<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-savnet-intra-domain-problem-statement-22" category="info" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="Intra-domain SAVNET Problem Statement">Source Address Validation in Intra-domain Networks Gap Analysis, Problem Statement, and Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-intra-domain-problem-statement-22"/>
    <author initials="D." surname="Li" fullname="Dan Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>tolidan@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Qin" fullname="Lancheng Qin">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qinlc@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="N." surname="Geng" fullname="Nan Geng">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>gengnan@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="19"/>
    <area>Routing</area>
    <workgroup>SAVNET</workgroup>
    <keyword>SAV</keyword>
    <abstract>
      <?line 78?>

<t>This document provides a gap analysis of existing intra-domain source address validation mechanisms, describes the fundamental problems, and defines the basic requirements for technical improvements.</t>
    </abstract>
  </front>
  <middle>
    <?line 82?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) defends against source address spoofing. Network operators can enforce SAV at the following levels (see <xref target="RFC5210"/>):</t>
      <ul spacing="normal">
        <li>
          <t>Within the access network</t>
        </li>
        <li>
          <t>Within the domain (i.e., the autonomous system)</t>
        </li>
        <li>
          <t>Between domains (i.e., autonomous systems)</t>
        </li>
      </ul>
      <t>Some access networks have already deployed SAV mechanisms. These mechanisms typically are deployed on switches and prevent hosts from using the source address of another host on the Internet. Mechanisms include:</t>
      <ul spacing="normal">
        <li>
          <t>Source Address Validation Improvement (SAVI) Solution for DHCP <xref target="RFC7513"/></t>
        </li>
        <li>
          <t>IP Source Guard (IPSG) based on DHCP snooping <xref target="IPSG"/></t>
        </li>
        <li>
          <t>Cable Source-Verify <xref target="cable-verify"/></t>
        </li>
      </ul>
      <t>However, access-network SAV mechanisms are not universally deployed. Therefore, intra-domain (i.e., intra-AS) SAV or/and inter-domain (i.e., inter-AS) SAV are required.</t>
      <t>This document provides a gap analysis of the current operational intra-domain SAV mechanisms, identifies key problems to solve, and proposes basic requirements for any new intra-domain SAV solutions.</t>
      <t>In this document, intra-domain SAV refers to SAV at external interfaces that do not carry external BGP (eBGP) sessions (i.e., external non-BGP interfaces). SAV at internal interfaces or eBGP interfaces is considered out of scope. Within a domain, as illustrated in <xref target="intra-domain"/>, an external non-BGP interface may connect to a set of hosts, a non-BGP customer network, or a non-BGP Internet Service Provider (ISP) network. The goal of intra-domain SAV at such interfaces is to prevent traffic using unauthorized source addresses from entering the domain.</t>
      <figure anchor="intra-domain">
        <name>Deployment locations of intra-domain SAV</name>
        <artwork><![CDATA[
      +-----------------+         +---------------+ 
      |   Non-BGP ISP   |         | eBGP Neighbor |
      +-----------------+         +---------------+ 
              |                           |           
              |                           |           
              |                           |
+-------------|---------------------------|---------+ 
|Domain       \/                          |         | 
|         +---#------+               +----------+   | 
|         | Router 3 +---------------+ Router 4 |   | 
|         +----------+               +----------+   | 
|          /        \                     |         | 
|         /          \                    |         | 
|        /            \                   |         | 
| +----------+     +----------+      +----------+   | 
| | Router 1 |     | Router 2 +------+ Router 5 |   | 
| +------*---+     +--*-------+      +----X-----+   | 
|        /\           /\                  /\        | 
|         \           /                   |         | 
+----------\---------/--------------------|---------+ 
       +----------------+         +---------------+  
       |Non-BGP Customer|         |   A Set of    |  
       |   Network      |         |     Hosts     |  
       |     (P1)       |         |     (P2)      |  
       +----------------+         +---------------+ 
                                                    
  This document focuses on SAV at external non-BGP 
  interfaces including Interfaces  'X', '*', and '#'.
]]></artwork>
      </figure>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Non-BGP Customer Network: A stub network (i.e., a network that only originates traffic) connected to the local domain for Internet connectivity and does not participate in eBGP peering with the local domain.</t>
        <t>Non-BGP Internet Service Provider (ISP) Network: A network that forwards traffic from the local domain to the Internet and does not participate in eBGP peering with the local domain.</t>
        <t>SAV Rule: The rule in a router that describes the mapping relationship between a source address (prefix) and the valid incoming interface(s). It is used by a router to make SAV decisions.</t>
        <t>Improper Block: The validation results that the packets with legitimate source addresses are blocked improperly due to inaccurate SAV rules.</t>
        <t>Improper Permit: The validation results that the packets with spoofed source addresses are permitted improperly due to inaccurate SAV rules.</t>
        <t>SAV-specific Information: The information specialized for SAV rule generation.</t>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-mechanisms">
      <name>Current Operational Intra-domain SAV Mechanisms</name>
      <t>Although BCP 38 <xref target="RFC2827"/> and BCP 84 <xref target="RFC3704"/> specify several ingress filtering methods primarily intended for inter-domain SAV, some of these methods have also been applied to intra-domain SAV in operational practice. This section describes the mechanisms currently used to implement intra-domain SAV.</t>
      <ul spacing="normal">
        <li>
          <t>Access Control Lists (ACLs) can be used as SAV filters <xref target="RFC2827"/> to check the source address of each packet against a set of permitted or prohibited prefixes. When applied on a router interface, packets that do not match the ACL entries are blocked. Since ACLs are configured and updated manually, timely updates are essential whenever the set of permitted or prohibited prefixes changes.</t>
        </li>
        <li>
          <t>Strict uRPF <xref target="RFC3704"/> provides an automated SAV filter by validating the source address of each packet against the router’s local Forwarding Information Base (FIB). A packet is accepted only if (i) the FIB contains a prefix covering the source address, and (ii) the FIB entry’s outgoing interface matches the packet’s incoming interface. Otherwise, the packet is discarded.</t>
        </li>
        <li>
          <t>Loose uRPF <xref target="RFC3704"/> also relies on the local FIB for validation, but only checks for the presence of a covering prefix. A packet is accepted if the FIB contains a prefix that covers the source address, regardless of the incoming interface.</t>
        </li>
        <li>
          <t>Enhanced Feasible Path uRPF (EFP-uRPF) <xref target="RFC8704"/> is an advanced SAV mechanism specifically designed for inter-domain SAV. It enforces SAV on eBGP interfaces facing a customer AS by leveraging BGP data received from external ASes. EFP-uRPF is not analyzed in this document, as it is outside the scope of intra-domain SAV.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-gap">
      <name>Gap Analysis</name>
      <t>This section analyzes the gaps and key challenges of the current operational intra-domain SAV mechanisms.</t>
      <t>ACL-based SAV can be deployed on interfaces facing a non-BGP customer network or a set of hosts, permitting only packets with authorized source addresses. Such mechanism can also be applied on interfaces facing a non-BGP ISP network to block packets with prohibited source addresses, including internal-use-only addresses, unallocated addresses, and addresses single-homed to the local domain (e.g., P1 and P2 in <xref target="intra-domain"/>). The main drawback of ACL-based SAV is that it requires manual maintenance. Operators must update them promptly to reflect changes in prefixes or topology. Failure to do so may result in outdated ACLs that inadvertently block legitimate traffic.</t>
      <t>As noted in Section 2.4 of <xref target="RFC3704"/>, loose uRPF sacrifices directionality, so its effectiveness in mitigating source address spoofing is very limited, and improper permit problems may occur.</t>
      <t>With strict uRPF, it may drop legitimate packets in scenarios such as asymmetric routing or hidden prefixes. The following subsections describe two specific gap scenarios that arise when using strict uRPF for intra-domain SAV.</t>
      <section anchor="asymmetric-routing-scenario">
        <name>Asymmetric Routing Scenario</name>
        <t>Asymmetric routing means a packet traverses from a source to a destination in one path and takes a different path when it returns to the source. Asymmetric routing can occur within an AS due to routing policy, traffic engineering, etc.</t>
        <t>For example, a non-BGP customer network connected to multiple routers of the AS may need to perform load balancing on incoming traffic, thereby resulting in asymmetric routing. <xref target="multi-home"/> illustrates an example of asymmetric routing. The non-BGP customer network owns prefix 2001:db8::/55 <xref target="RFC6890"/> and connects to two routers of the AS, Router 1 and Router 2. Router 1, Router 2, and Router 3 exchange routing information via the intra-domain routing protocol. To achieve load balancing for inbound traffic, the non-BGP customer network expects traffic destined for 2001:db8:0::/56 to enter through Router 1, and traffic destined for 2001:db8:0:100::/56 to enter through Router 2. To this end, Router 1 advertises 2001:db8:0::/56 and Router 2 advertises 2001:db8:0:100::/56 through the intra-domain routing protocol. <xref target="multi-home"/> also shows the corresponding FIB entries of Router 1 and Router 2 for the two prefixes.</t>
        <figure anchor="multi-home">
          <name>An example of asymmetric routing</name>
          <artwork><![CDATA[
 +----------------------------------------------------------+
 |Domain                                                    |
 |                      +----------+                        |
 |                      | Router 3 |                        |
 |                      +----------+                        |
 |                       /       \                          |
 |                      /         \                         |
 |                     /           \                        |
 |            +----------+       +----------+               |
 |            | Router 1 |       | Router 2 |               |
 |            +-----*----+       +----------+               |
 |                  /\               /                      |
 |                   \              /                       |
 +--------------------\------------/------------------------+
  Traffic with         \          / Traffic with            
  source IP addresses   \        /  destination IP addresses
  of 2001:db8:0:100::/56 \      \/  of 2001:db8:0:100::/56  
                    +----------------+                     
                    |Non-BGP Customer|                     
                    |    Network     |                     
                    |(2001:db8::/55) |                     
                    +----------------+                     

 FIB of Router 1                FIB of Router 2
 Dest                Next_hop   Dest                Next_hop
 2001:db8:0::/56     Non-BGP    2001:db8:0:100::/56 Non-BGP
                     Customer                       Customer
                     Nestwork                       Network
 2001:db8:0:100::/56 Router 3   2001:db8:0::/56     Router 3

 The legitimate traffic originated from non-BGP customer network 
 with source addresses in 2001:db8:0:100::/56 will be improperly 
 blocked by strict uRPF on Router 1.
]]></artwork>
        </figure>
        <t>Although the non-BGP customer network does not expect to receive inbound traffic for 2001:db8:0:100::/56 via Router 1, it can send outbound traffic with source addresses in that prefix through Router 1. As a result, data packets between the non-BGP customer network and Router 1 may follow asymmetric paths. Arrows in the figure indicate the direction of traffic flow.</t>
        <t>If Router 1 enforces strict uRPF by checking the FIB entry for the prefix 2001:db8:0:100::/56, the corresponding SAV rule would only allow packets with a source address from 2001:db8:0:100::/56 that arrive via Router 3. Consequently, when the non-BGP customer network sends packets with a source address in 2001:db8:0:100::/56 to Router 1, strict uRPF would incorrectly drop these legitimate packets. Similarly, if Router 2 enforces strict uRPF, it would incorrectly block legitimate packets from the non-BGP customer network that use source addresses within the prefix 2001:db8:0::/56.</t>
      </section>
      <section anchor="hidden-prefix-scenario">
        <name>Hidden Prefix Scenario</name>
        <t>The intra-domain hidden prefix scenario refers to two situations in which a host or non-BGP customer legitimately originates traffic using source addresses that are not visible to the intra-domain routing protocol:</t>
        <ul spacing="normal">
          <li>
            <t>A host (for example, a cloud server instance operated by a tenant) that originates traffic with a source address not allocated by the AS operator, for legitimate purposes such as Direct Server Return (DSR) deployments.</t>
          </li>
          <li>
            <t>A non-BGP customer network that originates traffic with a source address not advertised to the AS operator, also for valid operational reasons.</t>
          </li>
        </ul>
        <t>For ACL-based SAV, enforcing correct filtering in these scenarios requires authoritative information that explicitly specifies which source addresses the host or non-BGP customer is authorized to use. In practice, such authoritative information is often missing.</t>
        <t>Existing uRPF-based mechanisms (strict uRPF or loose uRPF) also fail in hidden prefix scenarios. They will drop packets from hidden prefixes because the source addresses are absent from the router's FIB or are received from unexpected interfaces.</t>
      </section>
    </section>
    <section anchor="sec-problem">
      <name>Problem Statement</name>
      <t>As discussed above, current operational intra-domain SAV mechanisms have significant limitations with respect to automatic updates and accurate validation:</t>
      <ul spacing="normal">
        <li>
          <t>High operational overhead of ACL-based SAV. ACL-based SAV relies entirely on manual maintenance, resulting in high operational overhead in dynamic networks. To ensure the accuracy of ACL-based SAV, AS operators must manually update ACL rules whenever prefixes or topology change; otherwise, packets may be improperly blocked or permitted.</t>
        </li>
        <li>
          <t>Improper block prblem of strict uRPF. Strict uRPF can automatically update SAV rules based on the local FIB information, but it may block legitimate traffic in the asymmetric routing or hidden prefix scenarios. Strict uRPF may mistakenly consider a valid incoming interface as invalid, resulting in legitimate packets being blocked (i.e., an improper block problem).</t>
        </li>
        <li>
          <t>Improper permit problem of loose uRPF. Loose uRPF also automatically updates SAV rules based on the local FIB information, but its rules are overly permissive. Any spoofed packet with a source address present in the FIB may be permitted by loose uRPF (i.e., an improper permit problem).</t>
        </li>
      </ul>
      <t>The fundamental reason these limitations have persisted is the absence of SAV-specific, authoritative information that can be consumed automatically. Current automated uRPF-based mechanisms derive their SAV rules solely from routing or forwarding information. However, routing information is designed to express reachability rather than authorization to use a source address. As a result, uRPF-based mechanisms cannot reliably validate source addresses in scenarios such as asymmetric routing or hidden prefixes. While ACL-based SAV can accurately encode source address authorization, it relies on manual configuration and ongoing operator intervention. Such manual maintenance does not scale in dynamic networks. Consequently, addressing these gaps requires the introduction of SAV-specific, authoritative information and the design of automated mechanisms that can consume this information directly, rather than relying only on routing or forwarding state.</t>
      <t>Another consideration is that uRPF-based mechanisms rely on routing information to make SAV decisions, assuming that the routing information in the local FIB is correct. If the routing information is incorrect, SAV decisions may also be incorrect, potentially resulting in improper blocking or permitting. Ensuring the correctness of routing information is the responsibility of mechanisms or operational processes outside the scope of SAV. However, if SAV relies on routing information or other contextual information, it is highly recommended that such information be validated before being used for SAV.</t>
    </section>
    <section anchor="sec-requirement">
      <name>Requirements for New SAV Mechanisms</name>
      <t>This section outlines five general requirements for technical improvements that should be considered when designing future intra-domain SAV architectures and solutions. These informational requirements can not be used to initiate standards-track protocol changes.</t>
      <section anchor="sub-require1">
        <name>Accurate Validation</name>
        <t>Any new intra-domain SAV mechanism <bcp14>MUST</bcp14> improve the accuracy of source address validation compared to existing uRPF-based mechanisms. In particular, it <bcp14>MUST</bcp14> reduce the occurrence of improper blocks (i.e., blocking legitimate traffic), improper permits (i.e., allowing spoofed traffic), or both. Specifically, it <bcp14>MUST</bcp14> satisfy the following conditions:</t>
        <ul spacing="normal">
          <li>
            <t>result in fewer improper blocks than strict uRPF, particularly in scenarios involving asymmetric routes or hidden prefixes;</t>
          </li>
          <li>
            <t>result in fewer improper permits than loose uRPF.</t>
          </li>
        </ul>
        <t>To achieve higher SAV accuracy, additional information beyond the local FIB (e.g., SAV-specific information) may be needed to make validation decisions. By integrating such information, routers may have the ability to account for asymmetric routes and hidden prefixes, resulting in more accurate SAV rules.</t>
      </section>
      <section anchor="automatic-updates">
        <name>Automatic Updates</name>
        <t>Any new intra-domain SAV mechanism <bcp14>MUST</bcp14> be capable of automatically generating and updating SAV rules on routers, rather than relying entirely on manual updates as in ACL-based SAV. Automation helps reduce operational complexity and maintenance overhead, while allowing some initial configuration to improve SAV accuracy. This ensures the mechanism is deployable in practical networks without introducing excessive management burden.</t>
      </section>
      <section anchor="incremental-deployment-support">
        <name>Incremental Deployment Support</name>
        <t>Any new intra-domain SAV mechanism <bcp14>MUST</bcp14> support incremental deployment and provide measurable benefits even when only a subset of external non-BGP interfaces deploy the mechanism.</t>
      </section>
      <section anchor="fast-convergence">
        <name>Fast Convergence</name>
        <t>If any new intra-domain SAV mechanism requires disseminating SAV-specific information among intra-domain routers via a protocol, two considerations are essential. First, such mechanism <bcp14>MUST</bcp14> allow routers to learn updated SAV-specific information in a timely manner. Second, such mechanism <bcp14>MUST NOT</bcp14> transmit excessive SAV-specific information via a protocol, as this could significantly increase the burden on the routers’ control planes and potentially degrade the performance of existing protocols.</t>
      </section>
      <section anchor="authentication-of-information-used-for-sav">
        <name>Authentication of Information Used for SAV</name>
        <t>Any new intra-domain SAV mechanism <bcp14>SHOULD</bcp14> verify the authenticity and trustworthiness of information before using it. Using incorrect information may result in the generation of incorrect SAV rules, potentially permitting spoofed packets or causing legitimate traffic to be blocked. If any new intra-domain SAV mechanism introduces any new SAV-specific information, it <bcp14>MUST</bcp14> ensure that such information can be authenticated.</t>
      </section>
      <section anchor="vulnerability-prevention">
        <name>Vulnerability Prevention</name>
        <t>Any new intra-domain SAV mechanism <bcp14>MUST NOT</bcp14> introduce additional security vulnerabilities to existing intra-domain architectures or protocols. Protection against compromised or malicious intra-domain routers is out of scope, as such routers can compromise not only SAV mechanisms but also the entire intra-domain routing domain.</t>
      </section>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document discusses the limitations of existing intra-domain SAV practices and identifies problems and informational requirements for improved intra-domain SAV mechanisms. It does not specify new protocols or mechanisms and, as such, does not introduce any new security considerations.</t>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not request any IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to the valuable comments from: Jared Mauch, Joel Halpern, Aijun Wang, Michael Richardson, Gert Doering, Libin Liu, Li Chen, Tony Przygienda, Yingzhen Qu, James Guichard, Linda Dunbar, Robert Sparks, Stephen Farrel, Ron Bonica, Xueyan Song, etc.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2827" target="https://www.rfc-editor.org/info/rfc2827" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2827.xml">
          <front>
            <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
            <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
            <author fullname="D. Senie" initials="D." surname="Senie"/>
            <date month="May" year="2000"/>
            <abstract>
              <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="38"/>
          <seriesInfo name="RFC" value="2827"/>
          <seriesInfo name="DOI" value="10.17487/RFC2827"/>
        </reference>
        <reference anchor="RFC3704" target="https://www.rfc-editor.org/info/rfc3704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3704.xml">
          <front>
            <title>Ingress Filtering for Multihomed Networks</title>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <author fullname="P. Savola" initials="P." surname="Savola"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed addresses access to the network, and to help ensure that traffic is traceable to its correct source network. As a side effect of protecting the Internet against such attacks, the network implementing the solution also protects itself from this and other attacks, such as spoofed management access to networking equipment. There are cases when this may create problems, e.g., with multihoming. This document describes the current ingress filtering operational mechanisms, examines generic issues related to ingress filtering, and delves into the effects on multihoming in particular. This memo updates RFC 2827. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="3704"/>
          <seriesInfo name="DOI" value="10.17487/RFC3704"/>
        </reference>
        <reference anchor="RFC5210" target="https://www.rfc-editor.org/info/rfc5210" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5210.xml">
          <front>
            <title>A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience</title>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="X. Li" initials="X." surname="Li"/>
            <author fullname="G. Ren" initials="G." surname="Ren"/>
            <author fullname="K. Xu" initials="K." surname="Xu"/>
            <author fullname="M. Williams" initials="M." surname="Williams"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>Because the Internet forwards packets according to the IP destination address, packet forwarding typically takes place without inspection of the source address and malicious attacks have been launched using spoofed source addresses. In an effort to enhance the Internet with IP source address validation, a prototype implementation of the IP Source Address Validation Architecture (SAVA) was created and an evaluation was conducted on an IPv6 network. This document reports on the prototype implementation and the test results, as well as the lessons and insights gained from experimentation. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5210"/>
          <seriesInfo name="DOI" value="10.17487/RFC5210"/>
        </reference>
        <reference anchor="RFC8704" target="https://www.rfc-editor.org/info/rfc8704" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml">
          <front>
            <title>Enhanced Feasible-Path Unicast Reverse Path Forwarding</title>
            <author fullname="K. Sriram" initials="K." surname="Sriram"/>
            <author fullname="D. Montgomery" initials="D." surname="Montgomery"/>
            <author fullname="J. Haas" initials="J." surname="Haas"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document identifies a need for and proposes improvement of the unicast Reverse Path Forwarding (uRPF) techniques (see RFC 3704) for detection and mitigation of source address spoofing (see BCP 38). Strict uRPF is inflexible about directionality, the loose uRPF is oblivious to directionality, and the current feasible-path uRPF attempts to strike a balance between the two (see RFC 3704). However, as shown in this document, the existing feasible-path uRPF still has shortcomings. This document describes enhanced feasible-path uRPF (EFP-uRPF) techniques that are more flexible (in a meaningful way) about directionality than the feasible-path uRPF (RFC 3704). The proposed EFP-uRPF methods aim to significantly reduce false positives regarding invalid detection in source address validation (SAV). Hence, they can potentially alleviate ISPs' concerns about the possibility of disrupting service for their customers and encourage greater deployment of uRPF techniques. This document updates RFC 3704.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="84"/>
          <seriesInfo name="RFC" value="8704"/>
          <seriesInfo name="DOI" value="10.17487/RFC8704"/>
        </reference>
        <reference anchor="RFC7513" target="https://www.rfc-editor.org/info/rfc7513" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7513.xml">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="cable-verify" target="https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html">
          <front>
            <title>Cable Source-Verify and IP Address Security</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January"/>
          </front>
        </reference>
        <reference anchor="IPSG" target="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_53_se/configuration/guide/2960scg/swdhcp82.html">
          <front>
            <title>Configuring DHCP Features and IP Source Guard</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
        </reference>
        <reference anchor="RFC6890" target="https://www.rfc-editor.org/info/rfc6890" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6890.xml">
          <front>
            <title>Special-Purpose IP Address Registries</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="L. Vegoda" initials="L." surname="Vegoda"/>
            <author fullname="R. Bonica" initials="R." role="editor" surname="Bonica"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This memo reiterates the assignment of an IPv4 address block (192.0.0.0/24) to IANA. It also instructs IANA to restructure its IPv4 and IPv6 Special-Purpose Address Registries. Upon restructuring, the aforementioned registries will record all special-purpose address blocks, maintaining a common set of information regarding each address block.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="153"/>
          <seriesInfo name="RFC" value="6890"/>
          <seriesInfo name="DOI" value="10.17487/RFC6890"/>
        </reference>
      </references>
    </references>
    <?line 316?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
