct_attack_p">
          <name>Direct Attacks</name>
          <t>Conversely, <xref target="direct-attack-p"/> showcases a scenario of direct attack by source address spoofing from provider/peer AS and is used to analyze the gaps of ACL-based ingress filtering, source-based RTBH filtering, and Loose uRPF below.</t>
          <figure anchor="direct-attack-p">
            <name>A scenario of direct attacks by source address spoofing from provider/peer AS.</name>
            <artwork><![CDATA[
                          +----------------+
           Attacker(P2')+-+    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P/P2P)   \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
    P6[AS 1, AS 2] /     |      \           \
         P2[AS 2] /      |       \           \
                 /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
    P6[AS 1] \           | NO_EXPORT   \           \
     P1[AS 1] \          |              \           \
     NO_EXPORT \         |               \           \
                \ (C2P)  | (C2P)    (C2P) \     (C2P) \
              +----------------+        +----------------+
      Victim+-+  AS 1(P1, P6)  |        |    AS 5(P5)    |
              +----------------+        +----------------+
P2' is the spoofed source prefix P2 by the attacker which is inside of 
AS 3 or connected to AS 3 through other ASes.
]]></artwork>
          </figure>
          <t>In the case of <xref target="direct-attack-p"/>, the attacker spoofs another source address (P2) and directly targets the victim's IP address (P1), overwhelming its network resources. The arrows in <xref target="direct-attack-p"/> represent the commercial relationships between ASes. AS 3 acts as the provider or lateral peer of AS 4 and the provider for AS 5, while AS 4 serves as the provider for AS 1, AS 2, and AS 5. Additionally, AS 2 is the provider for AS 1. Suppose AS 1 and AS 4 have deployed inter-domain SAV, while the other ASes have not.</t>
          <t>Similar to the scenario of reflection attacks by source address spoofing depicted in <xref target="reflection-attack-p"/>, both ACL-based ingress filtering and Source-based RTBH filtering have high operational overhead for the scenario of direct attacks by source address spoofing from provider/peer AS shown in <xref target="direct-attack-p"/>. Otherwise, they may cause improper block of legitimate traffic or improper permit of spoofing traffic.</t>
          <t>Also, Loose uRPF can improperly permit spoofed packets. In <xref target="direct-attack-p"/>, Loose uRPF is enabled at AS 4's provider/peer interface, while EFP-uRPF is enabled at AS 4's customer interfaces, following <xref target="RFC3704"/>. An attacker inside AS 3 or connected to it through other ASes may send packets with source addresses spoofing P2 and destimation addresses in P1 to directly attack the victim in AS 1. As AS 3 lacks deployment of inter-domain SAV, the attack packets will reach AS 4's provider/peer interface. With Loose uRPF, AS 4 cannot block the direct attack packets at its provider/peer interface, and thus resulting in improper permit.</t>
        </section>
      </section>
    </section>
    <section anchor="problem">
      <name>Problem Statement</name>
      <figure anchor="problem_sum">
        <name>The scenarios where existing inter-domain SAV mechanisms may have improper block problem for legitimate traffic, improper permit problem for spoofing traffic, or high operational overhead.</name>
        <artwork><![CDATA[
+--------+------------+-----------+----------+---------+---------+----------+
|Problems|ACL & S/RTBH|Strict uRPF|Loose uRPF| FP-uRPF |VRF uRPF |EFP-uRPF  |
+--------+------------+-----------+----------+---------+---------+----------+
|Improper|  Not Exist |   Exist   |Not Exist |  Exist  |  Exist  |  Exist   |
|Block   |            | (LPP, HP) |          |(LPP, HP)|(LPP, HP)|(LPP, HP) |
+--------+------------+-----------+----------+---------+---------+----------+
|Improper|  Not Exist | Not Exist |  Exist   |Not Exist|Not Exist|  Exist   |
|Permit  |            |           |(RAP, DAP)|         |         |(RAC, DAC)|
+--------+------------+-----------+----------+---------+---------+----------+
|        |   Exist    |                                                     |
|  HOO   |   (Any     |                       Not Exist                     |
|        | Scenarios) |                                                     |
+--------+------------+-----------------------------------------------------+
S/RTBH: Source-based RTBH filtering, HOO: High Operational Overhead.
"LPP" represents a class of scenario called limited propagation of prefixes. 
"HP" represents a class of scenario called hidden prefixes.
"RAP" represents a class of scenario called reflection attacks by 
source address spoofing from provider/peer AS. 
"DAP" represents a class of scenario called direct attacks by source 
address spoofing from provider/peer AS.
"RAC" represents a class of scenario called reflection attacks by 
source address spoofing within a customer cone.
"DAC" represents a class of scenario called direct attacks by source 
address spoofing within a customer cone.
]]></artwork>
      </figure>
      <t>Based on the analysis above, we conclude that existing inter-domain SAV mechanisms exhibit limitations in asymmetric routing scenarios, leading to potential issues of improper block or improper permit. Additionally, these mechanisms can result in high operational overhead, especially when network routing undergoes dynamic changes. <xref target="problem_sum"/> provides a comprehensive summary of scenarios where existing inter-domain SAV mechanisms may encounter issues, including instances of improper blocking of legitimate traffic, improper permitting of spoofing traffic, or high operational overhead.</t>
      <t>For ACL-based ingress filtering, network operators need to manually update ACL rules to adapt to network changes. Otherwise, they may cause improper block or improper permit issues. Manual updates induce high operational overhead, especially in networks with frequent policy and route changes. Source-based RTBH filtering has the similar problem as ACL-based ingress filtering.</t>
      <t>Strict uRPF and Loose uRPF are automatic SAV mechanisms, thus they do not need any manual effort to adapt to network changes. However, they have issues in scenarios with asymmetric routing. Strict uRPF may cause improper block problems when an AS is multi-homed and routes are not symmetrically announced to all its providers. This is because the local FIB may not include the asymmetric routes of the legitimate packets, and Strict uRPF only uses the local FIB to check the source addresses and incoming interfaces of packets. Loose uRPF may cause improper permit problems and fail to prevent source address spoofing. This is because it is oblivious to the incoming interfaces of packets.</t>
      <t>FP-uRPF and VRF uRPF improve Strict uRPF in multi-homing scenarios. However, they still have improper block issues in asymmetric routing scenarios. For example, they may not handle the cases of limited propagation of prefixes. These mechanisms use the local RIB to learn the source prefixes and their valid incoming interfaces. But the RIB may not have all the prefixes with limited propagation and their permissible incoming interfaces.</t>
      <t>EFP-uRPF allows the prefixes from the same customer cone at all customer interfaces. This solves the improper block problems of FP-uRPF and VRF uRPF in multi-homing scenarios. However, this approach also compromises partial protection against spoofing from the customer cone. EFP-uRPF may still have improper block problems when it does not learn legitimate source prefixes. For example, hidden prefixes are not learned by EFP-uRPF.</t>
      <t>Finally, existing inter-domain SAV mechanisms cannot work in all directions (i.e. interfaces) of ASes to achieve effective SAV. Network operators need to carefully analyze the network environment and choose approapriate SAV mechansim for each interface. This leads to additional operational and cognitive overhead, which can hinder the rate of adoption of inter-domain SAV.</t>
    </section>
    <section anchor="req">
      <name>Requirements for New Inter-domain SAV Mechanisms</name>
      <t>This section lists the requirements which can help bridge the technical gaps of existing inter-domain SAV mechanisms. These requirements serve as practical guidelines that can be met, in part or in full, by proposing new techniques.</t>
      <section anchor="accurate-validation">
        <name>Accurate Validation</name>
        <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> improve the validation accuracy in all directions of ASes over existing inter-domain SAV mechanisms, while working in incremental/partial deployment.</t>
        <section anchor="improving-validation-accuracy-over-existing-mechanisms">
          <name>Improving Validation Accuracy over Existing Mechanisms</name>
          <t>It <bcp14>SHOULD</bcp14> avoid improper block and permit less spoofed traffic than existing inter-domain SAV mechanisms. To avoid improper block, ASes that deploy the new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> be able to acquire all the real data-plane forwarding paths, which are the paths that the legitimate traffic goes through in the data plane.</t>
          <t>However, it may be hard to learn the real forwarding paths of prefixes exactly under some scenarios, such as asymmetric routing and DSR. For such scenarios, it is crucial to minimize the set of acceptable paths while ensuring the inclusion of all real forwarding paths, thereby preventing improper block and minimizing improper permit. Note that the acceptable paths are all the possible paths that the legitimate traffic may go through in the data plane, cover all the links at each level of customer-provider hierarchy, and <bcp14>MUST</bcp14> include all the real forwarding paths. Reducing the set of acceptable paths means eliminating the paths that are not the real forwarding paths of the prefixes from the set.</t>
          <figure anchor="accurate_validation">
            <name>An example to illustrate accurate validation in all directions of an AS.</name>
            <artwork><![CDATA[
                          +----------------+
                          |    AS 3(P3)    |
                          +-+/\----+/\+----+
                             /       \
                            /         \ 
                           /           \
                          / (C2P)       \
                 +----------------+      \
                 |    AS 4(P4)    |       \
                 ++/\+--+/\+--+/\++        \
    P6[AS 1, AS 2] /     |      \           \
         P2[AS 2] /      |       \           \
                 /       |        \           \
                / (C2P)  |         \ P5[AS 5]  \ P5[AS 5]
+----------------+       |          \           \    
|    AS 2(P2)    |       | P1[AS 1]  \           \
+----------+/\+--+       | P6[AS 1]   \           \
    P6[AS 1] \           | NO_EXPORT   \           \
     P1[AS 1] \          |              \           \
     NO_EXPORT \         |               \           \
                \ (C2P)  | (C2P)    (C2P) \     (C2P) \
              +----------------+        +----------------+
              |  AS 1(P1, P6)  |        |    AS 5(P5)    |
              +----------------+        +----------------+
]]></artwork>
          </figure>
          <t>Multiple sources of SAV-related information, such as RPKI ROA objects, ASPA objects, and SAV-tailored information from other ASes, can assist in reducing the set of acceptable paths. <xref target="accurate_validation"/> is used as an example to illustrate how to avoid improper block and minimize improper permit in all directions of an AS based on different SAV information sources. AS 3 is the provider of AS 4 and AS 5, while AS 4 is the provider of AS 1, AS 2, and AS 5, and AS 2 is the provider of AS 1. Assuming prefixes P1, P2, P3, P4, P5, and P6 are all the prefixes in the network. Inter-domain SAV has been deployed by AS 1 and AS 4, but not by other ASes. Here, the focus is on how to conduct SAV in all directions of AS 4 when different SAV information sources are used.</t>
          <t>Additionally, since the source prefix ranges of the traffic entering the customer cone of AS 4 are not fully learned in the partial deployment scenario, SAV at provider/peer interfaces can use a block list. For example, as shown in <xref target="accurate_validation"/>, the traffic with source addresses in P5 may come from AS 5 or AS 3. In contrast, SAV at customer interfaces for traffic going out of the customer cone can use a permit list to allow the known prefixes of the customer cone at the corresponding customer interfaces and other unknown prefixes at all the customer interfaces.</t>
          <t>The followings show how to generate SAV rules based on the SAV-related information from different SAV information sources to avoid improper block and reduce as much improper permit as possible.</t>
          <ul spacing="normal">
            <li>If only the RIB is available, AS 4 can conduct SAV towards its neighboring ASes as follows like <xref target="RFC8704"/>: SAV towards AS 1 permits the prefixes P1 and P6, SAV towards AS 2 permits the prefixes P1, P2, and P6, SAV towards AS 5 permits the prefix P5, and SAV towards AS 3 does not block any prefix.</li>
            <li>When both RPKI ROA and ASPA are deployed by AS 1 and AS 4, AS 4 can conduct SAV towards its neighboring ASes as follows like <xref target="bar-sav"/>: SAV towards AS 1 permits the prefixes P1 and P6, SAV towards AS 2 permits the prefixes P1, P2, and P6, SAV towards AS 5 permits the prefix P5, and SAV towards AS 3 blocks the prefixes P1, P2, and P6.</li>
            <li>Moreover, if SAV-tailored information that exactly contains all the real data-plane forwarding paths of prefixes is accessible, SAV rules can be refined. AS 4 can conduct SAV towards its neighboring ASes as follows: SAV towards AS 1 permits only P1. SAV towards AS 2 permits the prefixes P2 and P6, while SAV towards AS 5 permits the prefix P5 and SAV towards AS 3 blocks the prefixes P1, P2, and P6.</li>
          </ul>
          <t>It is evident that, in a partial deployment scenario, more accurate SAV-related information can effectively achieve 0% improper block and significantly minimize improper permit.</t>
        </section>
        <section anchor="working-in-incrementalpartial-deployment">
          <name>Working in Incremental/Partial Deployment</name>
          <t>The new inter-domain SAV mechanism <bcp14>SHOULD NOT</bcp14> assume pervasive adoption and <bcp14>SHOULD</bcp14> provide effective protection for source addresses when it is partially deployed in the Internet. Not all AS border routers can support the new SAV mechanism at once, due to various constraints such as capabilities, versions, or vendors. The new SAV mechanism should not be less effective in protecting all directions of ASes under partial deployment than existing mechanisms.</t>
        </section>
      </section>
      <section anchor="automatic-update">
        <name>Automatic Update</name>
        <t>The new inter-domain SAV mechanism <bcp14>SHOULD</bcp14> update SAV rule and detect the changes of SAV-related information automatically, while communicating SV-related information between ASes promptly.</t>
        <section anchor="working-more-automatically-than-acl-and-source-based-rtbh">
          <name>Working More Automatically than ACL and Source-based RTBH</name>
          <t>The new inter-domain SAV mechanism <bcp14>MUST</bcp14> be able to adapt to dynamic networks and asymmetric routing scenarios automatically, instead of relying on manual update. At least, it <bcp14>SHOULD</bcp14> have less operational overhead than ACL-based ingress filtering and Source-based RTBH filtering.</t>
        </section>
        <section anchor="communicating-sav-related-information-between-ases">
          <name>Communicating SAV-related Information between ASes</name>
          <t>In order to communicate SAV-related information such as prefixes, their incoming interfaces, and topological information between ASes promptly, a unified SAV-tailored protocol <bcp14>SHOULD</bcp14> be developed by the new inter-domain SAV mechanism. The unified SAV-tailored protocol will define the SAV-related information to be communicated, the data structure or format to communicate the information, and the operations and timing for originating, processing, propagating, and terminating the messages which carry the information.</t>
          <t>The need for a unified SAV-tailored protocol arises from the facts that different ASes are managed by different network operators and may use different hardwares and softwares designed and manufactured by different manufacturers. As a result, ASes are unable to establish a connection and communicate with each other for sharing SAV-related information. Hence, a unified SAV-tailored protocol is needed to provide a medium and set of rules to establish communication between different ASes for the exchange of SAV-related information.</t>
          <t>Moreover, the unified SAV-tailored protocol <bcp14>SHOULD</bcp14> perform security authentication to secure the communicated information and prevent malicious ASes from generating incorrect or forged information. The protocol <bcp14>SHOULD</bcp14> also be scalable independently from the growth of the deployed ASes.</t>
        </section>
      </section>
    </section>
    <section anchor="inter-domain-sav-scope">
      <name>Inter-domain SAV Scope</name>
      <t>The new inter-domain SAV mechanism should work in the same scenarios as existing inter-domain SAV mechanisms. Generally, it includes all IP-encapsulated scenarios:</t>
      <ul spacing="normal">
        <li>Native IP forwarding: This includes both global routing table forwarding and CE site forwarding of VPN.</li>
        <li>IP-encapsulated Tunnel (IPsec, GRE, SRv6, etc.): In this scenario, we focus on the validation of the outer layer IP address.</li>
        <li>Both IPv4 and IPv6 addresses.</li>
      </ul>
      <t>Scope does not include:</t>
      <ul spacing="normal">
        <li>Non-IP packets: This includes MPLS label-based forwarding and other non-IP-based forwarding.</li>
      </ul>
      <t>In addition, the new inter-domain SAV mechanism should not modify data-plane packets. Existing architectures or protocols or mechanisms can be inherited by the new SAV mechanism to achieve better SAV effectiveness.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>SAV rules can be generated based on route information (FIB/RIB) or non-route information. If the information is poisoned by attackers, the SAV rules will be false. Legitimate packets may be dropped improperly or malicious traffic with spoofed source addresses may be permitted improperly. Route security should be considered by routing protocols. Non-route information, such as ASPA, should also be protected by corresponding mechanisms or infrastructure. If SAV mechanisms or protocols require information exchange, there should be some considerations on the avoidance of message alteration or message injection.</t>
      <t>The SAV procedure referred in this document modifies no field of packets. So, security considerations on data-plane are not in the scope of this document.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3704">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network.  As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment.  There are cases when this may create problems, e.g., with multihoming.  This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular.  This memo updates RFC 2827.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC8704">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38).  Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704).  However, as shown in this document, the existing feasible-path uRPF still has shortcomings.  This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704).  The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV).  Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques.  This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC2827">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC5210">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses.  In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network.  This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation.  This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers.  This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other.  Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC5635">
          <front>
            <title>Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)</title>
            <author fullname="W. Kumari" initials="W." surname="Kumari"/>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>Remote Triggered Black Hole (RTBH) filtering is a popular and effective technique for the mitigation of denial-of-service attacks.  This document expands upon destination-based RTBH filtering by outlining a method to enable filtering by source address as well.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5635"/>
          <seriesInfo name="DOI" value="10.17487/RFC5635"/>
        </reference>
        <reference anchor="RFC6811">
          <front>
            <title>BGP Prefix Origin Validation</title>
            <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
            <author fullname="J. Scudder" initials="J." surname="Scudder"/>
            <author fullname="D. Ward" initials="D." surname="Ward"/>
            <author fullname="R. Bush" initials="R." surname="Bush"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes.  More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so.  This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6811"/>
          <seriesInfo name="DOI" value="10.17487/RFC6811"/>
        </reference>
        <reference anchor="RFC4786">
          <front>
            <title>Operation of Anycast Services</title>
            <author fullname="J. Abley" initials="J." surname="Abley"/>
            <author fullname="K. Lindqvist" initials="K." surname="Lindqvist"/>
            <date month="December" year="2006"/>
            <abstract>
              <t>As the Internet has grown, and as systems and networked services within enterprises have become more pervasive, many services with high availability requirements have emerged. These requirements have increased the demands on the reliability of the infrastructure on which those services rely.</t>
              <t>Various techniques have been employed to increase the availability of services deployed on the Internet. This document presents commentary and recommendations for distribution of services using anycast. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="126"/>
          <seriesInfo name="RFC" value="4786"/>
          <seriesInfo name="DOI" value="10.17487/RFC4786"/>
        </reference>
        <reference anchor="RFC7094">
          <front>
            <title>Architectural Considerations of IP Anycast</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="D. Oran" initials="D." surname="Oran"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo discusses architectural implications of IP anycast and provides some historical analysis of anycast use by various IETF protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7094"/>
          <seriesInfo name="DOI" value="10.17487/RFC7094"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="intra-domain-ps" target="https://datatracker.ietf.org/doc/draft-li-savnet-intra-domain-problem-statement/">
          <front>
            <title>Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="manrs" target="https://www.manrs.org/netops/guide/antispoofing/">
          <front>
            <title>MANRS Implementation Guide</title>
            <author>
              <organization>MANRS</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="isoc" target="https://www.internetsociety.org/resources/doc/2015/addressing-the-challenge-of-ip-spoofing/">
          <front>
            <title>Addressing the challenge of IP spoofing</title>
            <author>
              <organization>Internet Society</organization>
            </author>
            <date year="2015"/>
          </front>
        </reference>
        <reference anchor="nist" target="https://www.nist.gov/publications/resilient-interdomain-traffic-exchange-bgp-security-and-ddos-mitigation">
          <front>
            <title>Resilient Interdomain Traffic Exchange: BGP Security and DDos Mitigation</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="urpf" target="https://www.cisco.com/c/dam/en_us/about/security/intelligence/urpf.pdf">
          <front>
            <title>Unicast Reverse Path Forwarding Enhancements for the Internet Service Provider-Internet Service Provider Network Edge</title>
            <author>
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date year="2005"/>
          </front>
        </reference>
        <reference anchor="bar-sav" target="https://datatracker.ietf.org/doc/draft-sriram-sidrops-bar-sav/">
          <front>
            <title>Source Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-SAV)</title>
            <author>
              <organization>NIST, Akamai</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 648?>

<section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Jared Mauch, Barry Greene, Fang Gao, Anthony Somerset, Yuanyuan Zhang, Igor Lubashev, Alvaro Retana, Joel Halpern, Aijun Wang, Michael Richardson, Li Chen, Gert Doering, Mingxing Liu, John O'Brien, Roland Dobbins, etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
